27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong>


Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Table of Contents<br />

Introduction.........................................................................................................................................................1<br />

<strong>PVS</strong> PLUGIN FAMILIES..................................................................................................................................2<br />

Family Backdoors..............................................................................................................................................4<br />

Family CGI.........................................................................................................................................................8<br />

Family Database...............................................................................................................................................33<br />

Family DNS Servers.........................................................................................................................................44<br />

Family Finger...................................................................................................................................................47<br />

Family FTP Servers.........................................................................................................................................48<br />

Family FTP Clients..........................................................................................................................................53<br />

Family Generic.................................................................................................................................................55<br />

Family Operating System Detection...............................................................................................................80<br />

Family IMAP Servers......................................................................................................................................85<br />

Family Internet Messengers............................................................................................................................88<br />

Family IRC Clients..........................................................................................................................................94<br />

Family IRC Servers.........................................................................................................................................96<br />

Family Peer-To-Peer File Sharing..................................................................................................................97<br />

Family POP Server........................................................................................................................................100<br />

Family RPC....................................................................................................................................................102<br />

Family Samba.................................................................................................................................................105<br />

Family SMTP Clients....................................................................................................................................107<br />

Family SMTP Servers....................................................................................................................................116<br />

Family SNMP Traps......................................................................................................................................124<br />

Family SSH.....................................................................................................................................................133<br />

i


Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Table of Contents<br />

Family Web Clients........................................................................................................................................136<br />

Family Web Servers.......................................................................................................................................176<br />

Family Abuse..................................................................................................................................................230<br />

Family Policy..................................................................................................................................................231<br />

Family Data Leakage.....................................................................................................................................239<br />

Family SCADA...............................................................................................................................................247<br />

Family Mobile Devices...................................................................................................................................251<br />

Family Internet Services................................................................................................................................254<br />

ii


Introduction<br />

<strong>PVS</strong> is a passive vulnerability scanner. Do you know what happens between the last time a vulnerability scan<br />

is completed and the next time a scan is completed? New hosts, new ports, new services, and new<br />

vulnerabilities can arrive on your networks faster than you may be allowed to scan for them. The <strong>PVS</strong><br />

vulnerability monitor can find out what is happening on your network without actively scanning it. As <strong>PVS</strong><br />

monitors your network, it also watches for potential application compromises, trust relationships, and open or<br />

browsed network protocols.<br />

A single <strong>PVS</strong> sensor can be placed in front of a network of 25,000 systems and continuously monitor the<br />

traffic for a variety of security related information including:<br />

• Keeping track of all client and server application vulnerabilities<br />

• Detecting when an application is compromised or subverted<br />

• Detecting when new hosts are added to the network<br />

• Detecting when an internal system begins to port scan other systems<br />

• Highlighting all interactive and encrypted network sessions<br />

• Tracking exactly which systems communicate with other internal systems<br />

• Detecting which ports are served and which ports are browsed for each individual system<br />

• Passively determining the type of operating system of each active host<br />

This PDF is automatically generated as new plugins are made available for download from the <strong>Tenable</strong><br />

<strong>Network</strong> <strong>Security</strong> Corporate Web Server. This PDF is organized into several sections. Initially, you have this<br />

introduction followed by an overview of plugin count for each plugin family. Finally, the PDF details specific<br />

information for each of the different plugin modules. This information includes a brief description, plugin ID,<br />

CVE cross-reference, Bugtraq ID cross-reference, Nessus cross-reference, and several other descriptive<br />

entries. For more information regarding <strong>PVS</strong>, please visit:<br />

http://www.tenablesecurity.com/products/tenable-passive-vulnerability-scanner<br />

Copyright 2013 <strong>Tenable</strong> <strong>Network</strong> <strong>Security</strong><br />

Introduction 1


<strong>PVS</strong> PLUGIN FAMILIES<br />

COUNT FAMILY NAME<br />

93 Backdoors<br />

744 CGI<br />

302 Database<br />

45 DNS Servers<br />

7 Finger<br />

138 FTP Servers<br />

21 FTP Clients<br />

764 Generic<br />

41 IMAP Servers<br />

94 Internet Messengers<br />

23 IRC Servers<br />

44 IRC Clients<br />

84<br />

45<br />

Operating System<br />

Detection<br />

Peer-To-Peer File<br />

Sharing<br />

47 POP Server<br />

67 RPC<br />

39 Samba<br />

169 SMTP Clients<br />

141 SMTP Servers<br />

159 SNMP Traps<br />

75 SSH<br />

759 Web Clients<br />

1039 Web Servers<br />

Abuse<br />

220 Policy<br />

146 Data Leakage<br />

89 SCADA<br />

51 Mobile Devices<br />

103 Internet Services<br />

<strong>PVS</strong> PLUGIN FAMILIES 2


Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> PLUGIN FAMILIES 3


Family Backdoors<br />

<strong>PVS</strong> ID PLUGIN NAME FAMILY NESSUS<br />

ID<br />

1141 Trojan/Backdoor - W32/Bagle Virus Detection Backdoors N/A<br />

1143 Trojan/Backdoor - MyDOOM/NoVarg Detection Backdoors 12029<br />

1183 Policy - iroffer Software Detection Backdoors N/A<br />

1184 Policy - iroffer Software Detection Backdoors N/A<br />

1185 Policy - iroffer Software Detection Backdoors N/A<br />

1207 Trojan/Backdoor - Agobot.FO Detection Backdoors 12128<br />

1215 Trojan/Backdoor Detection - Sasser Worm Backdoors 12219<br />

1229 Trojan/Backdoor - JS.Scob.Trojan/Download.Ject Detection Backdoors N/A<br />

1230 Policy - GATOR Software Detection Backdoors 11998<br />

1231 Policy - ALEXA Software Detection Backdoors N/A<br />

1232 Policy - BARGAINBUDDY Software Detection Backdoors 12010<br />

1233 Policy - HOTBAR Software Detection Backdoors N/A<br />

1234 Policy - EZULA Software Detection Backdoors N/A<br />

1235 Policy - HOTBAR Software Detection Backdoors N/A<br />

1236 Policy - Cydoor Topicks Sofware Detection Backdoors N/A<br />

1240 Trojan/Backdoor - MyDoom.M Detection Backdoors N/A<br />

1241 Trojan/Backdoor - BackDoor.Zincite.A Detection Backdoors 14184<br />

1883 Trojan/Backdoor - 4553 Detection Backdoors 11187<br />

1884 RemotelyAnywhere SSH Detection Backdoors 10921<br />

1885 RemotelyAnywhere WWW Detection Backdoors 10920<br />

1909 ClarkConnect Linux clarkconnectd Information Disclosure Backdoors 11277<br />

1910 Trojan/Backdoor - DeepThroat Detection Backdoors 10053<br />

1911 Trojan/Backdoor - NetSphere Detection Backdoors 10005<br />

1912 Trojan/Backdoor - GateCrasher Detection Backdoors 10093<br />

1913 Trojan/Backdoor - Portal of Doom Detection Backdoors 10186<br />

1914 Trojan/Backdoor - GirlFriend Detection Backdoors 10094<br />

1915 Trojan/Backdoor - EvilFTP Detection Backdoors N/A<br />

1916 Trojan/Backdoor - Phase Zero Detection Backdoors N/A<br />

1917 Trojan/Backdoor - SubSeven Detection Backdoors 10409<br />

Family Backdoors 4


Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

1918 Trojan/Backdoor - SyGate Detection Backdoors 10274<br />

1919 SETI@HOME Client Detection Backdoors N/A<br />

1920 WinGate Telnet Proxy Server Detection Backdoors N/A<br />

1921 GnoCatan Remote Overflow Backdoors 11736<br />

2045 GoToMyPC Detection Backdoors N/A<br />

2542 Tor Tunnel Detection Backdoors N/A<br />

2815 Hydrogen Server Detection Backdoors 18039<br />

3117 Generic Botnet Client Detection Backdoors N/A<br />

3164 Zotob Worm Infection Backdoors 19429<br />

3804 SQLYog MySQL HTTP Tunnel Detection Backdoors N/A<br />

4334 Malicious Website - JavaScript Files Linked on Web Site Backdoors 29871<br />

4400 Generic Botnet Client Detection Backdoors N/A<br />

4401 Generic Botnet Server Detection Backdoors N/A<br />

4440 Generic Botnet Client Detection Backdoors N/A<br />

4441 Generic Botnet Server Detection Backdoors N/A<br />

4470 Malicious Website - Embedded Iframe Detection Backdoors N/A<br />

4471 Malware Payload Code Detection Backdoors 31854<br />

4476 Trojan Horse Client Detection Backdoors N/A<br />

4477 Trojan Horse Client Detection Backdoors N/A<br />

4478 Trojan Horse Client Detection Backdoors N/A<br />

4479 Trojan Horse Client Detection Backdoors N/A<br />

4480 Trojan Horse Client Detection Backdoors N/A<br />

4481 Trojan Horse Client Detection Backdoors N/A<br />

4487 Malicious Website - Embedded Javascript Detection Backdoors N/A<br />

4500 Possible Keylogger Software Installation Detection Backdoors N/A<br />

4520 Possible Keylogger software installation detection Backdoors N/A<br />

4657 Dns2TCP Service Detection Backdoors N/A<br />

4977 Trojan/Backdoor Detection - Conficker Detection Backdoors 36036<br />

4978 Trojan/Backdoor Detection - Conficker Detection Backdoors 36036<br />

5357 Trojan/Backdoor - Arugizer Detection Backdoors 45006<br />

5526 Trojan/Backdoor - Storm/Pecoan.AG Worm Detection Backdoors N/A<br />

5549 Trojan/Backdoor - Warbot Detection Backdoors N/A<br />

Family Backdoors 5


5721 Stuxnet Traffic Detection Backdoors N/A<br />

5738 Stuxnet Infected Host Detection Backdoors N/A<br />

5834 SSL Revoked Certificate Detection Backdoors N/A<br />

5835 SSL Revoked Certificate Detection Backdoors N/A<br />

5836 SSL Revoked Certificate Detection Backdoors N/A<br />

5837 SSL Revoked Certificate Detection Backdoors N/A<br />

5838 SSL Revoked Certificate Detection Backdoors N/A<br />

5839 SSL Revoked Certificate Detection Backdoors N/A<br />

5840 SSL Revoked Certificate Detection Backdoors N/A<br />

5841 SSL Revoked Certificate Detection Backdoors N/A<br />

5974 MetaSploit Exploited Machine Detection Backdoors N/A<br />

5975 MetaSploit Exploited Machine Detection Backdoors N/A<br />

5976 MetaSploit Server Detection Backdoors N/A<br />

6218 Trojan/Backdoor Detection - BACKDOOR Infector.1.x Backdoors N/A<br />

6219<br />

Trojan/Backdoor Detection - BACKDOOR<br />

SatansBackdoor.2.0.Beta<br />

Backdoors N/A<br />

6220 Trojan/Backdoor Detection - GateCrasher Backdoors N/A<br />

6221<br />

Trojan/Backdoor Detection - BACKDOOR Matrix 2.0<br />

Client<br />

Backdoors N/A<br />

6222 Trojan/Backdoor Detection - win-trin00 Backdoors N/A<br />

6223 Trojan/Backdoor Detection - QAZ Worm Backdoors N/A<br />

6224 Trojan/Backdoor Detection - Doly 2.0 Backdoors N/A<br />

6225 Trojan/Backdoor Detection - netbus Backdoors N/A<br />

6226 Trojan/Backdoor Detection - Subseven Backdoors N/A<br />

6227<br />

6228<br />

6229<br />

Trojan/Backdoor Detection - RXBOT / RBOT Exploit<br />

Report<br />

Trojan/Backdoor Detection - RXBOT / RBOT Vulnerability<br />

Scan<br />

Trojan/Backdoor Detection - Windows Command Shell as<br />

Service<br />

Backdoors N/A<br />

Backdoors N/A<br />

Backdoors N/A<br />

6230 Windows Command Shell as Service Backdoors N/A<br />

6231 SMTP Proxy Traffic Detected Backdoors N/A<br />

6232<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Trojan/Backdoor Detection - WinEggDrop Infected Host<br />

Detection<br />

Backdoors N/A<br />

6246 FTP Client Initiated from an SMTP Server Backdoors N/A<br />

Family Backdoors 6


Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

6492 Flame Worm Detection Backdoors N/A<br />

6579 Pushdo botnet detection Backdoors N/A<br />

6639 Samsung / Dell Printer SNMP Backdoor Backdoors 63136<br />

Family Backdoors 7


Family CGI<br />

<strong>PVS</strong><br />

ID<br />

PLUGIN NAME FAMILY NESSUS<br />

ID<br />

1217 SquirrelMail < 1.4.3 Multiple Vulnerabilities CGI N/A<br />

1528 miniPortail admin.php Cookie Manipulation Admin Access CGI 11623<br />

1530 Snitz Forums < 3.4.03 register.asp Email Parameter SQL Injection CGI 11621<br />

1532 Horde and IMP Test Script Disclosure CGI 11617<br />

1533 PHP Topsites counter.php Arbitrary File Overwrite CGI 11611<br />

1534 mod_survey < 3.0.14e / 3.0.15pre6 ENV tags SQL Injection CGI 11609<br />

1537 IkonBoard FUNC.pm lang Cookie Arbitrary Command Execution CGI 11605<br />

1539 HappyMall normal_html.cgi Remote Command Execution CGI 11603<br />

1540 CGI Script Path Disclosure CGI N/A<br />

1542 12Planet Chat Server Path Disclosure CGI 11592<br />

1543 12Planet Chat Server ClearText Password Remote Disclosure CGI 11591<br />

1548<br />

TrueGalerie admin.php loggedin Parameter Admin Authentication<br />

Bypass<br />

CGI 11582<br />

1549 album.pl < 6.2 Remote Command Execution CGI 11581<br />

1551 StockMan Shopping Cart < 7.9 shop.plx Command Execution CGI 11569<br />

1553 Coppermine Gallery < 1.1 beta 3 SQL Injection CGI N/A<br />

1555 Bugzilla XSS / Insecure Temporary File Names CGI 11462<br />

1557 OpenBB Multiple SQL Injection CGI 11550<br />

1558<br />

Nokia IPSO Voyager WebGUI readfile.tcl file Parameter Arbitrary File<br />

Access<br />

CGI 11549<br />

1559 bttlxeForum login.asp < 2.0 Multiple SQL Injection CGI 11548<br />

1562 eZ Publish site.ini Configuration Disclosure CGI 11538<br />

1563 Ocean12 Guestbook XSS CGI 11537<br />

1564 Super Guestbook superguestconfig Admin Password Disclosure CGI 11536<br />

1565 Instaboard index.cfm SQL Injection CGI 11532<br />

1567 Coppermine Gallery < 1.1 Beta 2 PHP Code Execution CGI N/A<br />

1569 VPOPMail vpopmail.php Remote Command Execution CGI 11397<br />

1578 Sambar environ.pl Default CGI Disclosure CGI N/A<br />

1579 Sambar testcgi.exe Default CGI Disclosure CGI N/A<br />

1582 Bugzilla < 2.14.5 / 2.16.2 / 2.17.3 Multiple Vulnerabilities CGI 11463<br />

Family CGI 8


1584 Bonsai < 1.4 Multiple Vulnerabilities CGI 11440<br />

1588 popper_mod < 1.2.3 Administration Authentication Bypass CGI 11334<br />

1589 WebWho+ whois.cgi Remote Command Execution CGI 11333<br />

1592 phpinfo() Function Information Disclosure CGI 11229<br />

1598 myPHPnuke displayCategory.php Remote Command Execution CGI 11836<br />

1687 ddicgi.exe Multiple Vulnerabilities CGI 11728<br />

2114 Mantis < 0.18.3 / 0.19.0a2 Multiple Vulnerabilities CGI 14324<br />

2118 Sympa < 4.1.2 wwsympa.fcgi List Master Authentication Bypass CGI N/A<br />

2119 Sympa < 4.1.3 List Creation Description Field XSS CGI N/A<br />

2128 PHP-Fusion Database Backup Information Disclosure CGI N/A<br />

2132 eGroupWare < 1.0.0.004 Multiple XSS CGI N/A<br />

2146 WebAPP < 0.9.9.2 index.cgi Directory Traversal Arbitrary File Access CGI 14365<br />

2149 PHP Code Snippet Library index.php XSS CGI N/A<br />

2166 Webmatic < 1.9.0 Multiple Vulnerabilities CGI N/A<br />

2187 Nagl Dictionary Module for XOOPS XSS CGI N/A<br />

2191 phpScheduleIt < 1.0.0 New User Registration HTML Injection CGI N/A<br />

2266 PSNews v1.1 index.php Multiple Parameter XSS CGI N/A<br />

2267 OpenCA < 0.9.1-9 Web Interface Form Input Field XSS CGI N/A<br />

2269 PHPGroupWare < 0.9.16.003 Wiki Module XSS CGI N/A<br />

2271 SAFE TEAM Regulus Staff Accounts Password Hash Disclosure CGI N/A<br />

2272 SAFE TEAM Regulus Customers Accounts Password Hash Disclosure CGI N/A<br />

2273<br />

2278<br />

2280<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

SAFE TEAM Regulus Customer Statistics Connection Log Information<br />

Disclosure<br />

PerlDesk < 2 pdesk.cgi lang Parameter Traversal Server-Side Script<br />

Execution<br />

Turbo Seek < 1.7.2 tseekdir.cgi location Parameter Information<br />

Disclosure<br />

CGI N/A<br />

CGI N/A<br />

CGI N/A<br />

2289 SnipSnap < 1.0b1 POST Request HTTP Response Splitting CGI N/A<br />

2294 vBulletin authorize.php x_invoice_num Parameter SQL Injection CGI N/A<br />

2302 Snitz Forum < 3.4.05 HTTP Response Splitting CGI N/A<br />

2305 YaBB Multiple Vulnerabilities CGI N/A<br />

2308 Tutos Multiple Vulnerabilities CGI N/A<br />

2312 YaBB < Gold SP 1.3.2 Multiple Input Validation Vulnerabilities CGI N/A<br />

Family CGI 9


2317 Full Revolution aspWebCalendar calendar.asp SQL Injection CGI N/A<br />

2318 Full Revolution album.asp aspWebAlbum SQL Injection CGI N/A<br />

2336 Serendipity < 0.7-beta3 Multiple Vulnerabilities CGI N/A<br />

2352 PHP-Fusion Database Multiple Vulnerabilities CGI N/A<br />

2372 Bugzilla Authentication Bypass and Information Disclosure CGI 15562<br />

2394 Mantis < 0.19.1 Multiple Information Disclosure Vulnerabilities CGI N/A<br />

2398 eGroupWare < 1.0.0.006 JiNN Application Unspecified Vulnerability CGI N/A<br />

2401 SquirrelMail < 1.4.4 decodeHeader HTML Injection CGI N/A<br />

2407 miniBB < 1.7f index.php user Parameter SQL Injection CGI 15763<br />

2409 PowerPortal index.php index_page Parameter SQL Injection CGI 15760<br />

2410<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

phpScheduleIt < 1.0.1 Reservation.class.php Arbitrary Reservation<br />

Modification<br />

CGI 15772<br />

2411 phpBB Login Form SQL Injection CGI 15780<br />

2414 WebGUI < 6.2.9 Unspecified Vulnerability CGI 15787<br />

2415 PHP-Kit < 1.6.04 Multiple Input Validation Vulnerabilities CGI 15784<br />

2416 phpMyAdmin Detection CGI N/A<br />

2417 phpMyAdmin < 2.6.0-p13 Multiple XSS CGI 15770<br />

2418 phpMyAdmin sql.php Traversal Arbitrary File Access CGI 11116<br />

2419 phpMyAdmin < 2.5.6-rc1 Traversal Arbitrary File Access (2) CGI 12041<br />

2420 phpMyAdmin < 2.5.2 Multiple Vulnerabilities CGI 11761<br />

2421 phpMyAdmin < 2.6.0-p12 Multiple Remote Command Execution CGI 11761<br />

2422 Invision PowerBoard < 2.0.3 SQL Injection CGI 18011<br />

2423 Nucleus CMS Multiple Vulnerabilities CGI 15788<br />

2431 Brooky CubeCart < 2.0.2 index.php cat_id Parameter SQL Injection CGI 15442<br />

2433 KorWeblog < 1.6.2 Remote Directory Listing CGI N/A<br />

2439 YaBB Shadow BBCode Tag XSS CGI 15859<br />

2440 Post-Nuke pnTresMailer Directory Traversal Arbitrary File Access CGI 15858<br />

2445 PAFileDB Multiple Information Disclosure Vulnerabilities CGI 15911<br />

2446 ViewCVS < 1.0-dev Multiple Unspecified Vulnerabilities CGI N/A<br />

2447 PHP Live! < 2.8.2 Remote Configuration File Include CGI 15928<br />

2451 IlohaMail < 0.8.14-RC1 Unspecified Vulnerability CGI 15935<br />

2452 phpMyAdmin < 2.6.1-pl1 Remote Command Execution CGI N/A<br />

2453 phpDig < 1.8.5 Unspecified Vulnerability CGI 15949<br />

Family CGI 10


2454 Citadel/UX Remote Format String CGI N/A<br />

2456 Serendipity < 0.7.1 compat.php searchTerm Parameter XSS CGI 15914<br />

2457 PHPGroupWare Multiple XSS and SQL Injection Vulnerabilities CGI N/A<br />

2462 Ikonboard < 3.1.3 ikonboard.cgi Multiple Parameter SQL Injection CGI N/A<br />

2464 JSBoard Remote Arbitrary Script Upload CGI N/A<br />

2465<br />

WordPress < 1.2.2 Multiple Vulnerabilities (XSS, HTML Injection, SQL<br />

Injection)<br />

CGI 15443<br />

2466 Singapore Gallery Multiple Vulnerabilities CGI 15987<br />

2470 CVSTrac < 1.1.5 Unspecified XSS CGI N/A<br />

2474 Namazu < 2.0.14 Multiple Vulnerabilities CGI 16045<br />

2475 2BGal SQL Injection CGI 16046<br />

2477 Help Center Live Multiple Vulnerabilities CGI 18296<br />

2478 ViewCVS < 1.0.0 HTTP Response Splitting CGI 16062<br />

2479 Owl < 0.74.0 Multiple Vulnerabilities CGI 16063<br />

2480 PHProxy index.php error Parameter XSS CGI N/A<br />

2483 FlatNuke < 2.5.2 Form Submission Arbitrary Script Injection CGI N/A<br />

2484 All Enthusiast PhotoPost PHP Pro < 4.8.6 Multiple XSS CGI N/A<br />

2485 MyBulletinBoard Multiple SQL Injection Vulnerabilities CGI 19525<br />

2486<br />

All Enthusiast ReviewPost PHP Pro < 2.5.2 Multiple Input Validation<br />

Vulnerabilities<br />

CGI N/A<br />

2487 b2evolution index.php SQL Injection CGI N/A<br />

2513 PHPWind Board < 2.0.2 faq.php Remote File Inclusion CGI 16122<br />

2522 VideoDB < 2.0.2 Multiple Vulnerabilities CGI N/A<br />

2523 GNU Mailman Multiple Unspecified Remote Vulnerabilities CGI N/A<br />

2524 BiTBOARD IMG BBCode Tag JavaScript XSS CGI N/A<br />

2532 Bugzilla < 2.18.0 Internal Error XSS CGI N/A<br />

2533 Gallery Multiple Vulnerabilities CGI 16185<br />

2534<br />

AWStats < 6.3 awstats.pl configdir Parameter Remote Command<br />

Execution<br />

CGI 16189<br />

2535 VBulletin Init.PHP Unspecified Remote Vulnerability CGI 16203<br />

2544<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

CMSimple < 2.4 Beta 5 Multiple Remote Input Validation<br />

Vulnerabilities<br />

CGI 19693<br />

2545 Siteman < 1.1.11 Page User Database Privilege Escalation CGI 16216<br />

2546 ExBB Nested BBcode XSS CGI 16223<br />

Family CGI 11


2549 JSBoard < 2.0.10 session.php Arbitrary File Access CGI N/A<br />

2550 SquirrelMail < 1.4.4-RC1 webmail.php XSS CGI N/A<br />

2551 MercuryBoard < 1.1.2 Multiple Vulnerabilities CGI N/A<br />

2554 Comersus Default Install Script Admin Access CGI N/A<br />

2579 SmarterMail Attachment Upload XSS CGI 16281<br />

2580 XOOPS Detection CGI N/A<br />

2582 SquirrelMail < 1.4.4 URI Parsing Arbitrary Code Execution CGI N/A<br />

2592 ht://Dig config Parameter XSS CGI N/A<br />

2593 WWWBoard Password File Disclosure CGI N/A<br />

2596 BXCP < 0.2.9.8 index.php show Parameter PHP Content Disclosure CGI N/A<br />

2597 PerlDesk < 2 kb.cgi view Parameter SQL Injection CGI 16323<br />

2598 PHP-Fusion viewthread.php Arbitrary Thread Access CGI N/A<br />

2607 GNU Mailman < 2.1.6 Directory Traversal Arbitrary File Access CGI 16339<br />

2613 AWStats < 6.5 Perl Content-Parsing Code Execution CGI 19415<br />

2614 Sympa < 4.1.3 src/queue.c Remote Buffer Overflow CGI 16387<br />

2616 OpenWebmail openwebmail.pl logindomain Parameter XSS CGI N/A<br />

2617 Brooky CubeCart Multiple Vulnerabilities CGI N/A<br />

2618 ELOG < 2.5.7 Unspecified Remote Buffer Overflows CGI 16469<br />

2619 Siteman users.php Remote Buffer Overflow CGI 16216<br />

2621 Kayako eSupport Multiple XSS CGI 17598<br />

2626 PaNews Multiple Injection Vulnerabilities CGI 17574<br />

2627 MercuryBoard < 1.1.3 Multiple Vulnerabilities CGI N/A<br />

2628<br />

WebCalendar users.php user_valid_crypt Parameter < 1.0.0 SQL<br />

Injection<br />

CGI 18571<br />

2629 paFAQ Multiple Vulnerabilities CGI 18535<br />

2636 ZeroBoard Multiple Vulnerabilities CGI N/A<br />

2639 WebConnect Multiple Remote Vulnerabilities CGI N/A<br />

2641<br />

phpBB < 2.0.12 Path Disclosure / Unauthorized unlink() Function<br />

Access<br />

CGI N/A<br />

2642 vBulletin < 3.0.7 misc.php PHP Code Injection CGI N/A<br />

2643 PBLang Bulletin Board Multiple HTML Injection and XSS CGI 17209<br />

2651<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

punBB < 1.2.2 Multiple SQL Injection and Authentication Bypass<br />

Vulnerabilities<br />

CGI N/A<br />

Family CGI 12


2653 Brooky CubeCart < 2.0.6 settings.inc.php XSS CGI N/A<br />

2658 phpBB < 2.0.13 Cookie Authentication Bypass CGI N/A<br />

2661 FCKeditor with PHPNuke connector.php File Upload CGI N/A<br />

2662 PostNuke < 0.760 RC3 Multiple Vulnerabilities CGI 17240<br />

2663 phpCOIN 1.2.1b Multiple Vulnerabilities CGI 17246<br />

2665 PHPNews < 1.2.5 auth.php path Parameter Remote File Inclusion CGI 17247<br />

2668 Typo3 < 1.4.2 cmw_linklist SQL Injection CGI 17272<br />

2673 Stadtaus Form Mail < 2.4 formmail.inc.php Remote File Inclusion CGI 17285<br />

2674<br />

phpBB < 2.0.14 Cookie Authentication Bypass and SQL Injection<br />

Vulnerabilities<br />

CGI 17301<br />

2675 phpMyFAQ < 1.6.0 SQL Injection CGI N/A<br />

2676 CopperExport Plugin < 0.2.1 xp_publish.php SQL Injection CGI 17306<br />

2678 Sun AnswerBook2 < 1.4.5 XSS CGI N/A<br />

2679 Aztek Forum myadmin.php Admin Authentication Bypass CGI N/A<br />

2682 PHP-Fusion < 5.01 BBcode IMG Tag XSS CGI N/A<br />

2683 XOOPS Arbitrary Avatar File Upload CGI N/A<br />

2685 YaBB < 2.1 YaBB.pl username Parameter XSS CGI 17305<br />

2686 paFileDB < 3.2 XSS and SQL Injection Vulnerabilities CGI 19505<br />

2687 NewsScript Content Management Admin Authentication Bypass CGI 17309<br />

2692 Zorum < 3.6.0 Multiple Vulnerabilities CGI 17312<br />

2693 Active WebCam < 5.6 Multiple Vulnerabilities CGI 17315<br />

2694 PhotoPost Multiple Vulnerabilities CGI 17314<br />

2699 UBB.threads < 6.5.1.1 editpost.php SQL Injection CGI 18098<br />

2702 PHP-Nuke paBox Module Hidden Parameter XSS CGI 17336<br />

2706 SimpGB < 1.35.2 guestbook.php quote Parameter SQL Injection CGI 17328<br />

2707 Cricket <strong>Network</strong> Monitor Detection CGI N/A<br />

2711 phpPGAds/phpAdNew < 2.0.5 adframe.php refresh Parameter XSS CGI N/A<br />

2715<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

punBB < 1.2.5 Multiple SQL Injection and Authentication Bypass<br />

Vulnerabilities<br />

CGI 17363<br />

2719 NTOP <strong>Network</strong> Tool Detection CGI N/A<br />

2720 NTOP Multiple Vulnerabilities CGI N/A<br />

2723 RunCMS highlight.php Information Disclosure CGI N/A<br />

2725 CoolForum SQL and XSS Vulnerabilities CGI 17597<br />

Family CGI 13


2726 PHP-Fusion < 5.0.2 setuser.php HTML Injection Vulnerability CGI N/A<br />

2731 Novell GroupWise WebAccess Detection CGI N/A<br />

2732 Novell NetWare Management Portal Information Disclosure CGI N/A<br />

2734 Policy - TeamSpeak Online Gaming VoIP Server Detection CGI N/A<br />

2735 UserMin Remote Access Detection CGI N/A<br />

2736 WebSTAR Mail Detection CGI N/A<br />

2737 WebSTAR Mail < 5.4.0 Multiple Vulnerabilities CGI N/A<br />

2742 Endymion MailMan Detection CGI N/A<br />

2743 <strong>Network</strong> Query Tool Detection CGI N/A<br />

2745<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Vortex Portal Content Management System Multiple Remote File<br />

Inclusion<br />

CGI N/A<br />

2747 XMB Forum < 1.9.8 SQL Injection and XSS Vulnerabilities CGI 17608<br />

2748 phpSysInfo < 2.5 Multiple Script XSS CGI 17610<br />

2774 phpMyDirectory < 10.1.6 review.php Multiple Parameter XSS CGI 17634<br />

2776 Ublog < 1.0.5 login.asp msg Parameter XSS CGI N/A<br />

2778 PhotoPost < 5.02 RC3 Multiple Content-parsing Vulnerabilities CGI 17649<br />

2779 Horde < 3.0.4 Parent Page Title XSS CGI 17650<br />

2780 MailReader < 2.3.36 network.cgi MIME Message XSS CGI 17657<br />

2783 MaxWebPortal < 1.36 XSS and SQL Injection Vulnerabilities CGI N/A<br />

2787 phpMyAdmin < 2.6.2 RC1 Remote Command Execution CGI 17689<br />

2796 Comersus Cart Username Field HTML Injection CGI 17983<br />

2797 Comersus Cart Detection CGI N/A<br />

2798 RunCMS fileupload.php Arbitrary File Upload CGI 17987<br />

2799 Active Auction House Multiple Vulnerabilities CGI 17989<br />

2801 Brooky CubeCart < 2.0.7 Multiple Script SQL Injection CGI 17999<br />

2807 punBB < 1.2.5 profile.php SQL Injection CGI 18005<br />

2808 PostNuke < 0.760 RC4 Multiple XSS and SQL Injection Vulnerabilities CGI 18360<br />

2809 Citrix MetaFrame Server Detection CGI N/A<br />

2812 ModernBill < 4.3.3 Multiple Vulnerabilities CGI 18008<br />

2816 XAMPP < 1.4.14 Default Installation Multiple HTML Injection CGI 18037<br />

2819 EGroupWare < 1.0.0.007 Attachment Information Disclosure CGI 15719<br />

2820 PHPBB2 < 2.0.14 Multiple Vulnerabilities CGI 18573<br />

2821 PHP Photo Album < 2.0.14 Multiple Vulnerabilities CGI N/A<br />

Family CGI 14


2826 Serendipity < 0.72 exit.php Multiple Parameter SQL Injection CGI 18155<br />

2827 SPHPBlog search.php q Parameter XSS CGI 18048<br />

2828<br />

IlohaMail < 0.8.14-RC3 read_message.php Multiple Field HTML<br />

Injection<br />

CGI 18050<br />

2837 mvnForum < 1.0 RC4_03 Search Parameter XSS CGI 18359<br />

2839 Coppermine Gallery < 1.3.3 init.inc.php HTML Injection CGI N/A<br />

2843 Info2WWW < 1.2.2.9-23 Argument XSS CGI 18086<br />

2846 Coppermine Gallery SQL Injection CGI 18101<br />

2848 Woltlab Burning Board XSS / SQL Injection Vulnerabilities CGI 18251<br />

2849 phpBB < 2.0.15 admin_forums.php XSS CGI 18124<br />

2850 Horde Vacation < 2.2.2 Parent Frame Page Title XSS CGI N/A<br />

2851 Horde MNemo < 1.1.4 Parent Frame Page Title XSS CGI N/A<br />

2852 Horde Nag < 1.1.3 Parent Frame Page Title XSS CGI 18136<br />

2853 Horde Chora < 1.2.3 Parent Frame Page Title XSS CGI 18131<br />

2854 Horde Accounts < 2.1.2 Parent Frame Page Title XSS CGI N/A<br />

2855 Horde Forwards < 2.2.2 Parent Frame Page Title XSS CGI N/A<br />

2856 Horde Imp < 3.2.8 Parent Frame Page Title XSS CGI N/A<br />

2857 Horde Turba < 1.2.5 Parent Frame Page Title XSS CGI 18138<br />

2858 Horde Kronolith Multiple XSS CGI N/A<br />

2859 Yappa-NG < 2.3.2 Multiple vulnerabilities CGI N/A<br />

2864 PHP-Calendar < 0.10.3 includes/search.php SQL Injection CGI N/A<br />

2865 Claroline Multiple Remote Vulnerabilities CGI 18165<br />

2867 PHPCoin < 1.2.2 2005-12-13 Multiple Script SQL Injection CGI 18166<br />

2871 JGS-Portal < 3.0.2 jgs_portal.php id Parameter SQL Injection CGI N/A<br />

2874 MaxWebPortal < 1.3.5 Multiple SQL Injection CGI N/A<br />

2875<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Open Webmail < 2.51 20050430 Shell Escape Arbitrary Command<br />

Execution<br />

CGI 18190<br />

2879 Invision Board Multiple XSS and SQL Injection CGI 18201<br />

2885 WebStar Mail < 5.4.1 Tomcat Plugin Remote Overflow CGI N/A<br />

2886 PHP Advanced Transfer Manager < 1.22 Arbitrary File Upload CGI 18207<br />

2897 BoastMachine < 3.1 users.inc.php Arbitrary File Upload CGI 18247<br />

2898 MaxWebPortal < 1.360 Multiple Vulnerabilities CGI 18248<br />

2900 Bugzilla < 2.19.3 Information Disclosure CGI 18245<br />

Family CGI 15


2903<br />

PhotoPost PHP Pro < 5.02 RC4 member.php uid Parameter SQL<br />

Injection<br />

CGI N/A<br />

2917 JGS-Portal < 3.03 Multiple Scripts SQL Injection CGI 18289<br />

2918 WordPress < 1.5.1.2 SQL Injection and XSS CGI 18301<br />

2920 Serendipity < 0.80 RC7 Multiple Vulnerabilities CGI 18298<br />

2933<br />

PHP Advanced Transfer Manager < 1.22 File Upload Arbitrary<br />

Command Execution<br />

CGI 18207<br />

2937 MaxWebPortal password.asp memKey Parameter SQL Injection CGI 18370<br />

2942 Invision Board < 2.0.5 Privilege Escalation / SQL Injection CGI 18401<br />

2944 Exhibit Engine < 1.5 RC 5 list.php Multiple Parameter SQL Injection CGI 18416<br />

3016 SquirrelMail < 1.4.5 Multiple Vulnerabilities CGI 18504<br />

3017 Ultimate PHP Board < 1.9.7 Multiple XSS CGI N/A<br />

3024 MercuryBoard User-Agent HTTP Header SQL Injection CGI 18541<br />

3025 Raxnet Cacti Detection CGI N/A<br />

3026 i-Gallery Traversal File Access / XSS CGI 18539<br />

3028 Simple Machines Forum < 1.0.5 SQL Injection CGI 18553<br />

3032 UBB.threads < 6.5.2 Beta 2 XSS / SQL Injection CGI N/A<br />

3037 PHP-Fusion < 6.00.106 submit.php Multiple Parameter HTML Injection CGI N/A<br />

3038 phpBB < 2.0.16 viewtopic.php Arbitrary Code Execution CGI 18589<br />

3041 Xoops < 2.0.12 Multiple XSS / SQL Injection CGI 18614<br />

3046 osTicket < 1.3.1 Multiple Vulnerabilities CGI 18612<br />

3047 PHPNews < 1.2.6 news.php prevnext Parameter SQL Injection CGI 18621<br />

3049<br />

phpPgAdmin < 3.5.4 index.php formLanguage Parameter Traversal<br />

Arbitrary File Access<br />

CGI N/A<br />

3050 Geeklog < 1.3.12 comment.php order Parameter SQL Injection CGI N/A<br />

3051 phpBB < 2.0.17 Nested BBCode URL Tags XSS CGI 18626<br />

3053 Drupal Public Comment PHP Code Injection CGI N/A<br />

3054 Comersus Cart < CGI 18643<br />

3055 PHPAUCTION Multiple Vulnerabilities CGI N/A<br />

3056<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Jinzora < 2.1 Multiple Scripts include_path Parameter Remote File<br />

Inclusion<br />

CGI 18653<br />

3058 punBB < 1.2.6 profile.php $temp Parameter SQL Injection CGI N/A<br />

3060 Bugzilla < 2.18.2 / 2.20rc1 Multiple Vulnerabilities CGI 18654<br />

3061 PPA functions.inc.php ppa_root_path Parameter Remote File Inclusion CGI N/A<br />

Family CGI 16


3086 VP-ASP Multiple Script SQL Injection (2) CGI 19229<br />

3087 GroupWise WebAccess < 6.5 SP5 EMail IMG SRC XSS CGI 19228<br />

3100 PHP-Fusion < 6.00.107 Multiple Vulnerabilities CGI 19311<br />

3103 CMSimple < 2.5 Beta 3 Search Function XSS CGI N/A<br />

3104 PHPNews < 1.3.0 auth.php Multiple Field SQL Injection CGI N/A<br />

3109 Hobbit Monitor < 4.1.0 Remote DoS CGI N/A<br />

3110 FtpLocate Multiple Scripts fsite Parameter Remote File Inclusion CGI 19300<br />

3111<br />

Atomic Photo Album apa_phpinclude.inc.php apa_module_basedir<br />

Parameter Remote File Inclusion<br />

CGI 19299<br />

3157 FlatNuke < 2.5.6 Multiple XSS CGI N/A<br />

3162 WordPress < 1.5.1.4 cache_lastpostdate Parameter PHP Code Injection CGI 19414<br />

3163 phpBB < 2.0.20 Multiple Vulnerabilities CGI N/A<br />

3167 Discuz File Extension Validation Weakness Arbitrary File Upload CGI N/A<br />

3168 Dada Mail < 2.10 alpha 1 Archived Message XSS CGI N/A<br />

3169<br />

phpPGAds/phpAdNew < 2.0.6 lib-view-direct.inc.php clientid Parameter<br />

SQL Injection<br />

CGI N/A<br />

3173 Mantis < 0.19.3 Multiple Injection Vulnerabilities CGI N/A<br />

3175 Woltlab Burning Board modcp.php Multiple Parameter SQL Injection CGI N/A<br />

3178 Coppermine Gallery < 1.3.4 displayimage.php HTML Injection CGI N/A<br />

3179 PHP-Kit Multiple SQL Injection Vulnerabilities CGI N/A<br />

3180 RunCMS Multiple SQL Injection Vulnerabilities CGI N/A<br />

3182<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

WebCalendar < 1.0.1 send_reminders.php includedir Parameter Remote<br />

File Inclusion<br />

CGI 19502<br />

3184 Simple PHP Blog (SPHPBlog) < CGI 19516<br />

3185 Gallery < 1.5.3-RC3 EXIF Data XSS CGI 19512<br />

3186 YaPiG EXIF Data Script Injection CGI 19515<br />

3187 PhotoPost < 5.11 PHP Pro EXIF Data XSS CGI 19513<br />

3193 phpMyAdmin < 2.6.4-RC1 Multiple XSS CGI 19519<br />

3194 PHP-Fusion < 6.00.11 Multiple Vulnerabilities CGI N/A<br />

3195 phpLDAPadmin < 0.9.6c Anonymous Bind <strong>Security</strong> Bypass CGI 19546<br />

3198 Simple Machines Forum < 1.0.7 Code Injection CGI N/A<br />

3202 PHPGroupWare < 0.9.16.007 Main Screen Message Script Injection CGI N/A<br />

3204 PBLang Bulletin Board < 4.66z Multiple Vulnerabilities CGI N/A<br />

Family CGI 17


3208 HP OpenView <strong>Network</strong> Node Manager (NNM) Detection CGI N/A<br />

3209 Land Down Under < 802 events.php SQL Injection CGI 19603<br />

3216 PBLang Multiple Vulnerabilities CGI 19594<br />

3220 punBB < 1.2.7 Multiple SQL Injection Vulnerabilities CGI N/A<br />

3223 Twiki rev Parameter Arbitrary Shell Command Execution CGI N/A<br />

3231 vBulletin < 3.0.10 Multiple Vulnerabilities CGI 19760<br />

3234 PHP Advanced Transfer Manager < CGI 19768<br />

3235 PunBB < 1.2.8 Multiple Vulnerabilities CGI 19775<br />

3237 Movable Type < 3.20 Multiple Vulnerabilities CGI N/A<br />

3241 Interchange < 5.2.1 Multiple Injection Vulnerabilities CGI N/A<br />

3242 SEO-Board < 1.03 admin.php user_pass_sha1 Cookie SQL Injection CGI N/A<br />

3244 Brooky CubeCart < 3.0.4 Multiple XSS CGI N/A<br />

3245 PHP-Fusion < 6.00.110 Multiple SQL Injection Vulnerabilities CGI N/A<br />

3246 lucidCMS Login Form Field SQL Injection CGI N/A<br />

3248 IceWarp Web Mail Multiple Vulnerabilities CGI 19782<br />

3252<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

PHPMyAdmin Multiple Script usesubform Parameter Remote File<br />

Inclusion<br />

CGI 19950<br />

3253 WebGUI < 6.7.6 Unspecified Code Execution CGI N/A<br />

3259 Gallery < 2.0.1 main.php Directory Traversal Arbitrary File Access CGI N/A<br />

3260 PunBB < 1.2.9 search.php old_searches Parameter SQL Injection CGI 20013<br />

3264 Splatt Forums < 4.0 Unspecified Authentication Bypass CGI N/A<br />

3265 FlatNuke < 2.5.7 index.php Traversal File Inclusion CGI N/A<br />

3266 Nuked Klan Multiple Modules SQL Injection CGI N/A<br />

3267 PHP-Fusion < 6.00.205 HTML Injection CGI N/A<br />

3269 Flyspray Multiple Vulnerabilities CGI N/A<br />

3271 Snitz Forum < 3.4.0.06 XSS CGI N/A<br />

3272 NTOP < 3.2 ntop.init Temporary File Symlink Arbitrary File Overwrite CGI N/A<br />

3276 XMB Forum < 1.9.8 SP2 SQL Injection CGI N/A<br />

3278 Simple PHP Blog < CGI N/A<br />

3288 IPCop Web Interface Detection CGI N/A<br />

3289 PHPSysInfo < 2.4.0 Multiple Vulnerabilities CGI N/A<br />

3290 phpWebThings download.php file Parameter SQL Injection CGI N/A<br />

3293 Xoops < 2.2.4 Multiple Vulnerabilities CGI N/A<br />

Family CGI 18


3303 WebCalendar < 1.0.2 Multiple Vulnerabilities CGI 20250<br />

3304 Gallery Unspecified Remote Vulnerabilities CGI N/A<br />

3305 Xaraya Directory Traversal Arbitrary File/Directory Manipulation CGI N/A<br />

3319 PHPMyAdmin < 2.7.0 pl1 Global Variable Overwrite CGI N/A<br />

3323<br />

Contenido < 4.6.4 class.inuse.php Multiple Parameter Remote File<br />

Inclusion<br />

CGI N/A<br />

3324 Lyris List Manager < CGI N/A<br />

3327 Blackboard Academic Suite < 7.0 Multiple Vulnerabilities CGI N/A<br />

3328 PHP Support Tickets < 2.1 index.php Multiple Field SQL Injection CGI N/A<br />

3333<br />

PhpGedView PGV_BASE_DIRECTORY Parameter Remote File<br />

Inclusion<br />

CGI 20339<br />

3335 Mantis < 0.19.5 Multiple Unspecified Vulnerabilities CGI N/A<br />

3336 MIMESweeper Detection CGI N/A<br />

3337 Cerberus Help Desk < 2.7.0 Multiple Vulnerabilities CGI N/A<br />

3338 MyBulletinBoard < 1.01 function_upload.php SQL Injection CGI N/A<br />

3339<br />

Web Wiz Multiple Products check_user.asp txtUserName Parameter<br />

SQL Injection<br />

CGI N/A<br />

3340 IBM AIX WebSM Detection CGI N/A<br />

3341 IBM AIX WebSM getCommand.new Local Traversal Vulnerability CGI N/A<br />

3379 ELOG < 2.6.2 Multiple Vulnerabilities CGI 20750<br />

3391 PmWiki < CGI N/A<br />

3397<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Invision Power Board Dragoran Forum < 1.4 index.php site Parameter<br />

SQL Injection<br />

CGI N/A<br />

3417 MyBulletinBoard < 1.04 SQL Injection CGI N/A<br />

3423 RunCMS < 1.3a3 Arbitrary File Upload CGI N/A<br />

3426 LinPHA < CGI 20892<br />

3427 WebGUI < 6.8.6 'Anonymous' Account Creation CGI N/A<br />

3433 dotProject < 2.0.2 Multiple Script Remote File Inclusion CGI 20925<br />

3435 WordPress < 2.0.1 Arbitrary Script Injection CGI N/A<br />

3436 Coppermine Gallery < 1.4.4 Script Injection CGI N/A<br />

3439 Bugzilla Whinedays SQL Injection CGI N/A<br />

3441 SquirrelMail < 1.4.7 Multiple Vulnerabilities CGI 20970<br />

3446 Brooky CubeCart < 3.0.7 connector.php Arbitrary File Upload CGI N/A<br />

3452 Woltlab Burning Board < 2.7.1 Multiple Script SQL Injection CGI N/A<br />

Family CGI 19


3454 vBulletin < 3.5.4 HTML Injection CGI N/A<br />

3457<br />

Gallery < 2.0.3 GalleryUtilities.class X_FORWARDED_FOR HTTP<br />

Header XSS<br />

CGI N/A<br />

3462 Invision Power Board showtopic.php st Parameter SQL Injection CGI N/A<br />

3464<br />

Geeklog lib-sessions.php Session Cookie Handling Administrative<br />

Bypass<br />

CGI N/A<br />

3465 Owl Intranet Engine xrms_file_root Parameter Remote File Inclusion CGI 21025<br />

3472<br />

Gallery < 2.0.4 Watermark Function stepOrder Parameter Local File<br />

Inclusion<br />

CGI 21040<br />

3476 Simple PHP Blog < 0.4.7.2 install05.php Local File Inclusion CGI N/A<br />

3477 Horde < 3.1 go.php url Parameter File Disclosure CGI 21081<br />

3479 PHP iCalendar Local File Inclusion CGI 17129<br />

3488 phpPGAds/phpAdNew < 2.0.8 Multiple Injection Vulnerabilities CGI N/A<br />

3489 GreyMatter gm-upload.cgi Arbitrary File Upload CGI N/A<br />

3490 Horde < 3.1.1 Help Viewer Code Execution CGI 21164<br />

3492 OneOrZero Helpdesk < 1.6.5.3 index.php id Parameter SQL Injection CGI N/A<br />

3500 Policy - Virtual War Gaming Server Detection CGI N/A<br />

3501 BASE < 1.2.4 base_maintenance Authentication Bypass CGI 21174<br />

3507 GNU Mailman < 2.1.8 Multiple Vulnerabilities CGI N/A<br />

3517 Sysinfo Detection CGI N/A<br />

3518 Serendipity < CGI N/A<br />

3519 MyBB < 1.1.1 Multiple Script Variable Overwrite CGI 21239<br />

3520<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Coppermine Photo Gallery < 1.4.5 index.php file Parameter Local File<br />

Inclusion<br />

CGI 21240<br />

3521 Help Center Live < 2.1.0 osTicket Multiple SQL Injection CGI N/A<br />

3526 Limbo CMS < CGI N/A<br />

3528 sBLOG < CGI 21313<br />

3530 CGI:IRC Server Detection CGI N/A<br />

3536 AWStats < 6.6 migrate Variable Command Execution CGI N/A<br />

3558 Nagios Detection CGI N/A<br />

3560 PHP-Fusion < 6.00.307 Local File Inclusion CGI N/A<br />

3561 MyBB < CGI N/A<br />

3622 PHP-Fusion < 6.00.308 SQL Injection CGI N/A<br />

3626 FCKeditor with PHPNuke < 2.3 Beta upload.php Arbitrary File Upload CGI 21573<br />

Family CGI 20


3629<br />

XOOPS < 2.0.9.4 include/common.php nocommon Parameter Local File<br />

Inclusion<br />

CGI 21581<br />

3631 Woltlab Burning Board < 2.3.5 links.php cat Parameter SQL Injection CGI N/A<br />

3633<br />

Nucleus CMS < 3.23 PLUGINADMIN.php DIR_LIBS Parameter<br />

Remote File Inclusion<br />

CGI 21596<br />

3635 Geeklog < 1.4.0sr3 Multiple Injection Vulnerabilities CGI N/A<br />

3639 SquirrelMail < 1.4.8 Local File Inclusion CGI N/A<br />

3641 BASE < 1.2.5 BASE_path Parameter Remote File Inclusion CGI 21611<br />

3647 WordPress < 2.0.3 Arbitrary Code Injection CGI N/A<br />

3649 MyBB < 1.1.3 Multiple Vulnerabilities CGI N/A<br />

3654 Calendarix < CGI N/A<br />

3657 TWiki Privilege Escalation CGI N/A<br />

3663 MyBB < 1.1.4 SQL Injection CGI N/A<br />

3668 BlueDragon < CGI N/A<br />

3669 YaBB SE < CGI N/A<br />

3674 WordPress < 2.0.4 SQL Injection / Cross-site Scripting (XSS) CGI N/A<br />

3677 Geeklog FCKeditor < 1.4.0sr4 Arbitrary File Upload CGI 21780<br />

3678 phpFormGenerator Arbitrary File Upload CGI 21918<br />

3684 SimpleBoard sbp Parameter Remote File Inclusion CGI 22023<br />

3687<br />

Mambo / Joomla Component / Module mosConfig_absolute_path<br />

Parameter Remote File Inclusion<br />

CGI 22049<br />

3688 IceWarp < 5.6.1 lang_settings Parameter Remote File Inclusion CGI 22079<br />

3689 MyBB < 1.1.6 HTTP Header CLIENT-IP Field SQL Injection CGI 22055<br />

3691 X7 Chat Server Detection CGI N/A<br />

3693 OpenCms < 6.2.2 Authentication Bypass CGI N/A<br />

3696 Help Center Live < CGI N/A<br />

3699<br />

Hobbit Monitor < 4.1.2p2 config Command Traversal Arbitrary File<br />

Access<br />

CGI N/A<br />

3729 Owl Intranet Engine < 0.91 Multiple Vulnerabilities CGI 22232<br />

3735<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

phpCOIN < 1.2.4 Multiple Script _CCFG[_PKG_PATH_INCL]<br />

Parameter Remote File Inclusion<br />

CGI N/A<br />

3736 CubeCart < 3.0.13 Multiple Vulnerabilities CGI 22296<br />

3737 Mailman < 2.1.9rc1 Spoofed Log Entry Injection CGI 22307<br />

3739 HP OpenView BBC Service Detection CGI 22318<br />

Family CGI 21


3753<br />

SAP Internet Transaction Server < 6.20 Patch 18 wgate urlmime<br />

Parameter XSS<br />

CGI 22465<br />

3756 phpMyAdmin < 2.9.1 RC1 Multiple Vulnerabilities CGI N/A<br />

3788 ZABBIX Multiple Overflows CGI N/A<br />

3793<br />

Blueshoes GoogleSearch.php APP[path][lib] Parameter Remote File<br />

Inclusion<br />

CGI N/A<br />

3797 Cerberus Helpdesk rpc.php Information Disclosure CGI 22876<br />

3801 Web Wiz Forums forum/search.asp KW Parameter SQL Injection CGI N/A<br />

3803 WordPress < 2.0.5 Multiple Vulnerabilities CGI N/A<br />

3827 Policy - .mp3 / .mp4 File Detection CGI 11419<br />

3828 Policy - .wav File Detection CGI 11419<br />

3835 Serendipity serendipity[charset] Parameter Local File Inclusion CGI 23752<br />

3839 Policy - .ogg File Detection CGI 11419<br />

3840 Policy - .wma File Detection CGI 11419<br />

3845 ThinClientServer < 4.0.2248 Admin Account Creation CGI 23780<br />

3847 Policy - .avi File Detection CGI 11419<br />

3848 Policy - .mpg File Detection CGI 11419<br />

3862<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

JBoss JMX Console DeploymentFileRepository Directory Traversal File<br />

Manipulation<br />

CGI 23843<br />

3865 Policy - .divx File Detection CGI N/A<br />

3869 vBulletin < 3.6.5 .swf ActionScript XSS CGI N/A<br />

3872 Ultimate PHP Board chat/login.php username Parameter Script Injection CGI N/A<br />

3873 WordPress < 2.0.6 template.php file Parameter HTML Injection CGI N/A<br />

3874 phpBB < 2.0.22 Multiple Vulnerabilities CGI N/A<br />

3880 phpMyFAQ < 1.6.8 Multiple Vulnerabilities CGI N/A<br />

3881 WordPress < CGI N/A<br />

3882 PHPMyAdmin < 2.9.2 rc2 Multiple Vulnerabilities CGI N/A<br />

3888 Burning Board search.php boardids Parameter SQL Injection CGI 24223<br />

3890 WordPress < 2.1 Pingback Information Disclosure CGI 24237<br />

3894 Movable Type' Blog < 3.34 XSS CGI N/A<br />

3896 CVSTrac < 2.0.1 Text Output Formatter DoS CGI 24263<br />

3897 WebGUI < 7.3.8 www_purgeList Method Asset Deletion CGI N/A<br />

3900 Geeklog < CGI N/A<br />

Family CGI 22


3923 WebAPP < 0.9.9.6 Multiple Vulnerabilities CGI N/A<br />

3933 WordPress < 2.1.2 Backdoor Vulnerability CGI 24759<br />

3950 Horde < 3.1.4 NLS.php new_lang Parameter XSS CGI 24817<br />

3959<br />

WordPress < 2.1.3 xmlrpc.php mt.setPostCategories Method SQL<br />

Injection<br />

CGI N/A<br />

3967 XAMPP adodb.php mssql_connect Function Overflow CGI N/A<br />

3971<br />

GroupWise < 7.0.0 SP2 WebAccess GWINTER.exe Base64 Decoding<br />

Overflow<br />

CGI N/A<br />

3983 RunCMS < 1.5.2 Build 20070504 SQL Injection CGI N/A<br />

3984 Cubecart < 3.0.16 HTTP Response Splitting CGI N/A<br />

3994 vBulletin < 3.6.7 calendar.php title Parameter Persistent HTML Injection CGI N/A<br />

3995<br />

WordPress < 2.1.4 wp-admin/admin-ajax.php cookie Parameter SQL<br />

Injection<br />

CGI N/A<br />

4002 Cubecart < 3.0.17 cart.inc.php Multiple Parameter SQL Injection CGI N/A<br />

4035 WebGUI < 7.3.14 viewList() Function Authentication Bypass CGI N/A<br />

4076 BASE < 1.3.8 Redirect Authentication Bypass CGI N/A<br />

4078 PBLang < CGI 25444<br />

4087 Invision Power Board < CGI N/A<br />

4097 YaBB SE < CGI N/A<br />

4101<br />

Simple Machines Forum < 1.1.3 PHPSESSIONID Cookie Session<br />

Hijacking<br />

CGI N/A<br />

4111 FuseTalk Multiple XSS Vulnerabilities CGI 25553<br />

4112 FuseTalk txForumID Parameter SQL Injection CGI 25548<br />

4113 Calendarix < CGI 25567<br />

4114 WordPress < 2.2.1 _wp_attached_file Metadata Unrestricted File Upload CGI N/A<br />

4117 Kaspersky Anti-Spam < 3.0.0 [0274] Authentication Bypass CGI N/A<br />

4119<br />

4120<br />

4121<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Vulnerabilities in .NET Framework Could Allow Remote Code<br />

Execution (931212)<br />

Vulnerabilities in .NET Framework Could Allow Remote Code<br />

Execution (931212)<br />

Vulnerabilities in .NET Framework Could Allow Remote Code<br />

Execution (931212)<br />

CGI 25691<br />

CGI 25691<br />

CGI 25691<br />

4128 Microsoft .NET Framework Version Detection CGI N/A<br />

4129 Microsoft ASP.NET Version Detection CGI N/A<br />

4133 SquirrelMail G/PGP Encryption Plugin < CGI N/A<br />

Family CGI 23


4136 paFileDB includes/search.php categories Parameter SQL Injection CGI 25708<br />

4143 MD-Pro < 1.0.82 index.php topicid Parameter SQL Injection CGI N/A<br />

4149 Bandersnatch < CGI N/A<br />

4150<br />

4154<br />

LinPHA include/img_view.class.php < 1.3.2 order Parameter SQL<br />

Injection<br />

Kaspersky Ani-Spam < 3.0.0 [0278] File Permission Weakness Local<br />

Privilege Escalation<br />

CGI 25811<br />

CGI N/A<br />

4162 Help Center Live < 2.1.5 Admin Authentication Bypass CGI N/A<br />

4163 Serendipity < CGI N/A<br />

4191 Bugzilla Multiple Vulnerabilities CGI N/A<br />

4205 Gallery < 2.2.3 Information Disclosure CGI N/A<br />

4213 Plesk Multiple Script PLESKSESSID Cookie SQL Injection CGI N/A<br />

4219 Bugzilla < 3.0.2 / 3.1.2 WebService/User.pm Authentication Bypass CGI N/A<br />

4231 Blackboard Academic Suite < CGI N/A<br />

4250 RunCMS < 1.5.3 Unspecified Vulnerability CGI N/A<br />

4257<br />

4258<br />

Simple Machines Forum < 1.1.4 index.php SMFCookie218 Parameter<br />

SQL Injection<br />

Vanilla Forum < 1.1.4 sortcategories.php CategoryID Parameter SQL<br />

Injection<br />

CGI N/A<br />

CGI N/A<br />

4259 Simple PHP Blog < CGI N/A<br />

4276 Apache-SOAP Administrative Interface Detection CGI N/A<br />

4279 HP Radia Integration Server Version Detection CGI N/A<br />

4283 TestLink < 1.7.1 Authorization Mechanism Failure CGI N/A<br />

4295<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RunCMS include/common.php xoopsOption Parameter Local File<br />

Inclusion<br />

CGI 28291<br />

4304 Plumtree Version Detection CGI N/A<br />

4306 Snitz Forum < 3.4.0.07 active.asp BuildTime Parameter SQL Injection CGI N/A<br />

4315 WebGUI < 7.4.18 Secondary Admin Remote Privilege Escalation CGI N/A<br />

4325 Gallery < 2.2.4 Multiple Vulnerabilities CGI N/A<br />

4326 Mantis < 0.9.5 / 1.1.0 RC5 view.php HTML Injection CGI N/A<br />

4328 CMS Made Simple content_css.php templateid Parameter SQL Injection CGI 29829<br />

4329 Atlassian JIRA < 3.12.1 Multiple Vulnerabilities CGI 29834<br />

4338 Horde Imp < 4.1.6 Multiple Vulnerabilities CGI N/A<br />

4340 Sun Java System Identity Manager Version Detection CGI N/A<br />

Family CGI 24


4341 Sun Java System Identity Manager XSS CGI N/A<br />

4346 MyBB < 1.2.11 forumdisplay.php sortby Parameter Command Execution CGI 29996<br />

4348 BoastMachine < CGI N/A<br />

4351<br />

4352<br />

4353<br />

Coppermine Photo Gallery < 1.4.11 Album Password Cookie SQL<br />

Injection<br />

Citadel < 7.11 makeuserkey Function RCPT TO Command Remote<br />

Overflow<br />

MyBB < 1.2.12 private.php options[disablesmilies] Parameter SQL<br />

Injection<br />

CGI 31137<br />

CGI N/A<br />

CGI N/A<br />

4357 Web Wiz Forums < 9.08 Multiple Script Directory Traversals CGI N/A<br />

4364 WordPress < 2.3.3 XML-RPC Unauthenticated Post Modification CGI N/A<br />

4377 WinIPDS Version Detection CGI N/A<br />

4391 PunBB < 1.2.17 Password Reset Information Disclosure CGI N/A<br />

4397 OSSIM Version Detection CGI N/A<br />

4398 OSSIM < CGI 31133<br />

4399 ListManager < 9.3b / 9.2c / 8.95d Multiple Vulnerabilities CGI 31134<br />

4402 H-Sphere Multiple Unspecified Vulnerabilities CGI N/A<br />

4407 PHPMyAdmin < 2.11.5 SQL Injection CGI N/A<br />

4420 phpList < 2.10.9 Multiple Remote File Inclusion CGI N/A<br />

4454 Sympa < 5.4 Content-Type Header Remote DoS CGI N/A<br />

4455 Sympa Application Detection CGI N/A<br />

4463 Openfire < 3.5.0 Queue Handling Remote DoS CGI 31855<br />

4464<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Coppermine Photo Gallery < 1.4.18 Bridge Wizard Cookie SQL<br />

Injection<br />

CGI 31859<br />

4466 OTRS < 2.1.8 / 2.2.6 SOAP Interface Authentication Bypass CGI 31789<br />

4475 phpBB < 3.0.1 Multiple Information Disclosure Vulnerabilities CGI N/A<br />

4482 WordPress < CGI N/A<br />

4488 WordPress < 2.5.1 Crafted Cookie Authentication Bypass CGI N/A<br />

4489 WebGUI < 7.4.35 Data Form List View Unspecified Vulnerability CGI N/A<br />

4505 Cross-Domain Policy File (crossdomain.xml) Detection CGI 32318<br />

4506 Mantis Cross-Site Request Forgery Vulnerabilities CGI 32324<br />

4510 MercuryBoard < 1.1.6 SQL Injection CGI N/A<br />

4519 Cerberus Helpdesk < Cerberus Helpdesk 4.0 Build 603 CGI N/A<br />

4540 Gallery < 2.2.4 Multiple Vulnerabilities CGI N/A<br />

Family CGI 25


4549 ListManager words Parameter Cross-Site Scripting Vulnerability CGI 33219<br />

4559 WebGUI < 7.5.13 RSS Feed Authentication Bypass CGI N/A<br />

4573 MyBB < 1.2.13 SQL Injection CGI N/A<br />

4574 Simple Machines Forum %lt; 1.1.4 / 1.0.12 SQL Injection CGI N/A<br />

4585 phpBB < 3.0.2 Multiple Information Disclosure Vulnerabilities CGI N/A<br />

4587 WordPress < 2.6 press-this.php XSS CGI N/A<br />

4597 RunCMS < 1.6.2 Multiple Script Remote File Inclusion CGI N/A<br />

4605<br />

Mantis < 1.1.2 account_prefs_update.php language Parameter Traversal<br />

Local File Inclusion<br />

CGI N/A<br />

4613 Coppermine Photo Gallery < 1.4.19 data Cookie Local File Inclusion CGI 33789<br />

4616 Novell iManager Version Detection CGI N/A<br />

4618 Novell iManager < 2.7 SP1 Property Book Pages <strong>Security</strong> Bypass CGI 33867<br />

4619<br />

Gallery < 1.5.8 modules.php phpEx Parameter Traversal Local File<br />

Inclusion<br />

CGI N/A<br />

4626 Sympa < CGI N/A<br />

4627 PHP Live! Helper < 2.1.0 Multiple Vulnerabilities CGI N/A<br />

4636 Kayako SupportSuite Version Detection CGI N/A<br />

4637 Kayako SupportSuite < 3.30.01 Multiple Vulnerabilities CGI 34029<br />

4640 Invision Power Board < CGI N/A<br />

4646<br />

Simple Machines Forum < 1.1.6 Random Number Generator Credentials<br />

Disclosure<br />

CGI N/A<br />

4648 WordPress < 2.6.2 Administrative Password Reset CGI N/A<br />

4649 Trac Version Detection CGI N/A<br />

4655 MyBB < 1.4.1 Multiple Vulnerabilities CGI N/A<br />

4686 Invision Power Board < 2.3.6 index.php name Parameter SQL Injection CGI N/A<br />

4688 MyBB < 1.4.1 Multiple Vulnerabilities CGI N/A<br />

4690 PHP iCalendar < 2.25 Administrative Bypass CGI N/A<br />

4694 Mantis < 1.1.4 HTTPS Session Cookie Secure Flag Weakness CGI N/A<br />

4703<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Simple Machines Forum < 1.1.7 Incomplete BBcode Block <strong>Security</strong><br />

Bypass<br />

CGI N/A<br />

4728 IBM Tivoli Storage Manager Version Detection CGI N/A<br />

4742 Bugzilla quips.cgi Unspecified Crafted Variable <strong>Security</strong> Bypass CGI N/A<br />

4766 vBulletin < 3.7.4 Visitor Messages Add-on HTML Injection CGI N/A<br />

4767 MyBB < 1.4.4 CSRF CGI N/A<br />

Family CGI 26


4773<br />

4775<br />

CMS Made Simple admin/login.php cms_language Cookie Local File<br />

Inclusion<br />

WordPress wp-includes/feed.php self_link() Function Host Header RSS<br />

Feed XSS<br />

CGI 34992<br />

CGI 34994<br />

4780 Twiki < 4.2.4 Multiple Vulnerabilities CGI N/A<br />

4786<br />

4788<br />

PHPMyAdmin < 2.11.9.4 / 3.1.1.0 tbl_structure.php table Parameter<br />

SQL Injection<br />

Moodle < 1.9.4 filter/tex/texed.php pathname Parameter Remote<br />

Command Execution<br />

CGI N/A<br />

CGI 35090<br />

4801 OneOrZero Helpdesk tinfo.php Arbitrary File Upload CGI 35261<br />

4802 SPIP Version Detection CGI N/A<br />

4812 Comersus Cart < 7.099 Remote Password Disclosure CGI N/A<br />

4813 Simple Machines Forum < 1.1.8 Password Reset Function Bypass CGI N/A<br />

4815 Ganglia Web Backend Version Detection CGI N/A<br />

4816 Ganglia Web Backend < 3.0.7 process_path Function Overflow CGI N/A<br />

4835<br />

Horde < 3.3.3 / 3.2.4 Horde_Image::factory driver Argument Local File<br />

Inclusion<br />

CGI 35554<br />

4847 Coppermine < 1.4.20 'img_dir' Arbitrary File Upload CGI N/A<br />

4921 Bugzilla < 3.2.1/3.3.2 Multiple Vulnerabilities CGI N/A<br />

4924 Moodle < 1.9.4 / 1.8.8 / 1.7.7 / 1.6.9 Multiple Vulnerabilities CGI N/A<br />

4925 Openfire < 3.6.3 Multiple Vulnerabilities CGI 35628<br />

4938 Novell GroupWise MTA Web Console Accessible CGI N/A<br />

4951<br />

ZABBIX < 1.6.3 Web Interface locales.php extlang[] Remote Code<br />

Execution<br />

CGI 35787<br />

4953 IBM Tivoli Storage Manager < 5.4.2.6 / 5.5.1.8 Overflow CGI N/A<br />

4954 Nucleus CMS < 3.40 Unspecified Traversal Arbitrary File Access CGI N/A<br />

4959 IBM Tivoli Storage Manager < 5.4.4.1 Overflow CGI N/A<br />

4966 Umbraco Version Detection CGI N/A<br />

4983 Atlassian JIRA < 3.13.3 Multiple Vulnerabilities CGI N/A<br />

4985<br />

phpMyAdmin file_path Parameter Multiple Vulnerabilities<br />

(PMASA-2009-1)<br />

CGI 36083<br />

4989 Policy - .divx File Detection CGI N/A<br />

4997<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

phpMyAdmin < 3.1.3.2 Multiple Code Execution Vulnerabilities<br />

(PMASA-2009-4)<br />

CGI 36171<br />

4999 NTOP < CGI N/A<br />

Family CGI 27


5012 MyBB < 1.4.6 Multiple Vulnerabilities CGI N/A<br />

5016<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

IBM Tivoli Storage Manager < 5.2.5.4/5.3.6.6/5.4.2.7/5.5.2 Multiple<br />

Vulnerabilities<br />

CGI N/A<br />

5018 Openfire < 3.6.4 Arbitrary Password Manipulation CGI N/A<br />

5019 IceWarp Merak WebMail Server < 9.4.2 Multiple Vulnerabilities CGI N/A<br />

5028 Coppermine < 1.4.23 injection CGI N/A<br />

5033 BASE < 1.4.3 XSS CGI N/A<br />

5036 DocuWiki Version Detection CGI N/A<br />

5037 SquirrelMail < 1.4.18 Multiple Vulnerabilities CGI N/A<br />

5039 Simple Machines < 1.1.9 / 2.0.0 RC1 XSS CGI N/A<br />

5078 RT: Request Tracker 'ShowConfigTab' <strong>Security</strong> Bypass CGI N/A<br />

5085 MyBB < 1.4.7 SQL Injection CGI N/A<br />

5086 BASE < 1.2.5 Authentication Bypass CGI N/A<br />

5088 Movable Type < 4.26 Multiple Vulnerabilities CGI N/A<br />

5089 MyBB < 1.4.8 Multiple XSS CGI N/A<br />

5090 FireStats < 1.6.2 SQL Injection Vulnerability CGI N/A<br />

5091 Joomla! < 1.5.12 Multiple Vulnerabilities CGI N/A<br />

5092 Horde Passwd Module < 3.1.1 XSS CGI N/A<br />

5095 Bugzilla < 3.2.4/3.4 RC1 <strong>Security</strong>-Bypass Vulnerability CGI N/A<br />

5096 WordPress < 2.8.1 Multiple Vulnerabilities CGI N/A<br />

5097 MediaWiki 1.14.0/1.15.0 Cross-Site Scripting Vulnerability CGI N/A<br />

5102 Joomla! < 1.5.13 Multiple Vulnerabilities CGI N/A<br />

5105 Snitz Forum < 3.4.0.08 SQL Injection CGI N/A<br />

5106 WordPress < 2.8.2 Multiple Vulnerabilities CGI N/A<br />

5120 WordPress < 2.8.3 Multiple <strong>Security</strong> Bypass Vulnerabilities CGI N/A<br />

5121 Bugzilla < 3.4.1 Information Disclosure CGI N/A<br />

5123 CMS Made Simple < 1.6.3 Local File Include Vulnerability CGI 40551<br />

5126 WordPress < 2.8.4 <strong>Security</strong> Bypass Vulnerability CGI 40578<br />

5131 ViewVC < 1.0.9 Multiple Vulnerabilities CGI N/A<br />

5138 Buildbot < 0.7.11p3 Multiple Cross-site Scripting Vulnerabilities CGI N/A<br />

5144 FlexCMS < 3.0 'CookieUsername' Parameter SQL Injection CGI 40824<br />

5147 SquirrelMail < 1.4.20 Multiple Vulnerabilities CGI N/A<br />

5169 Bugzilla < 3.0.9/3.2.5/3.4.2 Multiple Vulnerabilities CGI N/A<br />

Family CGI 28


5171 Horde < 3.3.4 / 3.3.5 Multiple Vulnerabilities CGI N/A<br />

5177<br />

Best Practical Request Tracker 'Custom Field' HTML Injection<br />

Vulnerability<br />

CGI N/A<br />

5179 MyBB < 1.4.9 Multiple Vulnerabilities CGI N/A<br />

5180 Interchange Search Request Information Disclosure CGI 41056<br />

5206<br />

Symantec <strong>Security</strong>Expressions Audit and Compliance Server Multiple<br />

XSS<br />

CGI 42083<br />

5207 OpenCms Multiple Input Validation Vulnerabilities CGI N/A<br />

5208 Achievo < 1.4.0 Multiple Vulnerabilities CGI N/A<br />

5209 phpMyAdmin < 2.11.9.6 / 3.2.2.1 Multiple Vulnerabilities CGI N/A<br />

5210 MapServer < 4.10.5/5.2.3/5.4.2 Integer Overflow Vulnerability CGI 42262<br />

5211 BASE < 1.4.4 Multiple Vulnerabilities CGI 42264<br />

5233 WordPress < 2.8.6 Multiple Vulnerabilities CGI 42801<br />

5238 Bugzilla < 3.4.4/3.5.2 Information Disclosure Vulnerability CGI N/A<br />

5246 OpenX < 2.8.2 Arbitrary File Upload CGI N/A<br />

5248 RT: Request Tracker Session Fixation Vulnerability CGI 43006<br />

5249 AWStats < 6.95 awredir.pl Redirect CGI 42982<br />

5250 Simple Machines Forum < 1.1.11 Multiple Vulnerabilities CGI N/A<br />

5257 Moodle < 1.8.11 / 1.9.7 Multiple Vulnerabilities CGI N/A<br />

5258 TestLink < 1.8.5 Multiple Vulnerabilities CGI 43101<br />

5260 Invision Power Board < 3.0.5 Multiple Vulnerabilities CGI 43163<br />

5263 Piwik < 0.5 unserialize() PHP Code Execution Vulnerability CGI N/A<br />

5285 OpenX < 2.8.3 Authentication-Bypass CGI 43864<br />

5288 ViewVC < 1.1.3 Multiple Vulnerabilities CGI N/A<br />

5290 Centreon < 2.1.4 <strong>Security</strong> Bypass CGI N/A<br />

5291 phpLDAPadmin < 1.2 Local File Inclusion CGI 43402<br />

5294 Dada Mail < 4.0.2 List Membership Requirement Bypass CGI N/A<br />

5295<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Novell iManager < 2.7 SP3 eDirectory Plugin Buffer Overflow<br />

Vulnerability<br />

CGI N/A<br />

5296 Liferay Portal 'p_p_id' Parameter HTML Injection CGI N/A<br />

5297 Trac < 0.11.6 Multiple Vulnerabilities CGI N/A<br />

5301 Zope 'standard_error_message' Cross-Site Scripting Vulnerability CGI N/A<br />

5302 DokuWiki < DokuWiki Release 2009-12-25 Multiple Vulnerabilities CGI 44059<br />

Family CGI 29


5303 Sun Java System Identity Manager 8.1 Privilege Escalation Vulnerability CGI N/A<br />

5304 phpMyAdmin < 2.11.10 Multiple Vulnerabilities CGI 44324<br />

5324 HP Power Manager < 4.2.10 Multiple Vulnerabilities CGI 44109<br />

5329 SilverStripe < 2.3.5 Cross-site Scripting Vulnerability CGI 44332<br />

5330<br />

Symantec Altiris Notification Server 6.0 < SP3 R12 Static Encryption<br />

Key<br />

CGI 44339<br />

5331 Bugzilla < 3.0.11 / 3.2.6 / 3.4.5 / 3.5.3 Multiple Vulnerabilities CGI 44426<br />

5334 OTRS Core System Multiple Unspecified SQL Injection Vulnerabilities CGI N/A<br />

5344 Sawmill < 7.2.18 Unspecified Cross-Site Scripting Vulnerability CGI N/A<br />

5345 SilverStripe < 2.3.6 Multiple Vulnerabilities CGI 44941<br />

5348 Website Baker < 2.8.1 <strong>Security</strong> Bypass Vulnerability CGI N/A<br />

5350 Symantec IM Manager Multiple Vulnerabilities CGI 45018<br />

5363 eScan Anti-Virus Detection CGI N/A<br />

5365 eGroupWare < 1.6.003 Mutiple Vulnerabilities CGI 45023<br />

5488 Interchange HTTP Response Splitting Vulnerability CGI N/A<br />

5490 Trac < 0.11.7 <strong>Security</strong> Bypass Vulnerability CGI N/A<br />

5501<br />

ViewVC < 1.0.11 / 1.1.5 Regex Search Cross-Site Scripting<br />

Vulnerability<br />

CGI 45406<br />

5504 Moodle < 1.8.12 / 1.9.8 Multiple Vulnerabilities CGI N/A<br />

5506 AjaXplorer < 2.6 Multiple Vulnerabilities CGI 45489<br />

5513 MyBB < 1.4.12 Multiple Vulnerabilities CGI N/A<br />

5518 Joomla! < 1.5.16 Multiple Vulnerabilities CGI N/A<br />

5522 MODx < 1.0.3 Multiple Vulnerabilities CGI 46183<br />

5523<br />

Wing FTP Server < 3.4.1 Multiple Information Disclosure<br />

Vulnerabilities<br />

CGI N/A<br />

5524 Wing FTP Server < 3.4.5 HTTP Request Directory Traversal CGI N/A<br />

5530 CMS Made Simple < 1.7.1 Cross-Site Scripting Vulnerability CGI N/A<br />

5535 Movable Type < 5.02 Multiple Vulnerabilities CGI N/A<br />

5545 PHPGroupWare < 0.9.16.016 Multiple Vulnerabilities CGI N/A<br />

5554 Apache Axis2 < 1.5 'xsd' Parameter Directory Traversal CGI 46741<br />

5568<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

PRTG Traffic Grapher < 6.2.1.963 / 9.2.1.964 Cross-Site Scripting<br />

Vulnerability<br />

CGI 46857<br />

5575 Moodle < 1.8.13 / 1.9.9 Multiple Vulnerabilities CGI N/A<br />

5577 Atlassian JIRA < 4.1.2 Multiple Vulnerabilities CGI 47114<br />

Family CGI 30


5585 Bugzilla < 3.2.7 / 3.4.7 / 3.6.1 Multiple Vulnerabilities CGI 47166<br />

5590 Snare for Windows < 3.1.8 Web Interface Cross-Site Request Forgery CGI N/A<br />

5592 WordPress WP-UserOnline plugin URL HTML Injection Vulnerability CGI N/A<br />

5594 Bugzilla 3.7.x < 3.7.2 Information Disclosure Vulnerability CGI 47748<br />

5598 CMS Made Simple < 1.8.1 Local File Include Vulnerability CGI N/A<br />

5604 Joomla! < 1.5.20 Multiple Vulnerabilities CGI N/A<br />

5611 MapServer < 5.6.4 / 4.10.6 Multiple Vulnerabilities CGI 47861<br />

5612 Axon Virtual PBX < 2.13 /logon Multiple Parameter XSS CGI 42475<br />

5618 Piwik 0.6 < 0.6.4 Remote File Include Vulnerability CGI N/A<br />

5619 Mantis 1.2.x < 1.2.2 Cross-Site Scripting Vulnerability CGI N/A<br />

5627 Bugzilla < 3.2.8 / 3.4.8 / 3.6.2 / 3.7.3 Multiple Vulnerabilities CGI 48316<br />

5629 SquirrelMail < 1.4.21 Multiple Vulnerabilities CGI N/A<br />

5631 Drupal Devel module < 6.x-1.22 Cross-Site Scripting Vulnerability CGI N/A<br />

5632 Drupal OpenID module < 5.x-1.5 Authentication Bypass Vulnerability CGI N/A<br />

5634 Drupal Ubercart Module < 5.x-1.10 / 6.x-2.4 Multiple Vulnerabilities CGI N/A<br />

5636 Drupal FileField Source Module < 6.x-1.2 Arbitrary Code Execution CGI N/A<br />

5643<br />

Drupal CCK "Node Reference" Module < 6.x-2.8 <strong>Security</strong> Bypass<br />

Vulnerability<br />

CGI N/A<br />

5652 phpMyAdmin 3.x < 3.3.6 Cross-Site Scripting Vulnerability CGI N/A<br />

5668 Nagios XI < 2009R1.3B Multiple Unspecified XSS CGI 49775<br />

5671 Syncrify < 2.1 Build 420 Multiple <strong>Security</strong> Bypass Vulnerabilities CGI 49659<br />

5676 Mantis 1.2.x < 1.2.3 Cross-Site Scripting Vulnerability CGI N/A<br />

5700 Bugzilla < 3.2.9 / 3.4.9 / 3.6.3 Multiple Vulnerabilities CGI 50599<br />

5714 FreeNAS < 0.7.2 Revision 5543 Command Execution Vulnerability CGI 50510<br />

5716<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

phpMyAdmin 2.x < 2.11.11.1 / 3.x < 3.3.8.1 Cross-Site Scripting<br />

Vulnerability<br />

CGI N/A<br />

5736 HP Power Manager < 4.3.2 Buffer Overflow Vulnerability CGI 51200<br />

5743 Piwik < 1.1.0 Multiple Vulnerabilities CGI N/A<br />

5744 Bugzilla < 3.2.10 / 3.4.10 / 3.6.4 Multiple Vulnerabilities CGI N/A<br />

5753 HP Performance Insight Detection CGI N/A<br />

5754 HP OpenView Performance Insight Server Backdoor Account CGI 51850<br />

5785 WordPress < 3.0.5 Multiple Vulnerabilities CGI 51939<br />

5797 phpMyAdmin 2.x < 2.11.11.3 / 3.x < 3.3.9.2 SQL Injection Vulnerability CGI N/A<br />

Family CGI 31


(PMASA-2011-2)<br />

5798 MySQL Eventum < 2.3.1 Multiple HTML Injection Vulnerabilities CGI 52054<br />

5859<br />

Liferay Portal < 5.2.3 'exportFileName' File Creation Remote Code<br />

Execution<br />

CGI N/A<br />

5860 Liferay Portal < 6.0.6 Multiple Vulnerabilities CGI N/A<br />

5878 Joomla! 1.6 < 1.6.1 Multiple Vulnerabilities CGI N/A<br />

5879 MyBB < 1.4.15 / 1.6 < 1.6.2 Multiple Vulnerabilities CGI 53288<br />

5880 LizaMoon Malware Detection CGI 29871<br />

5881 Joomla! 1.5 < 1.5.23 Information Disclosure Vulnerability CGI N/A<br />

5893 Joomla! 1.6 < 1.6.2 Multiple Vulnerabilities CGI N/A<br />

5905 HP <strong>Network</strong> Node Manager i (NNMi) Multiple Vulnerabilities CGI N/A<br />

5930 phpMyAdmin 3.3.x < 3.3.10.1 / 3.4.x < 3.4.1 Multiple Vulnerabilities CGI 55023<br />

5952<br />

Movable Type < 4.361 / 5.051 / 5.11 Multiple Unspecified<br />

Vulnerabilities<br />

CGI 55410<br />

5985 phpMyAdmin 3.3.x < 3.3.10.2 / 3.4.x < 3.4.3.1 Multiple Vulnerabilities CGI N/A<br />

5989 Symantec Web Gateway Detection CGI 55627<br />

5990 Symantec Web Gateway login.php Blind SQL Injection (SYM11-001) CGI 55628<br />

5991 Symantec Web Gateway forget.php Blind SQL Injection (SYM11-008) CGI 55629<br />

5995 phpMyAdmin 3.3.x < 3.3.10.3 / 3.4.x < 3.4.3.2 Multiple Vulnerabilities CGI N/A<br />

6026 phpMyAdmin 3.4.x < 3.4.5 Cross-site Scripting (PMASA-2011-14) CGI 56379<br />

6031 Symantec IM Manager < 8.4.18 Multiple Vulnerabilities (SYM11-012) CGI 56378<br />

6045 Joomla! 1.5 < 1.5.24 Information Disclosure Vulnerability CGI N/A<br />

6046 Joomla! 1.7 < 1.7.2 Multiple Information Disclosure Vulnerabilities CGI N/A<br />

6113 HP Managed Printing Administration < 2.6.4 Multiple Vulnerabilities CGI N/A<br />

6398<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Tivoli Provisioning Manager Express for Software Distribution Multiple<br />

SQL Injection Vulnerabilities<br />

CGI 58529<br />

Family CGI 32


Family Database<br />

<strong>PVS</strong><br />

ID<br />

PLUGIN NAME FAMILY NESSUS<br />

ID<br />

1108 SQL Server Cleartext 'sa' Account NULL Password Attempted Login Database N/A<br />

1109 SQL Server Cleartext 'sa' Account 'sa' Password Attempted Login Database N/A<br />

1110 SQL Server Cleartext 'sa' Account 'password' Password Attempted Login Database N/A<br />

1111<br />

SQL Server Cleartext 'sa' Account 'administrator' Password Attempted<br />

Login<br />

Database N/A<br />

1112 SQL Server Cleartext 'sa' Account 'admin' Password Attempted Login Database N/A<br />

1113<br />

1114<br />

1115<br />

SQL Server Cleartext 'admin' Account 'administrator' Password<br />

Attempted Login<br />

SQL Server Cleartext 'admin' Account 'password' Password Attempted<br />

Login<br />

SQL Server Cleartext 'admin' Account 'admin' Password Attempted<br />

Login<br />

Database N/A<br />

Database N/A<br />

Database N/A<br />

1116 SQL Server Cleartext 'probe' Account 'probe' Password Attempted Login Database N/A<br />

1117<br />

SQL Server Cleartext 'probe' Account 'password' Password Attempted<br />

Login<br />

Database N/A<br />

1118 SQL Server Cleartext 'sql' Account 'sql' Password Attempted Login Database N/A<br />

1119 SQL Server Cleartext 'sa' Account 'sql' Password Attempted Login Database N/A<br />

1121 SQL Server Cleartext 'sa' Account 'NULL' Password Authentication Database 10862<br />

1122 SQL Server Cleartext 'sa' Account 'sa' Password Authentication Database 10862<br />

1123 SQL Server Cleartext 'sa' Account 'password' Password Authentication Database 10862<br />

1124<br />

SQL Server Cleartext 'sa' Account 'administrator' Password<br />

Authentication<br />

Database 10862<br />

1125 SQL Server Cleartext 'sa' Account 'admin' Password Authentication Database 10862<br />

1126<br />

SQL Server Cleartext 'admin' Account 'administrator' Password<br />

Authentication<br />

Database 10862<br />

1127 SQL Server Cleartext 'admin' Account 'admin' Password Authentication Database 10862<br />

1128 SQL Server Cleartext 'probe' Account 'probe' Password Authentication Database 10862<br />

1129<br />

SQL Server Cleartext 'probe' Account 'password' Password<br />

Authentication<br />

Database 10862<br />

1130 SQL Server Cleartext 'sql' Account 'sql' Password Authentication Database 10862<br />

1131 SQL Server Cleartext 'sa' Account 'sql' Password Authentication Database 10862<br />

1132<br />

SQL Server Cleartext 'admin' Account 'password' Password<br />

Authentication<br />

Database 10862<br />

Family Database 33


Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

1892 PostgreSQL < 7.2.3 Multiple Vulnerabilities Database 11456<br />

1893 PostgreSQL < 7.2.3 Multiple Vulnerabilities (2) Database 11456<br />

1900 MySQL < 3.23.56 Local Privilege Escalation Database 11378<br />

1908 MySQL < 3.23.55 Double Free() Overflow Database 11299<br />

2000 Firebird Database Detection Database N/A<br />

2001 Potential SQL Injection Vulnerability Detection Database 11139<br />

2002 Potential SQL Injection Vulnerability Detection Database 11139<br />

2003 Potential SQL Injection Vulnerability Detection Database 11139<br />

2129 MySQL Mysqlhotcopy Script Insecure Temporary File Creation Database N/A<br />

2131 SQL Server Detection Database N/A<br />

2252 IBM DB2 Multiple Vulnerabilities Database N/A<br />

2277 Oracle <strong>Security</strong> Alert #68 Database N/A<br />

2334 MySQL < 4.1.5 Bounded Parameter Overflow Database 14831<br />

2349 IBM DB2 < 8.2 Multiple Vulnerabilities (2) Database 15486<br />

2361 MySQL < 3.23.59 Multiple Vulnerabilities (2) Database 15449<br />

2362 MySQL < 4.0.21 Multiple Vulnerabilities (2) Database 15449<br />

2369 MySQL < 4.0.21 Remote FULLTEXT Search DoS Database 15477<br />

2370 MySQL < 4.0.21 Remote GRANT Privilege Escalation Database 15477<br />

2429 AppServ Open Project Remote Insecure Default Password Database N/A<br />

2489 Lotus Domino Default Administration Database Detection Database 10629<br />

2583 PostgreSQL < 8.0.1 Multiple Remote Vulnerabilities Database N/A<br />

2680 Oracle Database Server UTL_FILE Directory Traversal File Access Database 17654<br />

2696 MySQL Multiple Vulnerabilities Database 17313<br />

2822 Oracle Database Multiple Remote Vulnerabilities Database 18034<br />

2840 Oracle Database Multiple Remote Vulnerabilities Database 18034<br />

2876 PostgreSQL < 8.0.3 Incorrect Function Declaration Database 18202<br />

3158 MySQL User-Defined Function init_syms() Overflow Database 19416<br />

3363 PostgreSQL postmaster Connection Saturation DoS Database N/A<br />

3392 PostgreSQL Database Detection Database N/A<br />

3393 Microsoft SQL Server Database Detection Database N/A<br />

3394 MySQL Database Detection Database N/A<br />

3395 Oracle Database Detection Database N/A<br />

Family Database 34


Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

3398 Oracle Database Detection Database N/A<br />

3527 MySQL Remote Overflow and Information Disclosure Vulnerabilities Database N/A<br />

3623 QuickBooks Enterprise Database Server Detection Database N/A<br />

3632 PostgreSQL SQL Injection Database N/A<br />

3652 IBM DB2 < 8.12.0 Multiple DoS Database N/A<br />

3697 MySQL MERGE Table Privilege Escalation Database N/A<br />

3698 IBM DB2 Version Detection Database N/A<br />

3730 Informix Database Detection (Windows) Database 22228<br />

3731 Informix Database Detection (Unix) Database 22228<br />

3798 PostgreSQL Multiple Local DoS Vulnerabilities Database N/A<br />

3901 PostgreSQL Multiple Vulnerabilities Database N/A<br />

3921 IBM DB2 Multiple Local Vulnerabilities Database N/A<br />

3973 PostgreSQL SECURITY DEFINER Functions Local Privilege Escalation Database N/A<br />

3985 MySQL < 5.0.40 IF Query NULL Dereference DoS Database 25198<br />

3993 MySQL < 5.1.18 Multiple Vulnerabilities Database 25242<br />

4115 Ingres Communications Server Detection Database 25572<br />

4146 MySQL < 5.0.45 Multiple Vulnerabilities Database 25759<br />

4187 Cache Database Version Detection Database N/A<br />

4189 Cache Database Version Detection Database N/A<br />

4190 Cache Database Server Redirection Vulnerability Database N/A<br />

4200 EnterpriseDB Advanced Server Version Detection Database N/A<br />

4201 EnterpriseDB Advanced Server < 8.2.4.12 Version Detection Database N/A<br />

4226 Firebird Database Plaintext Password Database N/A<br />

4227 Firebird Database Plaintext Password Database N/A<br />

4228 Firebird Database Version Detection Database N/A<br />

4229 Firebird Database < 2.0.2 Multiple Vulnerabilities Database N/A<br />

4230 Firebird Database Multiple Stack-based Overflows Database N/A<br />

4238 Firebird Database < 2.0.3.12981 'fbserver.exe' Stack Overflow Database N/A<br />

4239 IBM DB2 < 9 FixPak 3 / 8 FixPak 15 Multiple Vulnerabilities Database 25905<br />

4309 MySQL < 5.0.51 RENAME TABLE Symlink System Table Overwrite Database 29251<br />

4312 MySQL Enterprise Server < 5.0.52 Multiple Vulnerabilities Database 29346<br />

4313 MySQL Community Server < 5.1.23 / 6.0.4 Multiple Vulnerabilities Database 29345<br />

Family Database 35


4333 PostgreSQL Multiple Vulnerabilities Database N/A<br />

4336 MaxDB Version Detection Database N/A<br />

4337 SAP DB / MaxDB Cons Program Arbitrary Command Execution Database 29924<br />

4358 DB2 < 8.1 FixPak 16 Multiple Vulnerabilities Database 30153<br />

4416 Versant Object Database Version Detection Database N/A<br />

4423 Informix Dynamic Server Multiple Remote Overflows Database N/A<br />

4449 IBM Solid Database Version Detection Database N/A<br />

4450 IBM Solid Database Version Detection Database 53811<br />

4494 SAP MaxDB Multiple Vulnerabilities Database 32194<br />

4498 MySQL 4.1 < 4.1.24 MyISAM Table Privilege Check Bypass Database 32137<br />

4499<br />

MySQL Enterprise Server 5.0 < 5.0.60 MyISAM Table Privilege Check<br />

Bypass<br />

Database 32138<br />

4511 Firebird Default Credentials Database 32315<br />

4512 Interbase/Firebird Account Detection Database N/A<br />

4513 Interbase Database Version Detection Database N/A<br />

4514 Interbase Database Remote Stack Overflow Database N/A<br />

4536 DB2 < 9 Fix Pack 5 Multiple Vulnerabilities Database 33128<br />

4584 Firebird Database < 2.1.1.17910 Multiple Vulnerabilities Database N/A<br />

4612 DB2 < 9.5 Fix Pack 1 Multiple Vulnerabilities Database 33763<br />

4615 Ingres Database Multiple Local Vulnerabilities Database N/A<br />

4638 DB2 < 9.5 Fix Pack 2 Multiple Vulnerabilities Database 34056<br />

4652 MySQL Empty Binary String DoS Database N/A<br />

4680 DB2 < 8 FixPak 17 Multiple Vulnerabilities Database 34195<br />

4721 DB2 9.1 < Fix Pack 6 Multiple Vulnerabilities Database 34475<br />

4743 MySQL Enterprise Server 5.0 < 5.0.70 Privilege Bypass Database 34727<br />

4926 Microsoft SQL Server Version Detection Database 10674<br />

4927<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Vulnerability in Microsoft SQL Server Could Allow Remote Code<br />

Execution (959420)<br />

Database 35635<br />

4946 MySQL Community Server 5.1 < 5.1.32 XPath Expression DoS Database 35766<br />

4957 PostgreSQL Error Message Conversion Remote DoS Database N/A<br />

4993 Oracle Database Version Detection Database N/A<br />

4994 Oracle Database Client Detection Database N/A<br />

4995 Oracle Database Server Detection Database N/A<br />

Family Database 36


5002 MySQL 6.0 < 6.0.10 XPath Expression DoS Database 36020<br />

5003 MySQL Community Server Version Detection Database N/A<br />

5006 DB2 9.1 < Fix Pack 7 Information Disclosure Database 36216<br />

5043 DB2 9.1 < Fix Pack 7 / 9.5 < Fix Pack 4 Multiple Vulnerabilities Database N/A<br />

5119 IBM DB2 Client Detection Database N/A<br />

5129 Microsoft SQL Client Detection Database N/A<br />

5135 MySQL Database Server Detection Database N/A<br />

5136 MySQL Database Client Detection Database N/A<br />

5148 Sybase SQL-Anywhere Database Server Detection Database N/A<br />

5149 Sybase SQL-Anywhere Database Client Detection Database N/A<br />

5150 Sybase SQL-Anywhere Database Server Default Credentials Database N/A<br />

5155 Sybase ASE (Adaptive Server Enterprise) Database Server Detection Database N/A<br />

5156 Sybase ASE (Adaptive Server Enterprise) Database Client Detection Database N/A<br />

5157<br />

Sybase ASE (Adaptive Server Enterprise) Database Server Default<br />

Credentials<br />

Database N/A<br />

5170 PostgreSQL Multiple Vulnerabilities Database 40947<br />

5181 Firebird Database Client Detection Database N/A<br />

5190 DB2 9.1 < Fix Pack 8 Multiple Vulnerabilities Database 42044<br />

5191 Informix Dynamic Server Long Password Remote Denial of Service Database N/A<br />

5215 Database Client Detection Database N/A<br />

5240 MySQL < 5.1.41 Multiple Vulnerabilities Database 42900<br />

5244 IBM Solid Database < 6.30.0.37 Remote Denial of Service Database 42877<br />

5245 IBM Solid Database < 6.30.0.37 Remote Denial of Service Database 42877<br />

5259 MySQL < 5.0.88 Multiple Vulnerabilities Database 42899<br />

5261<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

PostgreSQL < 8.4.2/8.3.9/8.2.15/8.1.19/8.0.23/7.4.27 Multiple<br />

Vulnerabilities<br />

Database N/A<br />

5262 DB2 9.5 < Fix Pack 5 Unspecified Vulnerabilities Database 43172<br />

5333 MySQL 6.0 < 6.0.9 CREATE TABLE <strong>Security</strong> Bypass Database N/A<br />

5366 DB2 Trace Enabled Database N/A<br />

5367 DB2 Trace Disabled Database N/A<br />

5368 DB2 Suspicious Command Detection Database N/A<br />

5369 DB2 Suspicious Command Detection Database N/A<br />

5370 DB2 Suspicious Command Detection Database N/A<br />

Family Database 37


Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

5371 DB2 Suspicious Command Detection Database N/A<br />

5372 DB2 Suspicious Command Detection Database N/A<br />

5373 DB2 Suspicious Command Detection Database N/A<br />

5374 DB2 Suspicious Command Detection Database N/A<br />

5375 DB2 Suspicious Command Detection Database N/A<br />

5376 DB2 Suspicious Command Detection Database N/A<br />

5377 DB2 Suspicious Command Detection Database N/A<br />

5378 DB2 Suspicious Command Detection Database N/A<br />

5379 DB2 Suspicious Command Detection Database N/A<br />

5380 DB2 Suspicious Command Detection Database N/A<br />

5381 DB2 Suspicious Command Detection Database N/A<br />

5382 DB2 Suspicious Command Detection Database N/A<br />

5383 Microsoft SQL Server Native Auditing Accessed Database N/A<br />

5384 Microsoft SQL Server Native Auditing Enabled Database N/A<br />

5385 Microsoft SQL Server Extended Procedure Detection Database N/A<br />

5386 Microsoft SQL Server Native Auditing Accessed Database N/A<br />

5387 Microsoft SQL Server Suspicious Command Detection Database N/A<br />

5388 Microsoft SQL Server Suspicious Command Detection Database N/A<br />

5389 Microsoft SQL Server Suspicious Command Detection Database N/A<br />

5390 Microsoft SQL Server Suspicious Command Detection Database N/A<br />

5391 Microsoft SQL Server Suspicious Command Detection Database N/A<br />

5392 Microsoft SQL Server Suspicious Command Detection Database N/A<br />

5393 Microsoft SQL Server Suspicious Command Detection Database N/A<br />

5394 Microsoft SQL Server Suspicious Command Detection Database N/A<br />

5395 Microsoft SQL Server Suspicious Command Detection Database N/A<br />

5396 Microsoft SQL Server Suspicious Command Detection Database N/A<br />

5397 Microsoft SQL Server Suspicious Command Detection Database N/A<br />

5398 Microsoft SQL Server Suspicious Command Detection Database N/A<br />

5399 Microsoft SQL Server Suspicious Command Detection Database N/A<br />

5400 Microsoft SQL Server Suspicious Command Detection Database N/A<br />

5401 Microsoft SQL Server Suspicious Command Detection Database N/A<br />

5402 Microsoft SQL Server Suspicious Command Detection Database N/A<br />

Family Database 38


Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

5403 Microsoft SQL Server Suspicious Command Detection Database N/A<br />

5404 MySQL Server Suspicious Command Detection Database N/A<br />

5405 MySQL Server Suspicious Command Detection Database N/A<br />

5406 MySQL Server Suspicious Command Detection Database N/A<br />

5407 MySQL Server Suspicious Command Detection Database N/A<br />

5408 MySQL Server Suspicious Command Detection Database N/A<br />

5409 MySQL Server Suspicious Command Detection Database N/A<br />

5410 MySQL Server Suspicious Command Detection Database N/A<br />

5411 MySQL Server Suspicious Command Detection Database N/A<br />

5412 MySQL Server Suspicious Command Detection Database N/A<br />

5413 MySQL Server Suspicious Command Detection Database N/A<br />

5414 MySQL Server Suspicious Command Detection Database N/A<br />

5415 MySQL Server Suspicious Command Detection Database N/A<br />

5416 MySQL Server Suspicious Command Detection Database N/A<br />

5417 MySQL Server Suspicious Command Detection Database N/A<br />

5418 MySQL Server Suspicious Command Detection Database N/A<br />

5419 MySQL Server Suspicious Command Detection Database N/A<br />

5420 Oracle Server Suspicious Command Detection Database N/A<br />

5421 Oracle Server Suspicious Command Detection Database N/A<br />

5422 Oracle Server Suspicious Command Detection Database N/A<br />

5423 Oracle Server Suspicious Command Detection Database N/A<br />

5424 Oracle Server Suspicious Command Detection Database N/A<br />

5425 Oracle Server Suspicious Command Detection Database N/A<br />

5426 Oracle Server Suspicious Command Detection Database N/A<br />

5427 Oracle Server Suspicious Command Detection Database N/A<br />

5428 Oracle Server Suspicious Command Detection Database N/A<br />

5429 Oracle Server Suspicious Command Detection Database N/A<br />

5430 Oracle Server Suspicious Command Detection Database N/A<br />

5431 Oracle Server Suspicious Command Detection Database N/A<br />

5432 Oracle Server Suspicious Command Detection Database N/A<br />

5433 Oracle Server Suspicious Command Detection Database N/A<br />

5434 Oracle Server Suspicious Command Detection Database N/A<br />

Family Database 39


Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

5435 Oracle Server Suspicious Command Detection Database N/A<br />

5436 Oracle Server Suspicious Command Detection Database N/A<br />

5437 Oracle Server Suspicious Command Detection Database N/A<br />

5438 Oracle Server Suspicious Command Detection Database N/A<br />

5439 Oracle Server Suspicious Command Detection Database N/A<br />

5440 Oracle Server Suspicious Command Detection Database N/A<br />

5441 Oracle Server Suspicious Command Detection Database N/A<br />

5442 Oracle Server Suspicious Command Detection Database N/A<br />

5443 Oracle Server Suspicious Command Detection Database N/A<br />

5444 Oracle Server Suspicious Command Detection Database N/A<br />

5445 Sybase ASE Server Suspicious Command Detection Database N/A<br />

5446 Sybase ASE Server Suspicious Command Detection Database N/A<br />

5447 Sybase ASE Server Suspicious Command Detection Database N/A<br />

5448 Sybase ASE Server Suspicious Command Detection Database N/A<br />

5449 Sybase ASE Server Suspicious Command Detection Database N/A<br />

5450 Sybase ASE Server Suspicious Command Detection Database N/A<br />

5451 Sybase ASE Server Suspicious Command Detection Database N/A<br />

5452 Sybase ASE Server Suspicious Command Detection Database N/A<br />

5453 Sybase ASE Server Suspicious Command Detection Database N/A<br />

5454 Sybase ASE Server Suspicious Command Detection Database N/A<br />

5455 Sybase ASE Server Suspicious Command Detection Database N/A<br />

5456 Sybase ASE Server Suspicious Command Detection Database N/A<br />

5457 Sybase ASE Server Suspicious Command Detection Database N/A<br />

5458 Sybase ASE Server Suspicious Command Detection Database N/A<br />

5459 Sybase ASE Server Suspicious Command Detection Database N/A<br />

5460 Sybase ASE Server Suspicious Command Detection Database N/A<br />

5461 Sybase ASE Server Suspicious Command Detection Database N/A<br />

5462 Sybase SQL Anywhere Server Suspicious Command Detection Database N/A<br />

5463 Sybase SQL Anywhere Server Suspicious Command Detection Database N/A<br />

5464 Sybase SQL Anywhere Server Suspicious Command Detection Database N/A<br />

5465 Sybase SQL Anywhere Server Suspicious Command Detection Database N/A<br />

5466 Sybase SQL Anywhere Server Suspicious Command Detection Database N/A<br />

Family Database 40


5467 Sybase SQL Anywhere Server Suspicious Command Detection Database N/A<br />

5468 Sybase SQL Anywhere Server Suspicious Command Detection Database N/A<br />

5469 Sybase SQL Anywhere Server Suspicious Command Detection Database N/A<br />

5470 Sybase SQL Anywhere Server Suspicious Command Detection Database N/A<br />

5471 Sybase SQL Anywhere Server Suspicious Command Detection Database N/A<br />

5472 Sybase SQL Anywhere Server Suspicious Command Detection Database N/A<br />

5473 Sybase SQL Anywhere Server Suspicious Command Detection Database N/A<br />

5474 Sybase SQL Anywhere Server Suspicious Command Detection Database N/A<br />

5475 Sybase SQL Anywhere Server Suspicious Command Detection Database N/A<br />

5476 Sybase SQL Anywhere Server Suspicious Command Detection Database N/A<br />

5477 Sybase SQL Anywhere Server Suspicious Command Detection Database N/A<br />

5478 DB2 Audited Procedure Accessed Database N/A<br />

5503 CouchDB < 0.11.0 Timing Attack Vulnerability Database 45435<br />

5546<br />

PostgreSQL < 8.4.4/8.3.11/8.2.17/8.1.21/8.0.25/7.4.29 Multiple<br />

Vulnerabilities<br />

Database N/A<br />

5547 MySQL Community Server 5.1 < 5.1.46 Multiple Vulnerabilities Database 46328<br />

5550 Microsoft SQL client Detection (TDS) Database N/A<br />

5551 Microsoft SQL Server Detection (TDS) Database N/A<br />

5552 Database Client Detection Database N/A<br />

5556 DB2 9.7 < Fix Pack 2 Multiple Vulnerabilities Database 46766<br />

5560 MySQL Version Detection Database N/A<br />

5587 MySQL Community Server < 5.1.47 / 5.0.91 Multiple Vulnerabilities Database 46702<br />

5588 MySQL Community Server 5.1 < 5.1.48 Denial of Service Vulnerability Database 47158<br />

5595 Database Client Login Detection Database N/A<br />

5596 Database Client Login Detection Database N/A<br />

5599<br />

IBM Solid Database < 6.5 Service Pack 2 Handshake Request Username<br />

Field Remote Code Execution<br />

Database N/A<br />

5633 MySQL Server Failed Login Detection Database N/A<br />

5642 CouchDB < 0.11.2 Futon Admin Interface Cross-Site Request Forgery Database 48382<br />

5645 Database TDS Failed Login Detection Database N/A<br />

5646<br />

5677<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

MySQL Community Server 5.1 < 5.1.49 Multiple Denial of Service<br />

Vulnerabilities<br />

MySQL Community Server 5.1 < 5.1.51 Multiple Denial of Service<br />

Vulnerabilities<br />

Database 48759<br />

Database 49711<br />

Family Database 41


5707 MaxDB User Login Detection Database N/A<br />

5749 DB2 9.1 < Fix Pack 10 Multiple Vulnerabilities Database 51840<br />

5750 DB2 9.5 < Fix Pack 7 Multiple Vulnerabilities Database 51841<br />

5751 DB2 9.7 < Fix Pack 3 Multiple Vulnerabilities Database 50451<br />

5755 CouchDB < 1.0.2 Cross Site Scripting Issue Database 51923<br />

5757 PostgreSQL < 9.0.3 / 8.4.7 / 8.3.14 / 8.2.20 Code Execution Vulnerability Database N/A<br />

5896 DB2 9.7 < Fix Pack 4 Multiple Vulnerabilities Database 53547<br />

5906<br />

IBM Solid Database < 4.5.182 / 6.0.1069 / 6.3.49 / 6.5.0.4 Denial of<br />

Service Vulnerability<br />

Database 53812<br />

5908 Oracle Database Client Traffic Detection Database N/A<br />

5928<br />

MySQL Community Server 5.1 < 5.1.52 Multiple Denial of Service<br />

Vulnerabilities<br />

Database 50527<br />

6004 Oracle Database Unsupported Version Detection Database 55786<br />

6099 DB2 9.7 < Fix Pack 5 Local Denial of Service Vulnerability Database 56928<br />

6264<br />

MySQL Server 5.1 < 5.1.61 / 5.5 < 5.5.20 Multiple Unspecified<br />

Vulnerabilities<br />

Database 57606<br />

6336 PostgreSQL 8.3.x < 8.3.18 Multiple Vulnerabilities Database N/A<br />

6337 PostgreSQL < 9.1.3 / 9.0.7 / 8.4.11 Multiple Vulnerabilities Database N/A<br />

6340<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

IBM Solid Database 6.5 < 6.5.0.8 Multiple Denial of Service<br />

Vulnerabilities<br />

Database 58105<br />

6347 DB2 9.5 < Fix Pack 9 Multiple Vulnerabilities Database 58293<br />

6491 MySQL Server 5.5 < 5.5.22 Multiple Unspecified Vulnerabilities Database 58661<br />

6515 MySQL Server 5.5 < 5.5.24 Multiple Unspecified Vulnerabilities Database 61393<br />

6516 MySQL Server 5.5 < 5.5.23 Multiple Unspecified Vulnerabilities Database 59967<br />

6609 MySQL Server 5.5.x < Database 62640<br />

6610 MySQL Server 5.5.x < Database 62641<br />

6611 MySQL Server 5.5.x < Database 62642<br />

6653 MySQL Server 5.1 < 5.1.63 Multiple Vulnerabilities Database 61393<br />

6674 MySQL Server 5.5.x < 5.5.29 Multiple Vulnerabilities Database 63618<br />

6675 MySQL Server 5.1.x < 5.1.67 Multiple Vulnerabilities Database 63617<br />

Family Database 42


Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Database 43


Family DNS Servers<br />

<strong>PVS</strong><br />

ID<br />

PLUGIN NAME FAMILY NESSUS<br />

ID<br />

1000 ISC BIND Version 8 Detection<br />

1001 ISC BIND rdataset Parameter Malformed DNS Packet DoS<br />

1002 ISC BIND Multiple DNS Resolver Functions Remote Overflow<br />

1003 ISC BIND Version 9 Detection<br />

1004 ISC BIND < 8.2.3 Multiple Remote Vulnerabilities<br />

1005 ISC BIND < 4.9.2 Multiple Remote Vulnerabilities<br />

1006 ISC BIND < 8.3.4 Multiple Remote Vulnerabilities<br />

1007 ISC BIND < 4.9.7 Inverse-Query Remote Overflow<br />

DNS<br />

Servers<br />

DNS<br />

Servers<br />

DNS<br />

Servers<br />

DNS<br />

Servers<br />

DNS<br />

Servers<br />

DNS<br />

Servers<br />

DNS<br />

Servers<br />

DNS<br />

Servers<br />

1008 ISC BIND < 4.9.5 Multiple DNS Resolver Functions Remote Overflow DNS<br />

Servers<br />

1009 ISC BIND < 8.2.7 Multiple Remote Vulnerabilities<br />

1010 ISC BIND < 8.3.4 Multiple Remote Vulnerabilities<br />

1011 ISC BIND < 4.9.11 Multiple Remote Vulnerabilities<br />

1012 ISC BIND < 8.2.2-P5 Multiple Remote Vulnerabilities<br />

1013 ISC BIND Compressed ZXFR Name Service Query DoS<br />

1014 ISC BIND Version 4 Detection<br />

1015 ISC BIND < 8.1.2 Inverse-Query Remote Overflow<br />

1016 DNS Server Detection<br />

1017 DNS Server Zone Transfer Allowed<br />

DNS<br />

Servers<br />

DNS<br />

Servers<br />

DNS<br />

Servers<br />

DNS<br />

Servers<br />

DNS<br />

Servers<br />

DNS<br />

Servers<br />

DNS<br />

Servers<br />

DNS<br />

Servers<br />

DNS<br />

Servers<br />

10028<br />

11051<br />

11318<br />

10728<br />

10605<br />

10605<br />

10886<br />

10728<br />

11510<br />

11152<br />

11152<br />

11152<br />

10029<br />

10549<br />

10028<br />

10728<br />

11002<br />

10595<br />

Family DNS Servers 44


2556 ISC BIND < 8.4.6 q_usedns Array Remote Overflow DoS<br />

2557 ISC BIND < 8.4.6 dnssec authvalidated Crafted Packet Remote DoS<br />

2771 dnsmasq < 2.21 Multiple Remote Vulnerabilities<br />

2936 Delegate Compressed DNS Packet Remote DoS<br />

3522 DeleGate < 8.11.6 Invalid DNS Response DoS<br />

3523 ISC BIND < 9.3.3 DNS Message Malformed TSIG Remote DoS<br />

3703 Recursive DNS Server Detection<br />

3978<br />

ISC BIND query.c query_addsoa Function Unspecified Recursive<br />

Query DoS<br />

4147 ISC BIND < 9.5.0a6 Multiple Vulnerabilities<br />

4195 ISC BIND < 8.4.7-P1 Outgoing Query Predictable DNS Query ID<br />

4445 SMTP Sender Policy Framework (SPF) Enabled<br />

4578 ISC BIND DNS Query ID Field Prediction Cache Poisoning<br />

4601 DNS Server Source Port 53 Query Usage<br />

4777 PowerDNS Version Detection<br />

5040 NSD packet.c Off-By-One Buffer Overflow<br />

5107 ISC BIND Dynamic Update Message Handling Remote DoS<br />

5243 BIND 9 DNSSEC Query Response Remote Cache Poisoning<br />

5323<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

BIND 9 DNSSEC Bogus NXDOMAIN Response Remote Cache<br />

Poisoning<br />

5601 BIND 9.7.1 < 9.7.1 P2 'RRSIG' Record Type Remote DoS<br />

DNS<br />

Servers<br />

DNS<br />

Servers<br />

DNS<br />

Servers<br />

DNS<br />

Servers<br />

DNS<br />

Servers<br />

DNS<br />

Servers<br />

DNS<br />

Servers<br />

DNS<br />

Servers<br />

DNS<br />

Servers<br />

DNS<br />

Servers<br />

DNS<br />

Servers<br />

DNS<br />

Servers<br />

DNS<br />

Servers<br />

DNS<br />

Servers<br />

DNS<br />

Servers<br />

DNS<br />

Servers<br />

DNS<br />

Servers<br />

DNS<br />

Servers<br />

DNS<br />

Servers<br />

16260<br />

16261<br />

17631<br />

N/A<br />

21293<br />

N/A<br />

10539<br />

25121<br />

N/A<br />

N/A<br />

31658<br />

N/A<br />

N/A<br />

N/A<br />

38850<br />

40422<br />

42983<br />

44116<br />

47760<br />

5673 BIND 9.7 < 9.7.2 P2 Multiple Vulnerabilities DNS 49777<br />

Family DNS Servers 45


5718<br />

5803<br />

5909<br />

BIND 9.4-ESV < 9.4-ESV-R4 / 9.6.2 < 9.6.2-P3, 9.6-ESV <<br />

9.6-ESV-R3 / 9.7.x < 9.7.2-P3 Multiple Vulnerabilities<br />

BIND 9.7.1-9.7.2-P3 IXFR /DDNS Update Combinded with High<br />

Query Rate DoS<br />

Bind9 9.8.0 RRSIG Query Type Remote Denial of Service<br />

Vulnerability<br />

5933 ISC BIND 9 Large RRSIG RRsets Negative Caching Remote DoS<br />

5981<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

ISC BIND Response Policy Zones (RPZ) DNAME / CNAME Parsing<br />

Remote DoS<br />

5982 ISC BIND 9 Unspecified Packet Processing Remote DoS<br />

6093 ISC BIND 9 Query.c Logging Resolver Denial of Service<br />

Servers<br />

DNS<br />

Servers<br />

DNS<br />

Servers<br />

DNS<br />

Servers<br />

DNS<br />

Servers<br />

DNS<br />

Servers<br />

DNS<br />

Servers<br />

DNS<br />

Servers<br />

50976<br />

52158<br />

53842<br />

54923<br />

55533<br />

55534<br />

56862<br />

Family DNS Servers 46


Family Finger<br />

<strong>PVS</strong><br />

ID<br />

PLUGIN NAME FAMILY NESSUS<br />

ID<br />

1276 Finger Service Detection Finger 10069<br />

1277 Finger Service Detection Finger 10069<br />

1278 cfingerd Service Detection Finger 10651<br />

1279 cfingerd < 1.4.4 Multiple Vulnerabilities Finger 10652<br />

1280<br />

Solaris in.fingerd Crafted Request Information<br />

Disclosure<br />

Finger 10788<br />

1281 FreeBSD 4.1.1 Finger Arbitrary File Access Finger 10534<br />

1282 in.fingerd Remote Command Execution Finger 10126<br />

Family Finger 47


Family FTP Servers<br />

<strong>PVS</strong> ID PLUGIN NAME FAMILY<br />

1091 Yak! FTP Server Default Credentials FTP Servers N/A<br />

NESSUS<br />

ID<br />

1147 Crob FTP Server Connection Saturation Remote DoS FTP Servers 12060<br />

1152 smallftpd Crafted RETR Command Remote Overflow DoS FTP Servers 12072<br />

1165 SAMI FTP Server Multiple DoS FTP Servers 12061<br />

1166 Xlight FTP Server < 1.53 RETR Command Remote Overflow FTP Servers 12056<br />

1168<br />

Serv-U FTP Server < 4.2 SITE CHMOD Command Handling<br />

Overflow<br />

FTP Servers 12037<br />

1174 TFTP Server Detection FTP Servers 11819<br />

1175 TYPSoft FTP Server < 1.11 Invalid Path Request DoS FTP Servers 12075<br />

1176<br />

Windows NT FTP Server (WFTP) Pro Server < 3.21 Multiple<br />

Vulnerabilities<br />

FTP Servers 12083<br />

1208 WU-FTPD < 2.6.3 Multiple Vulnerabilities FTP Servers 12098<br />

1803 FTP Server Detection FTP Servers 10092<br />

1804 FTP Server Detection (Port 21) FTP Servers 10092<br />

1805 Eserv FTP Memory Leak DoS FTP Servers 11619<br />

1806 Novell FTP Malformed Input Remote DoS FTP Servers 11614<br />

1807<br />

WU-FTPD < 2.6.0 "SITE NEWER" Command Memory Exhaustion<br />

DoS<br />

FTP Servers 10319<br />

1808 WU-FTPD < 2.6.1 "SITE EXEC" Command Overflow FTP Servers 10452<br />

1809<br />

WU-FTPD < 2.6.2 PASV Command Format String Arbitrary Code<br />

Execution<br />

FTP Servers 11331<br />

1810 WU-FTPD < 2.4.3 Directory Structure Processing Overflow FTP Servers 10318<br />

1811 WU-FTPD < 2.6.1 Glob Command Overflow FTP Servers 11332<br />

1812 WS_FTP < 2.0.3 Multiple Command Long Argument Overflows FTP Servers 11094<br />

1813 WFTP < 2.41 RNTO Command Handling DoS FTP Servers 10466<br />

1814 VXWorks ftpd CEL Command Overflow DoS FTP Servers 11185<br />

1815 SunFTP Directory Traversal / Overflow FTP Servers 11373<br />

1816 WebWeaver FTP RETR Command Remote DoS FTP Servers 11584<br />

1817 Debian proftpd root Privilege Escalation FTP Servers 11450<br />

1818 ProFTPD cwd Command Format String FTP Servers 11407<br />

1819 HP-UX ftpd glob() Expansion STAT Command Remote Overflow FTP Servers 11372<br />

Family FTP Servers 48


Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

1820 Anonymous FTP Detection (login: ftp) FTP Servers N/A<br />

1821 Anonymous FTP Enabled FTP Servers N/A<br />

1822 Anonymous FTP Detection (login: anonymous) FTP Servers N/A<br />

1823 Anonymous FTP Enabled FTP Servers N/A<br />

1824 SmallFTPD < 1.0.3 CWD Command Traversal Directory Listing FTP Servers N/A<br />

1825 Platinum FTP server Multiple Vulnerabilities FTP Servers 11200<br />

1826 NiteServer < 1.85 FTP Server Traversal Directory Listing FTP Servers 11466<br />

1827 AIX FTPd libc Library Remote Overflow FTP Servers 10009<br />

1828 bftpd < 1.0.14 chown Command Overflow FTP Servers 10579<br />

1829 bftpd < 1.0.13 Format String Overflow FTP Servers 10568<br />

1830 War FTP Daemon < 1.66x4 USER/PASS Command Overflow FTP Servers 11207<br />

1831 War FTP Daemon < 1.67b5 Traversal Arbitrary Directory Access FTP Servers 11206<br />

1832 WS_FTP < 3.1.2 SITE CPWD Buffer Overflow FTP Servers 11098<br />

1833 EFTP .lnk File Upload Overflow DoS FTP Servers 10928<br />

1834 EFTP < 2.0.8.348 File Enumeration FTP Servers 10933<br />

1835 FTP Server 'glob' Function Overflow FTP Servers 10648<br />

1836 FTP Server 'glob' Function Overflow FTP Servers 10648<br />

1837 Serv-U < 2.5e CWD Command Path Disclosure FTP Servers 11392<br />

1838 Serv-U < 2.5i CD Command Traversal Directory / File Access FTP Servers 10565<br />

1839 GuildFTPd Directory Traversal Arbitrary File Access FTP Servers N/A<br />

1840 GuildFTPd Traversal Arbitrary File Enumeration FTP Servers 10471<br />

1841 Microsoft IIS FTP Status Request DoS FTP Servers 10934<br />

1842 WarFTPd Multiple Command CPU Consumption DoS FTP Servers 10822<br />

1843 ProFTPd < 1.2.0pre6 mkdir Command Overflow FTP Servers 10189<br />

1844 ProFTPd ASCII Newline Character Overflow FTP Servers 11849<br />

1845 wzdftp < 0.1rc5 Mutliple DoS FTP Servers N/A<br />

1846 Access Point Detection via FTP Server Version FTP Servers 11026<br />

1847 Access Point Detection via FTP Server Version FTP Servers 11026<br />

1848 Access Point Detection via FTP Server Version FTP Servers 11026<br />

1849 War FTP Daemon CWD/MKD Overflow DoS FTP Servers 11205<br />

1850 WU-FTPD Server Detection FTP Servers N/A<br />

1851 Debian ProFTPD Server Detection FTP Servers N/A<br />

Family FTP Servers 49


1852 War FTP Daemon Detection FTP Servers N/A<br />

1853 Serv-U FTP Server Detection FTP Servers N/A<br />

1854<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

TNFTPD Multiple Signal Handler Remote Superuser Privilege<br />

Escalation<br />

FTP Servers N/A<br />

2115 Serv-U FTP Server Default Account FTP Servers N/A<br />

2188 WS_FTP Server < 5.04 Hotfix 1 Path Parsing Remote DoS FTP Servers N/A<br />

2189 WFTPD MLST Command Remote DoS FTP Servers N/A<br />

2190 Titan FTP < 3.30 CWD Remote Heap Overflow FTP Servers N/A<br />

2270 TYPSoft FTP Server Multiple DoS FTP Servers N/A<br />

2275 Serv-U FTP Server < 5.2.0.1 'STOU' Command Remote DoS FTP Servers N/A<br />

2279 TwinFTP < 1.0.3 R3 Server Directory Traversal File Access FTP Servers N/A<br />

2375 Ability FTP Server Remote Buffer Overflow FTP Servers N/A<br />

2377 Hummingbird Inetd FTP Server XCWD Command Remote Overflow FTP Servers N/A<br />

2385 ArGoSoft FTP Server < 1.4.2.2 Shortcut File Upload FTP Servers N/A<br />

2393 ProFTPD < 1.2.11 Remote User Enumeration FTP Servers 15484<br />

2395 SlimFTPd < 3.16 Multiple Command Remote Overfow FTP Servers N/A<br />

2436 WS_FTP Server < 5.04 Multiple Vulnerabilities (2) FTP Servers 15857<br />

2564 WarFTPd < 1.82.00-RC9 CWD Command Remote Overflow FTP Servers 16270<br />

2595 3Com 3CServer FTP Server < 2.0 Remote Overflow FTP Servers N/A<br />

2604 ArGoSoft FTP Server < 1.4.2.8 Shortcut File Extension Filter Bypass FTP Servers 16334<br />

2667 Golden FTP Server < 1.93 USER Remote Overflow FTP Servers N/A<br />

2684 ArGoSoft FTP Server DELE Buffer Overflow FTP Servers N/A<br />

2700 PlatinumFTP Server < 2.0 Remote Format String DoS FTP Servers 17321<br />

2738 FileZilla FTP Server < 0.9.6 Multiple DoS FTP Servers 17593<br />

2746 WU-FTPD FTP Server File Globbing Remote DoS FTP Servers 17602<br />

2802 SurgeFTP < 2.2m2 LEAK Command Remote DoS FTP Servers 18000<br />

2861 NetTerm FTP Server USER Command Remote Overflow FTP Servers 18142<br />

2877 Golden FTP < 2.53 USER Traversal File Access FTP Servers 18194<br />

2941 Hummingbird Inetd Multiple Remote Overflows FTP Servers 18403<br />

2945 CROB FTP Server Multiple Command Remote Overflow DoS FTP Servers N/A<br />

3040 Inframail FTP Server < 7.12 NLST Command Remote Overflow FTP Servers 18587<br />

3045 Golden FTP Server < 2.7.0 Multiple Vulnerabilities FTP Servers 18615<br />

3102 SlimFTPd < 3.17 Multiple Commands Remote Overflow FTP Servers N/A<br />

Family FTP Servers 50


3113 ProFTPD < 1.3.0rc2 Multiple Format Strings FTP Servers 19302<br />

3118 Generic Botnet Client Detection FTP Servers N/A<br />

3165 Zotob Worm Infection FTP Servers 19429<br />

3166 Zotob Worm Infection FTP Servers 19429<br />

3201 SlimFTPd Multiple Command Remote Overflow DoS FTP Servers 19588<br />

3222 FTP Server Detection (Any Port) FTP Servers N/A<br />

3277 Serv-U FTP Server < 6.1.0.4 Malformed Packet Remote DoS FTP Servers N/A<br />

3344 WinProxy < 6.1a Multiple Vulnerabilities FTP Servers 20393<br />

3506<br />

GlobalSCAPE Secure FTP Server < 3.1.4 Build 01.10.2006 Custom<br />

Command Remote DoS<br />

FTP Servers 21188<br />

3529 ArGoSoft FTP Server < 1.4.3.7 RNTO Overflow FTP Servers N/A<br />

3532 FileZilla FTP Server < 0.9.17 MLSD Command Overflow FTP Servers N/A<br />

3533 WarFTP Daemon < 1.82.00-RC11 Remote Overflow FTP Servers N/A<br />

3534 Gene6 FTP Server < 3.8.0.34 Multiple Command Remote Overflows FTP Servers 21324<br />

3535 SAMI FTP Server < FTP Servers N/A<br />

3733 WFTPD < FTP Servers N/A<br />

3799 FtpXQ FTP Server < 3.0.2 Multiple Vulnerabilities FTP Servers N/A<br />

3808<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

WarFTP Daemon < 1.82.00-RC13 Multiple Command Remote Format<br />

Strings<br />

FTP Servers N/A<br />

3836 TNFTPD < 20040811 Globbing Overflow FTP Servers N/A<br />

3861 FileZilla Server < 0.9.22 Multiple Remote DoS FTP Servers 23831<br />

3902 WinProxy < 6.1 R1c HTTP CONNECT Request Overflow FTP Servers 24277<br />

3934 Anomalous FTP Server Detection FTP Servers N/A<br />

3964 FTP Server Detection FTP Servers N/A<br />

3970 ProFTPD < 1.3.0rc4 Multiple Modules Authentication Bypass FTP Servers N/A<br />

4361 WS_FTP Server < 6.1.1 Multiple Vulnerabilities FTP Servers 40771<br />

4624 HP-UX ftpd Remote Privileged Access Authentication Bypass FTP Servers 33899<br />

4629 RhinoSoft Serv-U FTP Server Version Detection FTP Servers N/A<br />

4630 Serv-U < 7.2.0.1 SFTP Directory Creation Logging DoS FTP Servers 33937<br />

4687 ProFTPD Command Truncation Cross-Site Request Forgery FTP Servers 34265<br />

4699 Serv-U < 7.3.0.1 Multiple Remote Vulnerabilities FTP Servers 34398<br />

4713 Titan FTP Server < 6.26 Build 631 SITE WHO Command DoS FTP Servers 34434<br />

4810 Serv-U < 7.4.0.0 Multiple Command Argument Handling DoS FTP Servers 35328<br />

Family FTP Servers 51


4930 ProFTPD Username Variable Substitution SQL Injection FTP Servers 35690<br />

4952 FileZilla < 0.9.31 SSL/TLS Packet Overflow DoS FTP Servers N/A<br />

4979 Serv-U < 8.0.0.1 Multiple Vulnerabilities (DoS, Traversal) FTP Servers 36035<br />

4981 Xlight FTP Server Authentication SQL Injection FTP Servers 36051<br />

5195 Serv-U < 9.0.0.1 Multiple Vulnerabilities FTP Servers 41980<br />

5237 Serv-U < 9.1.0.0 TEA Decoder Remote Stack Buffer Overflow FTP Servers 42934<br />

5282 Serv-U < 9.2.0.1 User Directory Information Disclosure FTP Servers 43369<br />

5300 TurboFTP 'DELE' FTP Command Remote Buffer Overflow FTP Servers 43877<br />

5486 Serv-U < 9.4.0.0 Multiple Vulnerabilities FTP Servers 45140<br />

5622 VxWorks Detection FTP Servers N/A<br />

5635 Serv-U < 10.2.0.0 Multiple Vulnerabilities FTP Servers 48435<br />

5641 QNX Detection FTP Servers N/A<br />

5713 FileCOPA < 6.01.01 Multiple Vulnerabilities FTP Servers 50811<br />

5972 FTP Server Session Initiated FTP Servers N/A<br />

6101<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

ProFTPD < 1.3.3g / 1.3.4 Response Pool Use-After-Free Code<br />

Execution<br />

FTP Servers 56956<br />

6335 IBM iSeries FTP Service Detection FTP Servers N/A<br />

Family FTP Servers 52


Family FTP Clients<br />

<strong>PVS</strong><br />

ID<br />

PLUGIN NAME FAMILY NESSUS<br />

ID<br />

1195 FTP Based ZIP File Download Detection<br />

3375 FTP Client Detection (PORT)<br />

3376 FTP Client Detection (PASV)<br />

3377 FTP Client Detection<br />

3838 Kaspersky Antivirus Client Detection<br />

3841<br />

Kaspersky Antivirus Client MIME-encoded<br />

Scan Bypass<br />

5083 Last Seen FTP Client Name<br />

5702 SmartFTP Directory Traversal Vulnerability<br />

5703 SmartFTP filename Unspecified Vulnerability<br />

5913 FTP Client Data Leakage<br />

5914 FTP Client Data Leakage<br />

5915 FTP Client Data Leakage<br />

5917 FTP Client Data Leakage<br />

5918 FTP Client Data Leakage<br />

5919 FTP Client Data Leakage<br />

5920 FTP Client Data Leakage<br />

5921 FTP Client Data Leakage<br />

5922 FTP Client Data Leakage<br />

FTP<br />

Clients<br />

FTP<br />

Clients<br />

FTP<br />

Clients<br />

FTP<br />

Clients<br />

FTP<br />

Clients<br />

FTP<br />

Clients<br />

FTP<br />

Clients<br />

FTP<br />

Clients<br />

FTP<br />

Clients<br />

FTP<br />

Clients<br />

FTP<br />

Clients<br />

FTP<br />

Clients<br />

FTP<br />

Clients<br />

FTP<br />

Clients<br />

FTP<br />

Clients<br />

FTP<br />

Clients<br />

FTP<br />

Clients<br />

FTP<br />

Clients<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

50575<br />

Family FTP Clients 53<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

5923 FTP Client Data Leakage<br />

5973 FTP Client Session Initiated<br />

6103 FTP File Upload Detection<br />

FTP<br />

Clients<br />

FTP<br />

Clients<br />

FTP<br />

Clients<br />

Family FTP Clients 54<br />

N/A<br />

N/A<br />

N/A


Family Generic<br />

<strong>PVS</strong><br />

ID<br />

PLUGIN NAME FAMILY NESSUS<br />

ID<br />

1106 Internet Key Exchange (IKE) Server Detection Generic 11935<br />

1120 SNMP Version 3 Detection Generic N/A<br />

1137 Symantec Antivirus LiveUpdate Local Privilege Escalation Generic N/A<br />

1142 TrueWeather Application Detection Generic N/A<br />

1144 NTP Server Protocol Version 3 Detection Generic N/A<br />

1145 RADIUS Server Failed Login Detection Generic N/A<br />

1146 NTP Server Protocol Version 1 Detection Generic N/A<br />

1148 NTP Server Protocol Version 3 Detection Generic N/A<br />

1149 NTP Server Protocol Version 2 Detection Generic N/A<br />

1150 NTP Server Protocol Version 1 Detection Generic N/A<br />

1151 NTP Server Protocol Version 2 Detection Generic N/A<br />

1153 Windows RDP / Terminal Services Detection Generic N/A<br />

1154 RIP Router Version 1 Detection Generic N/A<br />

1155 RIP Router Version 2 Detection Generic N/A<br />

1162 Kerberos Version 5 Server Detection Generic 11512<br />

1163 MIT Kerberos 4 Multiple Vulnerabilities Generic 11511<br />

1164 Kerberos Version 5 Server Detection Generic 11512<br />

1170 PPTP Set-Link-Info - Setup of PPTP VPN Channel Detection Generic N/A<br />

1172 LDAP Server NULL Bind Detection Generic 10723<br />

1177 Zebra Routing Software Detection Generic N/A<br />

1178 GHOST UDP <strong>Network</strong> Client Detection Generic N/A<br />

1179 CVS Software Detection Generic N/A<br />

1180<br />

CVS < 1.11.10 / 1.12.3 pserver Crafted Module Request Arbitrary File /<br />

Directory Creation<br />

Generic 11947<br />

1181 CVS pserver CVSROOT Passwd File Arbitrary Code Execution Generic 11970<br />

1182 Witty Worm Detection Generic 11214<br />

1196 BGP Routing Protocol Open Message Detection Generic N/A<br />

1198 Windows Media Service Server Detection Generic N/A<br />

1199 BGP Keep Alive Message Detection Generic N/A<br />

1200 BGP Keep Alive Message Detection Generic N/A<br />

Family Generic 55


1202 Trojan/Backdoor - PhatBOT Detection Generic 12111<br />

1214 Real<strong>Network</strong>s Helix Universal Server < 9.0.3 HTTP GET Request DoS Generic 12210<br />

1216 rsync < 2.6.1 Traversal Arbitrary File Creation Generic 12230<br />

1219 CVS < 1.11.15 / 1.12.7 Client Traversal Arbitrary File Retrieval Generic 12212<br />

1220 CVS < 1.11.16 / 1.12.8 pserver Line Entry Handling Remote Overflow Generic 12240<br />

1222 Winamp Fasttracker 2 Plug-in in_mod.dll Heap Overflow Generic N/A<br />

1223 Winamp b4s File Handling Multiple Malformed Fields Overflow Generic N/A<br />

1224 H323 Application Detection Generic 12243<br />

1225 Winamp Malformed File Name Handling DoS Generic N/A<br />

1226 Subversion (SVN) Software Detection Generic 12259<br />

1227 Subversion (SVN) apr_time_t Data Conversion Remote Overflow Generic 12261<br />

1228 Checkpoint Firewall-1 Version Detection Generic N/A<br />

1879 Password File Obtained by HTTP (GET) Generic N/A<br />

1882 VNC Detection Generic 10342<br />

1886 Apple Airport Administrative Port Credential Encryption Weakness Generic 11620<br />

1887 LeafNode < 1.9.30 Resource Exhaustion DoS Generic N/A<br />

1888 NNTP Server Type and Version Generic 10159<br />

1889 tanned < 0.7.2 Remote Format String Generic 11495<br />

1890 apcupsd Detection Generic N/A<br />

1891 apcupsd Overflow Generic 11484<br />

1895 McAfee ePolicy Orchestrator Remote Format String Generic 11409<br />

1896 rsync Detection Generic 11389<br />

1897 rsync < 2.5.2 Signedness Error Array Overflow Generic 11390<br />

1898 CVS Server Detection Generic N/A<br />

1899<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

CVS < 1.11.5 pserver Directory Request Double Free() Privilege<br />

Escalation<br />

Generic 11385<br />

1901 UUCP Server Detection Generic N/A<br />

1902 Time Server Detection Generic N/A<br />

1903 Telnet Server Detection Generic N/A<br />

1904 Chargen Server Detection Generic N/A<br />

1905 Chargen Server Detection (UDP) Generic N/A<br />

1906 DHCP Server Detection Generic N/A<br />

1907 DHCP Server Multiple Vulnerabilities Generic N/A<br />

Family Generic 56


Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

1922 NetBIOS Name Service Reply Information Disclosure Generic 11830<br />

1923 TLSv1 Negotiation Detection Generic N/A<br />

1924 Citrix Server Detection Generic 10942<br />

1925 Windows Update Traffic Detection Generic N/A<br />

1926 Generic Shell Detection (HP-UX Telnet) Generic N/A<br />

1927 Generic Shell Detection (Linux Telnet) Generic N/A<br />

1928 Generic Shell Detection (HP-UX High Port) Generic N/A<br />

1929 Generic Shell Detection (Cisco Telnet) Generic N/A<br />

1930 Generic Shell Detection (HP JetDirect) Generic N/A<br />

1931 Generic Shell Detection (HP JetDirect) Generic N/A<br />

1932 Generic Shell Detection (SunOS) Generic N/A<br />

1933 Generic Shell Detection (Windows NT Telnet) Generic N/A<br />

1934 Generic Shell Detection (Sys V Telnet) Generic N/A<br />

1935 Generic Shell Detection (Printer Telnet) Generic N/A<br />

1936 Generic Shell Detection (RedHat Telnet) Generic N/A<br />

1937 Generic Shell Detection (AXIS Telnet) Generic N/A<br />

1938 Generic Shell Detection (SCO Telnet) Generic N/A<br />

1939 Generic Shell Detection (Informix UniVerse Telnet) Generic N/A<br />

1940 Generic Shell Detection (AIX Telnet) Generic N/A<br />

1941 Generic Shell Detection (Cisco Telnet) Generic N/A<br />

1942 Generic Shell Detection (MESA Telnet) Generic N/A<br />

1943 Generic Shell Detection (Cisco Catalyst) Generic N/A<br />

1944 Generic Shell Detection (MV/9600) Generic N/A<br />

1945 Citrix MetaFrame Published Application Enumeration Generic 11138<br />

1946 LDAP NULL Base Connection Generic 10722<br />

1947 LDAP Server NULL Bind Connection Information Disclosure Generic 10723<br />

1948 UPNP Traffic Detection Generic 10829<br />

1949 LDAP Server NULL Bind Connection Information Disclosure Generic 10723<br />

1950 UPNP Traffic Detection Generic 10829<br />

1951 Speak Freely Malformed GIF Image Handling DoS Generic N/A<br />

1952 Winamp MIDI Plugin Track Size Overflow Generic N/A<br />

1953 Citrix MetaFrame Service Enumeration Generic 11138<br />

Family Generic 57


Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

1954 LDAP NULL Base Connection Generic 10722<br />

1955 Checkpoint Firewall-1 Detection Generic N/A<br />

1956 Checkpoint Firewall-1 Detection Generic N/A<br />

1957 Checkpoint Firewall-1 Detection Generic N/A<br />

1958 Checkpoint Firewall-1 Detection Generic N/A<br />

1959 Checkpoint Firewall-1 Detection Generic N/A<br />

1960 Checkpoint Firewall-1 Detection Generic N/A<br />

1961 Checkpoint Firewall-1 Detection Generic N/A<br />

1962 Checkpoint Firewall-1 Detection Generic N/A<br />

1963 Generic Shell Detection (Avaya Telnet) Generic N/A<br />

1964 Subversion (SVN) < 1.0.6 Module File Restriction Bypass Generic 13848<br />

1965 Rsync < 2.6.3 Sanitize_path Function Module Path Escaping Generic N/A<br />

2117 Subversion (SVN) < 1.0.3 Remote Buffer Overflow Generic 12261<br />

2151 Winamp < 5.05 .WSZ File Handling Remote Code Execution Generic N/A<br />

2155 CVS history.c File Existence Disclosure Generic 14313<br />

2212 Cisco VPN Concentrator HTML Interface DoS (Bug ID CSCdu15622) Generic 11288<br />

2258 Winamp ActiveX Control Remote Buffer Overflow Generic N/A<br />

2285 Mozilla Error Reporting Version Check Generic N/A<br />

2296 Toshiba Software Auto-Update Detection Generic N/A<br />

2297 Real<strong>Network</strong> RealPlayer Version Detection Generic N/A<br />

2298 Microsoft Winerr Plaintext Report Detection Generic N/A<br />

2313 Host DHCP Address Release Generic N/A<br />

2315 Subversion (SVN) Unreadable Path Metadata Information Disclosure Generic 14800<br />

2320 Generic Shell Detectors (Checkpoint Telnet) Generic N/A<br />

2321 Generic Shell Detectors (Windows 2000 Telnet) Generic N/A<br />

2322 Generic Shell Detectors (3COM SuperStack Telnet) Generic N/A<br />

2323 Identd Service Detection Generic N/A<br />

2324 Identd Service Detection Generic N/A<br />

2325 Identd Service Detection Generic N/A<br />

2326 Identd Service Detection Generic N/A<br />

2353 Symantec Norton Antivirus Detection Generic N/A<br />

2359 Microsoft NNTP Component Remote Overflow (883935) Generic 15465<br />

Family Generic 58


Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

2360 Microsoft NNTP Component Remote Overflow (883935) Generic 15465<br />

2368 MacOS X Application Crash Plaintext Report Generic N/A<br />

2426 Nullsoft Winamp < 5.0.7 IN_CDDA.dll Remote Buffer Overflow Generic N/A<br />

2443 Make Love Not Spam Screen Saver Detection Generic N/A<br />

2455 Nullsoft Winamp Large MP4 / M4A File Remote DoS Generic 15952<br />

2517 HylaFAX < 4.2.1 Remote Access Control Bypass Generic N/A<br />

2525 launch.yahoo.com Streaming Client Detection Generic N/A<br />

2526 Windows Media Player Version Information Generic N/A<br />

2541 Microsoft Anti-Spyware Detection Generic N/A<br />

2548 Cisco IOS Telephony SCCP Control DoS (CSCee08584) Generic 16217<br />

2558 Cisco IOS 12.0 IPv6 Remote DoS Generic N/A<br />

2559 gpsd < 2.8 gpsd_report() Function Remote Format String Generic 16265<br />

2560 gpsd Detection Generic N/A<br />

2561 Juniper Router Detection Generic N/A<br />

2562 Juniper Router JUNOS Remote DoS Generic N/A<br />

2563 Nullsoft Winamp < 5.0.8c IN_CDDA.dll Library Remote Overflow Generic 16152<br />

2574 ngIRCd < 0.8.2 Lists_MakeMask Function Remote Buffer Overflow Generic 16274<br />

2584 Cisco IDS Plaintext Telnet Service Detection Generic N/A<br />

2585 Newspost < 2.0-r1 socket_getline Function Remote Overflow Generic N/A<br />

2591 ngIRCd < 0.8.3 Log_Resolver() Remote Format String Overflow Generic 16310<br />

2601 Microsoft Media Player Version Detection Generic N/A<br />

2602 Microsoft Media Player Version 9 PNG Multiple Vulnerabilities Generic 16328<br />

2605 Policy - RealArcade Gaming Client Detection Generic N/A<br />

2622 BrightStor ARCserve/Enterprise Backup Default Account Generic 16390<br />

2633 Knox Arkeia <strong>Network</strong> Backup Agent Detection Generic 17157<br />

2634 Knox Arkeia <strong>Network</strong> Backup Server Detection Generic N/A<br />

2635 Knox Arkeia Type 77 Request Remote Buffer Overflow Generic 17158<br />

2646 Fedora YUM Updater Detection Generic N/A<br />

2647 Fedora FC3 Yum Updates Detection Generic N/A<br />

2650 IDA Pro Software Detection Generic N/A<br />

2688 CA License Service Multiple Vulnerabilities Generic 17307<br />

2689 CA License Service Client Detection Generic N/A<br />

Family Generic 59


2690 CA License Service Detection Generic N/A<br />

2691 CA License Service Detection Generic N/A<br />

2697 Xerox Document Centre Denial of Service (DoS) Generic 18268<br />

2698 Xerox Document Centre Authentication Bypass Generic 18258<br />

2721 ZoneAlarm < 5.5.062.011 Multiple Vulnerabilities Generic 14726<br />

2722 ZoneAlarm Detection Generic N/A<br />

2759 Media Server Type Detection Generic N/A<br />

2760 Media Server Type (RTP) Detection Generic N/A<br />

2761 Apple QuickTime Streaming Server Detection Generic N/A<br />

2762 Apple QuickTime Server < 4.1.3 Multiple Vulnerabilities Generic N/A<br />

2763<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Apple QuickTime < 4.1.4 Directory Traversal, Denial of Service, and<br />

Script Disclosure Vulnerabilities<br />

Generic N/A<br />

2764 Apple QuickTime Streaming Server < 5.0.3.2 DoS Generic N/A<br />

2781 BayTech RPC3 Telnet Daemon Authentication Bypass Generic 17663<br />

2784 Bakbone NetVault Multiple Vulnerabilities Generic 18257<br />

2786 Windows 2003 (No Service Pack) Multiple Vulnerabilities Generic N/A<br />

2791 TLSv1 Traffic Negotiation Detection Generic N/A<br />

2792 SSLv3 Traffic Negotiation Detection Generic N/A<br />

2795 CA eTRUST IDS Detection Generic N/A<br />

2829 DameWare Remote Desktop Listener Generic N/A<br />

2836 Xerox Document Centre Multiple Remote Vulnerabilities Generic N/A<br />

2838 CVS < 1.12.12 Unspecified Remote Overflow Generic N/A<br />

2863 ZoneAlarm < 5.5.094.000 Undisclosed Vulnerability Generic N/A<br />

2880 Leafnode < 1.11.2 Abrupt Disconnect DoS Generic N/A<br />

2895 Bakbone NetVault < 7.1.1 Unspecified Remote Overflow Generic N/A<br />

2901 Microsoft Media Player Versions 9 and 10 Arbitrary HTML Pop-up Generic N/A<br />

2904 Checkpoint Firewall-1 Patch Level 0 Detection Generic N/A<br />

2905 Checkpoint Firewall-1 Patch Level 1 Detection Generic N/A<br />

2906 Checkpoint Firewall-1 Patch Level 2 through 6 Detection Generic N/A<br />

2907 Checkpoint Firewall-1 NG AI R54 Detection Generic N/A<br />

2908 Checkpoint Firewall-1 NG AI R55 Detection Generic N/A<br />

2909 Checkpoint Firewall-1 NG Patch Level 0 Detection Generic N/A<br />

2910 Checkpoint Firewall-1 NG Patch Level FP1 Detection Generic N/A<br />

Family Generic 60


Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

2911 Checkpoint Firewall-1 NG Patch Level FP2 Detection Generic N/A<br />

2912 Checkpoint Firewall-1 NG Patch Level FP3 Detection Generic N/A<br />

2913 Checkpoint Firewall-1 VPN Detection Generic N/A<br />

2914 VPN Client Detection Generic N/A<br />

2915 VPN Server Detection (over PPTP) Generic N/A<br />

2916 Fortinet VPN Server Detection (over PPTP) Generic N/A<br />

2922 Groove Detection Generic N/A<br />

2923 Groove < 3.1.0 Build 2338 Multiple Vulnerabilities Generic 18355<br />

2924 Cisco IOS VPN Detection Generic N/A<br />

2925 Cisco Unity VPN Detection Generic N/A<br />

2926 SSH Sentinel VPN Detection Generic N/A<br />

2927 SSH Sentinel 1.1 VPN Detection Generic N/A<br />

2928 SSH Sentinel 1.2 VPN Detection Generic N/A<br />

2929 SSH Sentinel 1.3 VPN Detection Generic N/A<br />

2930 SSH Sentinel 1.4.1 VPN Detection Generic N/A<br />

2931 SSH Sentinel 1.4 VPN Detection Generic N/A<br />

2932 Cisco VPN Detection Generic N/A<br />

2948 KAME/racoon VPN Detection Generic N/A<br />

2949 Microsoft Windows 2000 VPN Detection Generic N/A<br />

2950 Netscreen VPN Detection Generic N/A<br />

2951 OpenPGP VPN Detection Generic N/A<br />

2952 SafeNet SoftRemote VPN Detection Generic N/A<br />

3011 Leafnode < 1.11.3 TCP Timeout DoS Generic N/A<br />

3020 Razor-agents < 2.72 Multiple DoS Generic N/A<br />

3022 ZenWorks Detection Generic N/A<br />

3069 Nullsoft Winamp < 5.093 Malformed ID3v2 Tag Overflow Generic 19217<br />

3071 SSH IPSEC Express 1.1.0 VPN Detection Generic N/A<br />

3072 SSH IPSEC Express 1.1.1 VPN Detection Generic N/A<br />

3073 SSH IPSEC Express 1.1.2 VPN Detection Generic N/A<br />

3074 SSH IPSEC Express 1.2.1 VPN Detection Generic N/A<br />

3075 SSH IPSEC Express 1.2.2 VPN Detection Generic N/A<br />

3076 SSH IPSEC Express 2.0.0 VPN Detection Generic N/A<br />

Family Generic 61


Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

3077 SSH IPSEC Express 2.1.0 VPN Detection Generic N/A<br />

3078 SSH IPSEC Express 2.1.1 VPN Detection Generic N/A<br />

3079 SSH IPSEC Express 2.1.2 VPN Detection Generic N/A<br />

3080 SSH IPSEC Express 3.0.0 VPN Detection Generic N/A<br />

3081 SSH IPSEC Express 3.0.1 VPN Detection Generic N/A<br />

3082 SSH IPSEC Express 4.0.0 VPN Detection Generic N/A<br />

3083 SSH IPSEC Express 4.0.1 VPN Detection Generic N/A<br />

3084 SSH IPSEC Express 4.1.0 VPN Detection Generic N/A<br />

3085 SSH IPSEC Express 4.2.0 VPN Detection Generic N/A<br />

3159 Cisco NetFlow Agent Detection Generic N/A<br />

3170 Xerox Document Centre Multiple Unspecified Remote Vulnerabilities Generic N/A<br />

3176 OpenVPN TCP Client Detection Generic N/A<br />

3181 CVS < 1.12.13 Local 'tmp' File Permission Vulnerability Generic N/A<br />

3188 Telnet Detection on High-numbered TCP Port Generic N/A<br />

3189 Telnet Server Detection (High Port) Generic N/A<br />

3190 Linux Telnet Server Detection (High Port) Generic N/A<br />

3191 SysV Telnet Server Detection (High Port) Generic N/A<br />

3192 Informix Telnet Server Detection (High Port) Generic N/A<br />

3210 Kerberos v5 Client with SSH Server Detection Generic N/A<br />

3211 Kerberos v4 Client with SSH Server Detection Generic N/A<br />

3227 ZoneAlarm Personal Firewall < 6.0.667.000 Multiple Vulnerabilities Generic N/A<br />

3228 DSL/CableModem Internet Gateway Detection Generic N/A<br />

3236 HylaFAX < 4.2.2 RC1 xferfaxstats Symlink Arbitrary File Overwrite Generic N/A<br />

3284 Computer Associates Message Queuing Service Buffer Overflow Generic 20173<br />

3306 Symantec pcAnywhere Detection Generic N/A<br />

3307 ZoneAlarm Personal Firewall < 6.1.737.000 Multiple Vulnerabilities Generic N/A<br />

3313 Testing NAT-T RFC VPN Detection Generic N/A<br />

3314 Windows 2000 VPN Detection Generic N/A<br />

3315 Windows 2003 VPN Detection Generic N/A<br />

3316 Windows XP VPN Detection Generic N/A<br />

3334 <strong>Network</strong> Block Device Server Detection Generic 20340<br />

3343 Sophos Control Center Detection Generic N/A<br />

Family Generic 62


3345 HylaFAX < 4.2.4 Multiple Vulnerabilities Generic 20387<br />

3346 TFTP Client Detection Generic N/A<br />

3374 Nokia Intellisync Portable Device Detection Generic N/A<br />

3382 Cisco VPN Concentrator 3000 < 4.7.3 Crafted HTTP Packet DoS Generic N/A<br />

3384 Mercury PH Server Detection Generic N/A<br />

3390 Winamp < 5.13 Malformed Playlist File Handling Overflow Generic 20826<br />

3406 Computer Associates Message Queuing DoS Generic N/A<br />

3407 L2TP VPN Client Detection Generic N/A<br />

3408 L2TP VPN Server Detection Generic N/A<br />

3421 IKE Server Detection Generic N/A<br />

3424 Powerd Detection Generic N/A<br />

3425 Powerd WHATIDO Variable Remote Overflow Generic N/A<br />

3429<br />

3430<br />

Microsoft Windows Media Player Bitmap File Processing Overflow<br />

(911565)<br />

Microsoft Windows Media Player Bitmap File Processing Overflow<br />

(911565)<br />

Generic 20905<br />

Generic 20905<br />

3431 Windows Media Player Bitmap File Processing Overflow (911565) Generic 20905<br />

3445 Winamp < 5.14 .M3U File Handling Buffer Overflow Generic 20826<br />

3459 Retrospect Client for Windows Malformed Packet DoS Generic 20996<br />

3460 Retrospect Client for Windows Malformed Packet DoS Generic 20996<br />

3461 Retrospect Client < 6.5.138 / 7.0.109 Malformed Packet DoS Generic 20996<br />

3493<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

ZoneAlarm < 6.1.744.001 VSMON.exe Path Subversion Local Privilege<br />

Escalation<br />

Generic 21165<br />

3511 Nokia Intellisync Web Portal Detection Generic N/A<br />

3563 Windows XP SP1 VPN Detection Generic N/A<br />

3564 Windows 2003 or XP SP2 VPN Detection Generic N/A<br />

3565 Firewall-1 NGX VPN Detection Generic N/A<br />

3566 SSH IPSEC Express 4.1.1 VPN Detection Generic N/A<br />

3567 SSH IPSEC Express 5.0 VPN Detection Generic N/A<br />

3568 SSH IPSEC Express 5.0.0 VPN Detection Generic N/A<br />

3569 SSH IPSEC Express 5.1.0 VPN Detection Generic N/A<br />

3570 SSH IPSEC Express 5.1.1 VPN Detection Generic N/A<br />

3571 RFC 3947 NAT-T VPN Detection Generic N/A<br />

Family Generic 63


Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

3572 Nortel Contivity VPN Detection Generic N/A<br />

3573 SonicWall VPN Detection Generic N/A<br />

3574 SSH QuickSec 0.9.0 VPN Detection Generic N/A<br />

3575 SSH QuickSec 1.1.0 VPN Detection Generic N/A<br />

3576 SSH QuickSec 1.1.1 VPN Detection Generic N/A<br />

3577 SSH QuickSec 1.1.2 VPN Detection Generic N/A<br />

3578 SSH QuickSec 1.1.3 VPN Detection Generic N/A<br />

3579 MacOS 10.x VPN Detection Generic N/A<br />

3580 StrongSwan 2.2.0 VPN Detection Generic N/A<br />

3581 StrongSwan 2.2.1 VPN Detection Generic N/A<br />

3582 StrongSwan 2.2.2 VPN Detection Generic N/A<br />

3583 StrongSwan 2.3.0 VPN Detection Generic N/A<br />

3584 StrongSwan 2.3.1 VPN Detection Generic N/A<br />

3585 StrongSwan 2.3.2 VPN Detection Generic N/A<br />

3586 StrongSwan 2.4.0 VPN Detection Generic N/A<br />

3587 StrongSwan 2.4.1 VPN Detection Generic N/A<br />

3588 XyXEL ZyWALL Router VPN Detection Generic N/A<br />

3589 Linux FreeS/WAN 2.00 VPN Detection Generic N/A<br />

3590 Linux FreeS/WAN 2.01 VPN Detection Generic N/A<br />

3591 Linux FreeS/WAN 2.02 VPN Detection Generic N/A<br />

3592 Linux FreeS/WAN 2.03 VPN Detection Generic N/A<br />

3593 Linux FreeS/WAN 2.04 VPN Detection Generic N/A<br />

3594 Linux FreeS/WAN 2.05 VPN Detection Generic N/A<br />

3595 Linux FreeS/WAN 2.06 VPN Detection Generic N/A<br />

3596 Openswan 2.2.0 VPN Detection Generic N/A<br />

3597 Openswan 2.3.0 VPN Detection Generic N/A<br />

3598 OpenPGP VPN Detection Generic N/A<br />

3599 FortiGate VPN Detection Generic N/A<br />

3600 Netscreen VPN Detection Generic N/A<br />

3601 Netscreen VPN Detection Generic N/A<br />

3602 Netscreen VPN Detection Generic N/A<br />

3603 Netscreen VPN Detection Generic N/A<br />

Family Generic 64


3604 Netscreen VPN Detection Generic N/A<br />

3605 Netscreen VPN Detection Generic N/A<br />

3606 Netscreen VPN Detection Generic N/A<br />

3607 Netscreen VPN Detection Generic N/A<br />

3608 Netscreen VPN Detection Generic N/A<br />

3609 Netscreen VPN Detection Generic N/A<br />

3610 Netscreen VPN Detection Generic N/A<br />

3611 Netscreen VPN Detection Generic N/A<br />

3612 Avaya VPN Detection Generic N/A<br />

3613 StoneGate VPN Detection Generic N/A<br />

3614 StoneGate VPN Detection Generic N/A<br />

3615 EMC Retrospect Client Packet Handling Overflow Generic 21327<br />

3630 <strong>Network</strong>er Multiple Vulnerabilities Generic N/A<br />

3650 Microsoft Windows Media Player PNG Processing Overflow (917734) Generic N/A<br />

3651<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Microsoft Windows Media Player PBG File Processing Overflow<br />

(917734)<br />

Generic N/A<br />

3658 Winamp < 5.22 MIDI File Handling Overflow Generic N/A<br />

3664 Helix RealServer < 11.1.0.801 Remote Overflow Generic N/A<br />

3666 Nokia Intellisync Web Portal Detection Generic N/A<br />

3667 ZoneAlarm < 6.5.722.000 Multiple Vulnerabilities Generic 21165<br />

3673 OpenOffice.org Detection Generic N/A<br />

3675 F-Secure Scan Evasion Generic N/A<br />

3676 F-Secure Product Detection Generic N/A<br />

3704 Proxy/Firewall Detection Generic N/A<br />

3708 Proxy / Firewall Detection Generic N/A<br />

3709 Firewall / Proxy / NAT Dependency Generic N/A<br />

3710 Firewall / Proxy / NAT Dependency Generic N/A<br />

3711 Firewall / Proxy / NAT Dependency Generic N/A<br />

3712 Firewall / Proxy / NAT dependency Generic N/A<br />

3715 Proxy / Firewall Detection Generic N/A<br />

3716 Firewall / Proxy / NAT Dependency Generic N/A<br />

3717 Firewall / Proxy / NAT Dependency Generic N/A<br />

3718 Firewall / Proxy / NAT Dependency Generic N/A<br />

Family Generic 65


3719 Proxy / Firewall Detection Generic N/A<br />

3720 Firewall / Proxy / NAT Dependency Generic N/A<br />

3721 Firewall / Proxy / NAT Dependency Generic N/A<br />

3722 Firewall / Proxy / NAT Dependency Generic N/A<br />

3727 HP OpenView Storage Data Protector Detection Generic N/A<br />

3728<br />

HP OpenView Storage Data Protector Backup Agent Remote Arbitrary<br />

Command Execution<br />

Generic 22225<br />

3747 Netopia SNMP Password Disclosure Generic N/A<br />

3759 Sun Secure Global Desktop Detection Generic N/A<br />

3760 Sun Secure Global Desktop / Tarantella < 4.20.983 Multiple XSS Generic 22495<br />

3762 SIP Client Detection Generic N/A<br />

3763 SIP Server Detection Generic N/A<br />

3764 Cisco SIP TFTP Server Detection Generic N/A<br />

3767 SIP Server Detection Generic N/A<br />

3768 Asterisk VoIP Server Detection Generic N/A<br />

3789 ZABBIX Client Detection Generic N/A<br />

3795 Skinny Server Detection Generic 22877<br />

3800 Winamp < 5.31 Multiple Heap Overflows Generic N/A<br />

3843 Novell Client Detection Generic N/A<br />

3844 Novell Service Agent Detection Generic N/A<br />

3856 Modicon PLC IO Scan Status Disclosure Generic N/A<br />

3875 Teredo IPv6 Client Detection Generic N/A<br />

3876 Teredo Server Detection Generic 23972<br />

3883 Socks 4 Proxy Detection Generic N/A<br />

3884 Socks 5 Proxy Detection Generic N/A<br />

3885 Microsoft Remoting Client Detection Generic N/A<br />

3886 Microsoft Remoting Client Detection Generic N/A<br />

3911 Mercury LoadRunner Detection Generic N/A<br />

3912 Cisco VPN Server Detection (PPTP) Generic N/A<br />

3919 Catbird Appliance Detection Generic N/A<br />

3953<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Helix Server < 11.1.3.1887 DESCRIBE Request LoadTestPassword Field<br />

Overflow<br />

Generic N/A<br />

3965 Bakbone NetVault < 7.4.0 Unspecified Overflow Generic N/A<br />

Family Generic 66


3968 ZoneAlarm Pro < 7.0.302.000 vsdatant Driver Local DoS Generic N/A<br />

3974 Winamp < 5.34 Malformed 'PLS' File Handling DoS Generic N/A<br />

3976 Winamp < 5.34a MP4 File Handling Overflow Generic N/A<br />

3979 Tivoli Client Detection Generic N/A<br />

3980 Tivoli Server Detection Generic N/A<br />

3986 SNORT Intrusion Detection System (IDS) Detection Generic N/A<br />

3987 Bro Intrusion Detection System (IDS) Detection Generic N/A<br />

3989 Darwin RTSP Server < 5.5.5 Multiple Overflows Generic N/A<br />

3997 Symantec Discovery Client Detection Generic N/A<br />

3998 Symantec Discovery Server Detection Generic N/A<br />

4036 eScan Agent Detection Generic N/A<br />

4069 OpenOffice Version Information Generic N/A<br />

4081 Yahoo! Messenger User Enumeration Generic N/A<br />

4083 GHOST UDP <strong>Network</strong> Client Version Detection Generic N/A<br />

4094 Microsoft Windows Office Version Detection Generic N/A<br />

4098 IMAP User ID Enumeration Generic N/A<br />

4105 SJPhone SIP Client INVITE Transaction Remote DoS Generic N/A<br />

4106 SIP Client Detection Generic N/A<br />

4116 TrendMicro OfficeScan < 8.0.0.1042 Multiple Vulnerabilities Generic N/A<br />

4145 Panda Antivirus Agent Detection Generic N/A<br />

4155 Microsoft Office Version Information Generic N/A<br />

4168<br />

4169<br />

4170<br />

Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution<br />

(940965)<br />

Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution<br />

(940965)<br />

Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution<br />

(940965)<br />

Generic 25882<br />

Generic 25882<br />

Generic 25882<br />

4178 Altiris Client Detection Generic N/A<br />

4179 Altiris Server Detection Generic N/A<br />

4180<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Altiris Deployment Solution < 6.8 SP2 Aclient Log File Viewer Local<br />

Privilege Escalation<br />

Generic 25904<br />

4181 ZoneAlarm Pro < 7.0.362.000 Local Privilege Escalation Generic N/A<br />

4182 EMC Legato <strong>Network</strong>er 'nsrexecd.exe' Overflow Generic N/A<br />

4188 TrendMicro Server Detection Generic N/A<br />

Family Generic 67


4192 Helix Server < 11.1.4 RTSP Command Multiple Requires Overflow Generic 25950<br />

4198 Subversion (SVN) < 1.4.5 Directory Traversal Privilege Escalation Generic N/A<br />

4216 OpenOffice < 2.3 TIFF Parser Multiple Overflows Generic 26064<br />

4222 BrightStore HSM CsAgent Version Detection Generic N/A<br />

4223 DriveLock Agent Version Detection Generic N/A<br />

4224 DriveLock < 5.0.0.314 Agent Version Detection Generic N/A<br />

4240 Magnicomp SysInfo Version Detection Generic N/A<br />

4241 Quintum Technologies VoIP Server Detection Generic N/A<br />

4242 Google Urchin < Generic N/A<br />

4243 Winamp < 5.5 libFLAC Integer Overflow Generic N/A<br />

4244 Avocent KVM Appliance Detection Generic N/A<br />

4264 Cisco HSRP 'Active' Router Detection Generic N/A<br />

4265 Cisco HSRP 'Standby' Router Detection Generic N/A<br />

4267 BEA WebLogic Cluster Server Detection Generic N/A<br />

4269 Altiris AClient < 6.8.380 Multiple Local Vulnerabilities Generic 27596<br />

4271 GIOP Device Detection Generic N/A<br />

4287 VMWare Server Detection Generic N/A<br />

4288 VMWare Server Plaintext Authorization Generic N/A<br />

4289 LIVE555 Media Server < 2007.11.18 DoS Generic N/A<br />

4300 IBM Director Version Detection Generic N/A<br />

4301 IBM Director < Generic N/A<br />

4308 OpenOffice HSQLDB Document Handling Java Code Injection Generic N/A<br />

4316 LDAP Client Anonymous Bind Utilization Generic N/A<br />

4317 LDAP Client Anonymous Bind Utilization Generic N/A<br />

4332<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Vulnerability in SMBv2 Could Allow Remote Code Execution (942624) -<br />

<strong>Network</strong> Check<br />

Generic 29855<br />

4342 netOctopus Agent Detection (UDP) Generic 29930<br />

4343 netOctopus Server Detection (UDP) Generic N/A<br />

4347 Winamp < 5.52 Ultravox Streaming Metadata Parsing Buffer Overflows Generic 29998<br />

4359 MicroTik Router Version Detection Generic N/A<br />

4360 MicroTik Router Version Detection Generic N/A<br />

4382 SHOUTcast Server Service Port Default Password Generic 31098<br />

4387 sapLPD Version Detection Generic N/A<br />

Family Generic 68


4388 SAPlpd < 6.29 Multiple Vulnerabilities Generic 31121<br />

4392 Mobilink Monitor Client Detection Generic N/A<br />

4393 Mobilink Monitor Server Detection Generic N/A<br />

4403 ActivePDF Server Detection Generic N/A<br />

4410 WebSphere MQ Server Detection Generic N/A<br />

4412 Borland StarTeam Server Detection Generic 31355<br />

4413 Perforce Server Version Detection Generic N/A<br />

4414 Perforce Client Detection Generic N/A<br />

4415 Perforce Proxy Server Detection Generic N/A<br />

4419 Altiris AClient < 6.9.164 Multiple Vulnerabilities Generic 31417<br />

4432 F-Secure Multiple Products Unspecified Code Execution Generic N/A<br />

4433 Check for Windows Update Traffic Generic N/A<br />

4437 AFP Server Detection Generic N/A<br />

4438 AFP Server Detection Generic N/A<br />

4439 AFP Client Detection Generic N/A<br />

4474 OpenOffice < 2.4 Multiple Vulnerabilities Generic 31968<br />

4490 Sun Directory Version Detection Generic N/A<br />

4491 Sun Directory < 6.3 bind-dn Remote Privilege Escalation Generic N/A<br />

4495 Novell eDirectory Version Detection Generic N/A<br />

4496 LDAP Version Detection Generic N/A<br />

4502<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Vulnerability in Microsoft Publisher Could Allow Remote Code<br />

Execution (951208)<br />

Generic 32311<br />

4503 Windows Defender Client Detection Generic N/A<br />

4504 Altiris Deployment Solution < 6.9.176 Multiple Vulnerabilities Generic 32323<br />

4516 MDAP Service Detection Generic 32399<br />

4523 Mac OS X < 10.5.3 Generic 32477<br />

4534 CA eTrust SCM Detection Generic N/A<br />

4535 Novell Groupwise Messenger server Generic N/A<br />

4538 OpenOffice < 2.4.1 rtl_allocateMemory Integer Overflow Generic 33129<br />

4563 EMC AlphaStor Library Manager Detection Generic 33280<br />

4564 Mac OS X < 10.5.4 Multiple Vulnerabilities Generic 33281<br />

4581 Sun Jconsole Detection Generic N/A<br />

4583 RMI Registry Detection Generic 22227<br />

Family Generic 69


4586 Java Remote Management Platform Plaintext Password Detection Generic N/A<br />

4596 WinRemotePC Server Detection Generic N/A<br />

4599 EMC Retrospect Backup Client Version Detection Generic N/A<br />

4602 OpenDNS Client Detection Generic N/A<br />

4606 Retrospect Backup Client < Generic 33561<br />

4617 Winamp < 5.541 NowPlaying Unspecified Vulnerability Generic 33820<br />

4639 Sharity Detection Generic N/A<br />

4641 eDirectory < 8.8 SP3 Multiple Vulnerabilities Generic 34221<br />

4643 MicroTik Router < Generic N/A<br />

4644 MicroTik Router < Generic N/A<br />

4670<br />

Trojan/Backdoor - Potential Malicious Microsoft Executable Being<br />

Served<br />

Generic 33950<br />

4682 Mac OS X < 10.5.5 Multiple Vulnerabilities Generic 34211<br />

4684 Trend Micro OfficeScan 'cgiRecvFile.exe' Buffer Overflow Generic 34216<br />

4704 eDirectory < 8.7.3 SP10 FTF1 Multiple Vulnerabilities Generic 34349<br />

4705<br />

Trend Micro OfficeScan < 7.3 Build 3172 Client Traversal Arbitrary File<br />

Access<br />

Generic 34362<br />

4716 DHCP Client Detection Generic N/A<br />

4717 Mac Software Update DNS Query Detection Generic N/A<br />

4718 Mac Software Update DNS Query Detection Generic N/A<br />

4719 Mac Software Update DNS Query Detection Generic N/A<br />

4720 Microsoft Software Update DNS Query Detection Generic N/A<br />

4722 Microsoft Software Update DNS Query Detection Generic N/A<br />

4723 Microsoft Software Update DNS Query Detection Generic N/A<br />

4724 Trend Micro OfficeScan HTTP Request Buffer Overflow Generic 34490<br />

4727 OpenOffice < 2.4.2 WMF and EMF File Handling Buffer Overflows Generic 34510<br />

4750 Yosemite Backup Service Driver Detection Generic 34756<br />

4768 Apple Error Reporting DNS Lookup Generic N/A<br />

4772<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Altiris Deployment Solution Server < 6.9.355 Password Disclosure<br />

(SYM08-020)<br />

Generic 34964<br />

4782 Dovecot ManageSieve Server Detection Generic N/A<br />

4789 Mac OS X < 10.5.6 Multiple Vulnerabilities Generic 35111<br />

4790 Mac OS X < 10.5.6 Multiple Vulnerabilities Generic 35111<br />

Family Generic 70


Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

4803 SSL Certificate Signed Using Weak Hashing Algorithm Generic 35291<br />

4804 SSL Certificate Signed Using Weak Hashing Algorithm Generic 35291<br />

4805 SSL Certificate Signed Using Weak Hashing Algorithm Generic 35291<br />

4818 Fujitsu Systemcast Deployment Server Detection Generic N/A<br />

4931 Media Gateway Control Protocol (MGCP) Server Detection Generic N/A<br />

4933 Media Gateway Control Protocol (MGCP) Client Detection Generic N/A<br />

4934 Sun Java System Directory Server 6.x < 6.3.1 LDAP JDBC Backend DoS Generic 35688<br />

4944 eDirectory < 8.8 SP3 FTF3 iMonitor Crafted HTTP Request Overflow Generic 35760<br />

4955 WINS Server Detection Generic N/A<br />

4962 Cisco Phone Client Detection (SCCP) Generic N/A<br />

4963 Cisco Phone Server Detection (SCCP) Generic 22877<br />

4967 POLICY - OS X Insecure Software Update Transfer Generic N/A<br />

4973 Synergy Protocol Server Detection Generic N/A<br />

4974 Synergy Protocol Client Detection Generic N/A<br />

5023 Mac OS X 10.5 < 10.5.7 Multiple Vulnerabilities Generic 38744<br />

5031 Winamp < 5.552 Buffer Overflow Generic N/A<br />

5050 Cisco IronPort Detection Generic N/A<br />

5051 TACACS Client Detection Generic N/A<br />

5052 TACACS Server Detection Generic N/A<br />

5070 NFS Directory Detection Generic N/A<br />

5071 NFS File Detection Generic N/A<br />

5093 SMTP Client Account Detection Generic N/A<br />

5098 eDirectory < 8.8 SP5 Multiple Vulnerabilities Generic N/A<br />

5118 Apple GarageBand < 5.1 Information Disclosure Generic N/A<br />

5122 Mac OS X 10.5 < 10.5.8 Multiple Vulnerabilities Generic 40502<br />

5139 TortoiseSVN < 1.5.6 / 1.6.0-1.6.3 Multiple Integer Overflows Generic 40620<br />

5140 SVN < 1.5.6 / 1.6.0-1.6.3 Multiple Integer Overflows Generic 40620<br />

5143 Altiris Deployment Solution < 6.9.430 Multiple Vulnerabilities Generic 43828<br />

5145 OpenOffice < 3.1.1 Multiple Vulnerabilities Generic 40826<br />

5153 Windows Media Services Remote Code Execution (MS09-047) Generic 40890<br />

5154 Windows Media Services Version Detection Generic N/A<br />

5162 Mac OS X 10.6 < 10.6.1 Multiple Vulnerabilities Generic 40946<br />

Family Generic 71


5163 MS09-047: Vulnerabilities in Windows Media Format (Windows 2000) Generic 40890<br />

5164<br />

5165<br />

5166<br />

5167<br />

MS09-047: Vulnerabilities in Windows Media Format (Windows Server<br />

2003)<br />

MS09-047: Vulnerabilities in Windows Media Format (Windows XP<br />

32-bit)<br />

MS09-047: Vulnerabilities in Windows Media Format (Windows XP<br />

64-bit)<br />

MS09-047: Vulnerabilities in Windows Media Format (Windows Vista /<br />

Server 2008)<br />

Generic 40890<br />

Generic 40890<br />

Generic 40890<br />

Generic 40890<br />

5213 Windows NETBIOS Workstation Name Detection Generic N/A<br />

5226 eDirectory < 8.8.5 ftf1/8.7.3.10 ftf2 NULL Base DN DoS Generic 42412<br />

5227 Mac OS X 10.6 < 10.6.2 Multiple Vulnerabilities Generic 42434<br />

5228 Avigilon <strong>Security</strong> Camera Detection Generic N/A<br />

5229 IPP Device Detection Generic N/A<br />

5231 Ingenico Point of Sales (POS) Device Detection Generic N/A<br />

5251 eDirectory < 8.8.5.2/8.7.3.10 ftf2 'NDS Verb 0x1' Buffer Overflow Generic 43030<br />

5267 Winamp < 5.57 Multiple Vulnerabilities Generic 43181<br />

5268 Zabbix < 1.6.6 Null Pointer Dereference DoS Generic N/A<br />

5269 Zabbix < 1.6.7 <strong>Security</strong> Bypass Vulnerability Generic 43391<br />

5270 Zabbix < 1.6.8 Multiple Vulnerabilities Generic 44620<br />

5289<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Sun Java System Directory Proxy Server 6.x < 6.3.1 Update 1 Multiple<br />

Vulnerabilities<br />

Generic 43615<br />

5305 Windows-Vista VPN Detection Generic N/A<br />

5306 Dead Peer Detection v1.0 VPN Detection Generic N/A<br />

5307 strongSwan 4.0.5 VPN Detection Generic N/A<br />

5308 strongSwan 4.0.4 VPN Detection Generic N/A<br />

5309 strongSwan 4.0.3 VPN Detection Generic N/A<br />

5310 strongSwan 4.0.2 VPN Detection Generic N/A<br />

5311 strongSwan 4.0.1 VPN Detection Generic N/A<br />

5312 strongSwan 4.0.0 VPN Detection Generic N/A<br />

5313 strongSwan 2.8.0 VPN Detection Generic N/A<br />

5314 strongSwan 2.7.3 VPN Detection Generic N/A<br />

5315 strongSwan 2.7.2 VPN Detection Generic N/A<br />

5316 strongSwan 2.7.1 VPN Detection Generic N/A<br />

Family Generic 72


Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

5317 strongSwan 2.7.0 VPN Detection Generic N/A<br />

5318 Netscreen-14 VPN Detection Generic N/A<br />

5319 Netscreen-15 VPN Detection Generic N/A<br />

5320 Netscreen-16 VPN Detection Generic N/A<br />

5321 Symantec-Raptor-v8.1 VPN Detection Generic N/A<br />

5322 Symantec-Raptor VPN Detection Generic N/A<br />

5326 DNS Client Query Detection Generic N/A<br />

5339 OpenOffice < 3.2 Multiple Vulnerabilities Generic 44597<br />

5341 Novell eDirectory < 8.8 SP5 Patch 3 eMBox SOAP Request DoS Generic 44938<br />

5489 Mac OS X < 10.6.3 Multiple Vulnerabilities Generic 45440<br />

5497 DNS Generic Query Detection Generic N/A<br />

5498 DNS Generic Query Detection Generic N/A<br />

5499 DNS Query Failed Generic N/A<br />

5500 DNS Query Failed Generic N/A<br />

5511 Real<strong>Network</strong>s Helix Server 11.x / 12.x / 13.x Multiple Vulnerabilities Generic 45543<br />

5514 Memcached < 1.4.3 No Newline Memory Consumption DoS Generic 45579<br />

5515 Altiris Deployment Solution < 6.9 SP4 DBManager DoS (SYM10-007) Generic 45592<br />

5519 Zabbix 1.8.x < 1.8.2 'DBCondition' Parameter SQL Injection Generic N/A<br />

5525 Microsoft Media Server Version Detection Generic N/A<br />

5528 X Server Detection Generic N/A<br />

5533 NETBIOS Domain/workgroup Detection Generic N/A<br />

5564 OpenOffice < 3.2.1 Multiple Vulnerabilities Generic 46814<br />

5570 Novell eDirectory < 8.8 SP5 Patch 4 Multiple Vulnerabilities Generic 47022<br />

5571 Mac OS X 10.6 < 10.6.4 Multiple Vulnerabilities Generic 47024<br />

5597 Winamp < 5.58 Multiple Vulnerabilities Generic 47717<br />

5620 SSL Server Certificate Exchange Detection Generic N/A<br />

5621 VxWorks 'debug' Port Detection Generic N/A<br />

5630 Zoiper < 2.24 SIP INVITE Request Remote DoS Generic 48273<br />

5637 QNX Detection Generic N/A<br />

5638 QNX 'debug' Service Detection Generic N/A<br />

5639 QNX qconn Service Detection Generic N/A<br />

5640 QCONN Version Detection Generic N/A<br />

Family Generic 73


Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

5687 XMPP Client Detection Generic N/A<br />

5688 LDAP Server Detection Generic N/A<br />

5689 Winamp < 5.59 Build 3033 Multiple Vulnerabilities Generic 50379<br />

5701 Microsoft Executable in Transit Detection Generic N/A<br />

5705 Mac OS X 10.6 < 10.6.5 Multiple Vulnerabilities Generic 50549<br />

5706 Microsoft Executable in Transit Detection (Client) Generic N/A<br />

5717 Winamp < 5.60 Multiple Vulnerabilities Generic 50846<br />

5726 Winamp < 5.601 MIDI Timestamp Stack Buffer Overflow Generic 51091<br />

5739 Mac OS X 10.6 < 10.6.6 Multiple Vulnerabilities Generic 51423<br />

5741 Rocket Software UniVerse < 10.3.9 Remote Code Execution Vulnerability Generic 51575<br />

5745 OpenOffice < 3.3 Multiple Vulnerabilities Generic 51773<br />

5759 Generic Protocol Detection Generic N/A<br />

5760 Generic Protocol Detection Generic N/A<br />

5761 Generic Protocol Detection Generic N/A<br />

5762 Generic Protocol Detection Generic N/A<br />

5763 Generic Protocol Detection Generic N/A<br />

5764 Generic Protocol Detection Generic N/A<br />

5765 Generic Protocol Detection Generic N/A<br />

5766 Generic Protocol Detection Generic N/A<br />

5767 Generic Protocol Detection Generic N/A<br />

5768 Generic Protocol Detection Generic N/A<br />

5769 Generic Protocol Detection Generic N/A<br />

5770 Generic Protocol Detection Generic N/A<br />

5771 Generic Protocol Detection Generic N/A<br />

5772 Generic Protocol Detection Generic N/A<br />

5773 Generic Protocol Detection Generic N/A<br />

5774 Generic Protocol Detection Generic N/A<br />

5775 Generic Protocol Detection Generic N/A<br />

5776 Generic Protocol Detection Generic N/A<br />

5777 Generic Protocol Detection Generic N/A<br />

5778 Generic Protocol Detection Generic N/A<br />

5779 Lexmark Printer Service Detection Generic N/A<br />

Family Generic 74


5802 Asterisk main/udptl.c Buffer Overflows (AST-2011-002) Generic 52157<br />

5825<br />

Asterisk Multiple Denial of Service Vulnerabilities<br />

(AST-2011-003/AST-2011-004)<br />

Generic 52714<br />

5826 Mac OS X 10.6 < 10.6.7 Multiple Vulnerabilities Generic 52754<br />

5895 TodouVA Proxy Detection Generic 10195<br />

5897 Asterisk Multiple Vulnerabilities (AST-2011-005/AST-2011-006) Generic 53544<br />

5907 Novell File Reporter Agent XML Parsing Remote Code Execution Generic 53536<br />

5926 HP Intelligent Management Center Detection Generic N/A<br />

5927<br />

HP Intelligent Management Center < 5.0 E0101-L02 Multiple<br />

Vulnerabilities<br />

Generic 54999<br />

5934 VNC Detection Generic N/A<br />

5935 Windows RDP / Terminal Services Detection Generic N/A<br />

5938 SSL Client Detection Generic N/A<br />

5939 Asterisk SIP Channel Driver Denial of Service (AST-2011-007) Generic 54971<br />

5954 Windows RDP / Terminal Services Detection Generic N/A<br />

5968 Mac OS X 10.6 < 10.6.8 Multiple Vulnerabilities Generic 55416<br />

5969<br />

Asterisk Multiple Channel Drivers Denial of Service<br />

(AST-2011-008/AST-2011-009/AST-2011-010)<br />

Generic 55457<br />

5977 SSL Client Detection Generic N/A<br />

5983<br />

5984<br />

HP Intelligent Management Center User Access Manager < 5.0 E0101P03<br />

Code Execution Vulnerability<br />

HP Intelligent Management Center Endpoint Admission Defense < 5.0<br />

E0101P03 Code Execution Vulnerability<br />

Generic 55577<br />

Generic 55577<br />

6005 DNS Client Detection Generic N/A<br />

6006 DNS Client Detection Generic N/A<br />

6013 DHCP Client Detection Generic N/A<br />

6014 mDNS Client Queries Generic N/A<br />

6039 Mac OS X 10.7 < 10.7.2 Multiple Vulnerabilities Generic 56480<br />

6043<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Asterisk Remote Crash Vulnerability in SIP Channel Driver<br />

(AST-2011-012)<br />

Generic 56922<br />

6056 Winamp < 5.622 Multiple Vulnerabilities Generic 56681<br />

6057 Novell Messenger Server < 2.2.1 Memory Information Disclosure Generic 56691<br />

6065 VNC Client Session Started Generic N/A<br />

6087 Symantec pcAnywhere Detection Generic N/A<br />

6104 CA eTrust Directory SNMP Packet Parsing Denial of Service Generic 57035<br />

Family Generic 75


6130 Successful Shell Attack Detected - Linux Failed 'cd' Command Generic N/A<br />

6131 Successful Shell Attack Detected - Linux Failed 'cp' Command Generic N/A<br />

6132 Successful Shell Attack Detected - Linux Failed 'su' Command Generic N/A<br />

6133 Successful Shell Attack Detected - FreeBSD Failed 'su' Command Generic N/A<br />

6134 Successful Shell Attack Detected - Unix Failed 'wget' Command Generic N/A<br />

6135 Successful Shell Attack Detected - IRIX 'id' Command Generic N/A<br />

6136 Successful Shell Attack Detected - Linux 'id' Command Generic N/A<br />

6137 Successful Shell Attack Detected - Linux 'ifconfig' Command Generic N/A<br />

6138 Successful Shell Attack Detected - FreeBSD 'ifconfig' Command Generic N/A<br />

6139 Successful Shell Attack Detected - Unix 'ls -a' Command Generic N/A<br />

6140 Successful Shell Attack Detected - Unix 'ls -l' Command Generic N/A<br />

6141 Successful Shell Attack Detected - Linux Failed 'ls' Command Generic N/A<br />

6142 Successful Shell Attack Detected - Linux 'lsof' command Generic N/A<br />

6143<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Successful Shell Attack Detected - Linux 'passwd' Command Changed<br />

Password<br />

Generic N/A<br />

6144 Successful Shell Attack Detected - Linux 'passwd' Command Generic N/A<br />

6145 Successful Shell Attack Detected - Linux 'passwd' Command Generic N/A<br />

6146 Successful Shell Attack Detected - IRIX 'passwd' Command Generic N/A<br />

6147 Successful Shell Attack Detected - Linux 'netstat' Command Generic N/A<br />

6148 Successful Shell Attack Detected - Linux 'ping' Command Generic N/A<br />

6149 Successful Shell Attack Detected - Linux 'ps' Command Generic N/A<br />

6150 Successful Shell Attack Detected - FreeBSD 'ps -aux' Command Generic N/A<br />

6151 Successful Shell Attack Detected - Linux 'rpcinfo' Command Generic N/A<br />

6152 Successful Shell Attack Detected - Linux 'traceroute' Command Generic N/A<br />

6153 Successful Shell Attack Detected - Linux 'w' Command Generic N/A<br />

6154 Successful Shell Attack Detected - IRIX 'w' Command Generic N/A<br />

6155 Successful Shell Attack Detected - FreeBSD 'w' Command Generic N/A<br />

6156 Successful Shell Attack Detected - Linux 'rm' Command Generic N/A<br />

6157 Successful Shell Attack Detected - Unix Failed 'tcpdump' Command Generic N/A<br />

6158 Successful Shell Attack Detected - Unix Failed 'which' Command Generic N/A<br />

6159 Successful Shell Attack Detected - Unix Failed 'which' Command Generic N/A<br />

6160 Successful Shell Attack Detected - Unix SSH Initial Connetion Detection Generic N/A<br />

6161 Successful Shell Attack Detected - Unix Failed 'lynx' Command Generic N/A<br />

Family Generic 76


Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

6162 Successful Shell Attack Detected - Unix 'wget' File Download Generic N/A<br />

6163 Successful Shell Attack Detected - 'nmap' Tool Generic N/A<br />

6164 Successful Shell Attack Detected - Linux 'netstat -rn' Command Generic N/A<br />

6165 Successful Shell Attack Detected - FreeBSD 'netstat -rn' Command Generic N/A<br />

6166 Successful Shell Attack Detected - FreeBSD 'netstat' Command Generic N/A<br />

6167 Successful Shell Attack Detected - Linux 'nslookup' Command Generic N/A<br />

6168 Successful Shell Attack Detected - Unix 'hping2' Tool Generic N/A<br />

6169 Successful Shell Attack Detected - Unix 'hping2' Tool Generic N/A<br />

6170 Successful Shell Attack Detected - Unix 'hping2' Tool (Listen Mode) Generic N/A<br />

6171 Successful Shell Attack Detected - Unix 'date' Command Generic N/A<br />

6172 Successful Shell Attack Detected - Unix 'route' Command Generic N/A<br />

6173 Successful Shell Attack Detected - Unix 'snort' Tool Generic N/A<br />

6174 Successful Shell Attack Detected - Unix 'ngrep' Command Generic N/A<br />

6175 Successful Shell Attack Detected - Unix 'tethereal' Tool Generic N/A<br />

6176 Successful Shell Attack Detected - Unix 'history' Command Generic N/A<br />

6177 Successful Shell Attack Detected - Windows 'copy' Command Generic N/A<br />

6178 Successful Shell Attack Detected - Windows Failed 'cd' Command Generic N/A<br />

6179 Successful Shell Attack Detected - Windows Unknown Shell Command Generic N/A<br />

6180 Successful Shell Attack Detected - Windows 'dir' Command Execution Generic N/A<br />

6181 Successful Shell Attack Detected - Windows 'netstat' Command Generic N/A<br />

6182 Successful Shell Attack Detected - Windows 'net view' Command Generic N/A<br />

6183 Successful Shell Attack Detected - Windows 'net share' Command Generic N/A<br />

6184 Successful Shell Attack Detected - 'nslookup' Command Generic N/A<br />

6185 Successful Shell Attack Detected - Windows 'tftp' Command Generic N/A<br />

6186 Successful Shell Attack Detected - Windows 'nbtstat' Command Generic N/A<br />

6187 Successful Shell Attack Detected - Windows 'net user' Command Generic N/A<br />

6188 Successful Shell Attack Detected - Windows 'date' Command Generic N/A<br />

6189 Successful Shell Attack Detected - Windows 'time' Command Generic N/A<br />

6190 Successful Shell Attack Detected - Windows 'Fport' Command Generic N/A<br />

6191 Successful Shell Attack Detected - Windows 'PsList' Command Generic N/A<br />

6192 Successful Shell Attack Detected - Windows 'arp -a' Command Generic N/A<br />

6193 Successful Shell Attack Detected - 'ftp' Command Generic N/A<br />

Family Generic 77


6194 Successful Shell Attack Detected - Windows 'ipconfi' Command Generic N/A<br />

6195 Successful Shell Attack Detected - Windows 'route print' Command Generic N/A<br />

6196 Successful Shell Attack Detected - Windows 'route print' Command Generic N/A<br />

6197 Successful Shell Attack Detected - Windows 'ping' Command Generic N/A<br />

6198 Successful Shell Attack Detected - Windows 'net user' Command Generic N/A<br />

6199 Successful Shell Attack Detected - Windows 'tsgrinder.exe' Tool Generic N/A<br />

6200 Successful Shell Attack Detected - Windows 'fscan' Tool Generic N/A<br />

6201 Successful Shell Attack Detected - Windows 'net use' Command Generic N/A<br />

6202 Successful Shell Attack Detected - Cisco 'show privilege' Command Generic N/A<br />

6203 Successful Shell Attack Detected - Cisco 'show version' Command Generic N/A<br />

6204 Successful Shell Attack Detected - Cisco 'show ip bgp' Command Generic N/A<br />

6205 Successful Shell Attack Detected - Cisco 'show version' Command Generic N/A<br />

6206 Successful Shell Attack Detected - Cisco 'show proc' Command Generic N/A<br />

6207 Successful Shell Attack Detected - Cisco 'show access-list' Command Generic N/A<br />

6208<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Successful Shell Attack Detected - Cisco 'show mac-address-table'<br />

Command<br />

Generic N/A<br />

6209 Successful Shell Attack Detected - Cisco 'show running-config' Command Generic N/A<br />

6210 Successful Shell Attack Detected - Cisco 'show ip interface' Command Generic N/A<br />

6211 Finger Attack - Successful Finger Query to Multiple Users Generic N/A<br />

6212 TFTP Attack - /etc/passwd File Obtained via TFTP Generic N/A<br />

6213 TFTP Attack - Cisco Router Config File Obtained via TFTP Generic N/A<br />

6214 FTP Attack - Hidden Directory Created Generic N/A<br />

6215 FTP Attack - File Hidden Generic N/A<br />

6216 FTP Attack - Passive Port Scan Generic N/A<br />

6217 FTP Attack - Successful SITE EXEC Command Generic N/A<br />

6233 TFTP Attack - c:\winnt\repair\sam File Obtained via TFTP Generic N/A<br />

6291 SIP Server Detection Generic N/A<br />

6298 PCAnywhere Detection Generic N/A<br />

6303 Mac OS X 10.7 < 10.7.3 Multiple Vulnerabilities Generic 57797<br />

6474 VoIP Client Detection Generic N/A<br />

6475 Polycom VoIP Client Detection Generic N/A<br />

6482 Mac OS X 10.7 < 10.7.4 Multiple Vulnerabilities Generic 59066<br />

6502 Real<strong>Network</strong>s Helix Server 14.x < 14.3.x Multiple Vulnerabilities Generic 58724<br />

Family Generic 78


6509 FW/Proxy detection Generic N/A<br />

6510<br />

6511<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Asterisk Remote Crash Vulnerability in Skinny Channel Driver<br />

(AST-2012-009)<br />

Asterisk Remote Crash Vulnerability in voice mail application<br />

(AST-2012-011)<br />

Generic 59714<br />

Generic 60065<br />

6523 Mac Software Update DNS Query Detection Generic N/A<br />

6568 Asterisk Peer IAX2 Call Handling ACL Rule Bypass (AST-2012-013) Generic 61994<br />

6583 Mac OS X 10.7 < 10.7.5 Multiple Vulnerabilities Generic 61413<br />

6584 Mac OS X 10.8 < 10.8.2 Multiple Vulnerabilities Generic 62215<br />

6640 DHCPv6 client detection Generic N/A<br />

6641 DHCPv6 server detection Generic N/A<br />

6690 Asterisk Peer Multiple Vulnerabilities (AST-2012-014 / AST-2012-015) Generic 64717<br />

6695 mDNS Client Queries Generic N/A<br />

6696 MAC change detection (SNMP) Generic N/A<br />

Family Generic 79


Family Operating System Detection<br />

<strong>PVS</strong> ID PLUGIN NAME FAMILY<br />

1107 Cisco IOS Version Detection<br />

2274<br />

Mac OS X Multiple Vulnerabilities (<strong>Security</strong> Update<br />

2004-09-07)<br />

2283 Microsoft WinErr Version Check<br />

2284 Outbound Microsoft WinErr Message<br />

2444<br />

2555<br />

Mac OS X Multiple Vulnerabilities (<strong>Security</strong> Update<br />

2004-12-02)<br />

Mac OS X Multiple Vulnerabilities (<strong>Security</strong> Update<br />

2005-001)<br />

2648 Fedora FC2 Yum Update Detection<br />

2649 Fedora FC1 Yum Update Detection<br />

2730<br />

Mac OS X Multiple Vulnerabilities (<strong>Security</strong> Update<br />

2005-003)<br />

2750 Windows 2003 Server Detection<br />

2751 Windows 2000 Server Detection (No Service Pack)<br />

2752 Windows 2000 SP1 Detection<br />

2753 Windows 2000 SP2 Detection<br />

2754 Windows 2000 SP3 Detection<br />

2755 Windows 2000 SP4 Detection<br />

2756 Windows XP (No Service Pack) Detection<br />

2757 Windows XP SP1 Detection<br />

2758 Windows XP SP2 Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

NESSUS<br />

ID<br />

Family Operating System Detection 80<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


2765 Mac OS X 10.0 Detection<br />

2766 Mac OS X 10.1 Detection<br />

2767 Mac OS X 10.2 Detection<br />

2768 Mac OS X 10.2.8 Detection<br />

2769 Mac OS X 10.3 Detection<br />

2770 Mac OS X 10.3.8 Detection<br />

2785 Windows 2003 SP1 Server Detection<br />

2824 AS/400 Server Detection<br />

2833 Apple Mac OS X < 10.3.9 Multiple Vulnerabilities<br />

2878<br />

Mac OS X Multiple Vulnerabilities (<strong>Security</strong> Update<br />

2005-005)<br />

2934 Mac OS X 10.4.0 Detection<br />

3010 Mac OS X 10.4.1 Detection<br />

3064 Mac OS X < 10.4.2 Multiple Vulnerabilities<br />

3065 Mac OS X 10.4.2 Detection<br />

3224 Mac OS X 10.3.9 Detection<br />

3225 SuSE Linux Operating System Detection<br />

3274 Mac OS X 10.4.3 Detection<br />

3275 Mac OS X < 10.4.3 Multiple Vulnerabilities<br />

3308<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mac OS X Multiple Vulnerabilities (<strong>Security</strong> Update<br />

2005-009)<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

18062<br />

18189<br />

18353<br />

N/A<br />

18683<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

20113<br />

20249<br />

3434 Mac OS X < 10.4.5 Multiple Vulnerabilities Operating System 20911<br />

Family Operating System Detection 81


3474<br />

3475<br />

Mac OS X Multiple Vulnerabilities (<strong>Security</strong> Update<br />

2006-002)<br />

Mac OS X Multiple Vulnerabilities (<strong>Security</strong> Update<br />

2006-002)<br />

3496 Debian Operating System Detection<br />

3497 Ubuntu Operating System Detection<br />

3502 Mac OS X < 10.4.6 Multiple Vulnerabilities<br />

3617<br />

Mac OS X Multiple Vulnerabilities (<strong>Security</strong> Update<br />

2006-003)<br />

3672 Mac OS X < 10.4.7 Multiple Vulnerabilities<br />

3757 Mac OS X < 10.4.8 Multiple Vulnerabilities<br />

3773 Mac OS X Generic Detection<br />

3786 HP Printer Detection<br />

3846 Cell Phone Operating System Discovery<br />

3947<br />

Mac OS X < 10.4.9 Multiple Vulnerabilities (<strong>Security</strong><br />

Update 2007-003)<br />

4089 Windows 2003 SP2 Server Detection<br />

4091 Windows Vista Operating System Detection<br />

4108 Ubuntu Server Detection<br />

4275 Unix AIX Operating System Detection<br />

4284<br />

Mac OS X < 10.4.11 Multiple Vulnerabilities (<strong>Security</strong><br />

Update 2007-008)<br />

4345 WinErr Messages OS Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

4372 Windows Vista Operating System Detection<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

21073<br />

21073<br />

N/A<br />

N/A<br />

21175<br />

21341<br />

21763<br />

22746<br />

N/A<br />

N/A<br />

N/A<br />

24811<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

28212<br />

Family Operating System Detection 82<br />

N/A<br />

N/A


4373 Mac OS X < 10.5.2 Multiple Vulnerabilities<br />

4732 Windows Unsupported Operating system<br />

4733 Windows 2000 < SP4 Detection<br />

4734 Windows 2000 SP4 Detection<br />

4735 Windows XP < SP2 Detection<br />

4736 Windows XP SP2 Detection<br />

4737 Windows 2003 SP1 Detection<br />

4738 Windows 2003 (No Service Pack) Detection<br />

4739 Windows Vista (No Service Pack) Detection<br />

4740 Windows Vista SP 1 Detection<br />

6106 Mac OS X Detection<br />

6107 Windows Version Detection<br />

6111 Windows OS detection<br />

6115 Windows OS Version Information<br />

6116 Windows OS Version Information<br />

6117 Windows OS Version Information<br />

6118 Windows OS Version Information<br />

6119 Windows OS Version Information<br />

6120 Windows OS Version Information<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

6121 Windows OS Version Information Operating System N/A<br />

30255<br />

Family Operating System Detection 83<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


6122 Windows OS Version Information<br />

6123 Windows OS Version Information<br />

6125 Windows OS Version Information<br />

6127 Windows OS Version Information<br />

6296 CentOS Version Detection<br />

6486 Apple Hardware Detection<br />

6681 Windows OS Version Information<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Operating System<br />

Detection<br />

Family Operating System Detection 84<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


Family IMAP Servers<br />

<strong>PVS</strong><br />

ID<br />

PLUGIN NAME FAMILY<br />

1085 Cyrus IMAP Server login Command Remote Overflow<br />

1086 IMAP Server Detection<br />

1087 UoW imapd (UW-IMAP) Multiple Command Remote Overflows<br />

1088 UoW imapd (UW-IMAP) BODY Request Remote Overflow<br />

1089 Atrium MERCUR Mailserver Local Traversal Arbitrary File Access<br />

1090 Ipswitch IMail 5.0 Multiple Remote Overflows<br />

1092<br />

Netscape Messaging Server IMAP LIST Command Remote<br />

Overflow<br />

1093 UoW imapd (UW-IMAP) Multiple Command Remote Overflows<br />

1094<br />

MDaemon IMAP Service CREATE Command Mailbox Name<br />

Handling Overflow<br />

1095 Mozilla IMAP Client literal_size Remote Overflow<br />

1096<br />

Microsoft Outlook Express IMAP Client literal_size Remote<br />

Overflow<br />

1097 QUALCOMM Eudora IMAP Client literal_size Remote Overflow<br />

1099 Pine c-client IMAP Client literal_size Remote Overflow<br />

1101<br />

UoW imapd (UW-IMAP) AUTHENTICATE Command Remote<br />

Overflow<br />

1210 Courier IMAP Server < 3.0.7 Multiple Vulnerabilities<br />

2158<br />

Merak Mail Server < 7.5.2 Web Mail Module Multiple<br />

Vulnerabilities<br />

2310 Alt-N MDaemon Multiple Buffer Overflows<br />

2425 Cyrus IMAPD < 2.2.10 Multiple Vulnerabilities<br />

IMAP<br />

Servers<br />

IMAP<br />

Servers<br />

IMAP<br />

Servers<br />

IMAP<br />

Servers<br />

IMAP<br />

Servers<br />

IMAP<br />

Servers<br />

IMAP<br />

Servers<br />

IMAP<br />

Servers<br />

IMAP<br />

Servers<br />

IMAP<br />

Servers<br />

IMAP<br />

Servers<br />

IMAP<br />

Servers<br />

IMAP<br />

Servers<br />

IMAP<br />

Servers<br />

IMAP<br />

Servers<br />

IMAP<br />

Servers<br />

IMAP<br />

Servers<br />

IMAP<br />

Servers<br />

NESSUS<br />

ID<br />

11196<br />

11414<br />

10625<br />

10966<br />

10382<br />

10123<br />

10580<br />

10374<br />

11577<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

10292<br />

12103<br />

Family IMAP Servers 85<br />

N/A<br />

N/A<br />

N/A


2438 Mercury Mail Remote IMAP Stack Buffer Overflow<br />

2568 UW-imapd CRAM-MD5 Authentication Bypass<br />

2645 Cyrus IMAPD < 2.2.12 Multiple Remote Overflows<br />

3068 MailEnable IMAP STATUS Command Remote Overflow<br />

3250 MailEnable STATUS Command Overflow<br />

3251 UW-IMAP Quote String Buffer Overflow<br />

IMAP<br />

Servers<br />

IMAP<br />

Servers<br />

IMAP<br />

Servers<br />

IMAP<br />

Servers<br />

IMAP<br />

Servers<br />

IMAP<br />

Servers<br />

3299 WorldMail IMAP Server Directory Traversal Arbitrary Spool Access IMAP<br />

Servers<br />

3302 MailEnable IMAP Service Remote DoS<br />

IMAP<br />

Servers<br />

3383 Mercury Mail Transport System < 4.01b ph Service Buffer Overflow IMAP<br />

Servers<br />

3480 Mercur Mailserver Remote Overflow<br />

3482 MailEnable WebMail Multiple Products Quoted Printable Mail DoS<br />

3483 MailEnable Multiple Products POP3 Authentication Bypass<br />

IMAP<br />

Servers<br />

IMAP<br />

Servers<br />

IMAP<br />

Servers<br />

3628 Cyrus IMAPD < 2.3.4 'POP3D USER' Command Remote Overflow IMAP<br />

Servers<br />

3814 WorldMail <<br />

3906<br />

AXIGEN Mail Server IMAP Server Multiple Authentication<br />

Methods DoS<br />

3937 Ipswitch IMail Server < 2006.2 Multiple Overflows<br />

3958<br />

Lotus Domino IMAP Server < 6.5.6 / 7.0.2 FP1 CRAM-MD5<br />

Authentication Overflow<br />

3999 IMAP SSL/TLS Server Detection<br />

4220 Mercury IMAP Server <<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

IMAP<br />

Servers<br />

IMAP<br />

Servers<br />

IMAP<br />

Servers<br />

IMAP<br />

Servers<br />

IMAP<br />

Servers<br />

IMAP<br />

Servers<br />

N/A<br />

N/A<br />

17208<br />

19193<br />

19783<br />

N/A<br />

20224<br />

N/A<br />

20812<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

24321<br />

24782<br />

24903<br />

4290 Ability Mail Server < 2.61 Multiple Vulnerabilities IMAP 28289<br />

Family IMAP Servers 86<br />

N/A<br />

N/A


Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

4730 UW-IMAP < 2007d.404 Multiple Utility Mailbox Name Overflow<br />

4798 UW-IMAP < 2007e c-client Library Overflow<br />

5184 Ability Mail Server < 2.70 Remote Denial of Service<br />

Servers<br />

IMAP<br />

Servers<br />

IMAP<br />

Servers<br />

IMAP<br />

Servers<br />

N/A<br />

N/A<br />

41644<br />

Family IMAP Servers 87


Family Internet Messengers<br />

<strong>PVS</strong><br />

ID<br />

PLUGIN NAME FAMILY<br />

1244 AOL Instant Messenger Arbitrary File Forced Download<br />

1245<br />

1246<br />

AOL Instant Messenger URL href Attribute Traversal Arbitrary<br />

Local File Execution<br />

AOL Instant Messenger goim Handler Screen Name Parameter<br />

Handling Overflow<br />

1247 AOL Instant Messenger URL refresh Tag XSS<br />

1248<br />

AOL Instant Messenger AddBuddy Link Long ScreenName<br />

Parameter Overflow DoS<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

1249 AOL Instant Messenger AddExternalApp Remote Buffer Overflow Internet<br />

Messengers<br />

1250 AOL Instant Messenger Active File Transfer Hijacking<br />

1251 AOL Instant Messenger IMG Tag Arbitrary Command Execution<br />

1252 AOL Instant Messenger Multiple DoS<br />

1253 AOL Instant Messenger <<br />

1254 AOL Instant Messenger Filename Handling Format String<br />

1255 AOL Instant Messenger File Transfer Path Disclosure<br />

1256 AOL Instant Messenger Malformed ASCII Value Message DoS<br />

1257 AOL Instant Messenger Login Sequence Remote Overflow<br />

1258<br />

AOL Instant Messenger ASCII-Symbol Interpretation Denial of<br />

Service<br />

1259 AOL Instant Messenger Password Encryption Weakness<br />

1260 Yahoo! Messenger Shared File Access User Status Enumeration<br />

1261 Yahoo! Messenger ymsgr Protocol Multiple Function Overflow<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

NESSUS<br />

ID<br />

Family Internet Messengers 88<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


1262 Yahoo! Messenger ymsgr URI Arbitrary Script Execution<br />

1263 Yahoo! Messenger ymsgr URI Arbitrary Script Execution<br />

1264 Yahoo! Messenger IMvironment Field Remote Overflow<br />

1265 Yahoo! Messenger Spoofed Username<br />

1266 Yahoo! Messenger Message Field Remote Overflow<br />

1267 MSN Messenger Malformed Invite Request Remote DoS<br />

1268 MSN Messenger Malformed Font Field Remote DoS<br />

1269 MSN Messenger Detection<br />

1270 AOL Instant Messenger Detection<br />

1271 Yahoo! Messenger Download Feature Long Filename Overflow<br />

1272 Yahoo! Messenger Peer To Peer File Sharing Detection<br />

1273 Yahoo! Messenger Detection<br />

1274<br />

AOL Instant Messenger aim:goaway URI Handler goaway Function<br />

Away Message Handling Remote Overflow<br />

1275 Yahoo! Messenger Detection<br />

2135 Bird Chat Server Invalid User DoS<br />

2159 Gaim < 0.82 Multiple Overflows<br />

2160 Gaim < 0.82 MSN Protocol Buffer Overflow<br />

2161 Gaim / Ultramagnetic Multiple <strong>Security</strong> Vulnerabilities<br />

2162 Gaim < 0.59.1 Remote Command Execution<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

2163 Gaim < 0.59 Web Mail Account Information Disclosure Internet N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

11993<br />

Family Internet Messengers 89<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


2366 Gaim < 1.0.2 Multiple Vulnerabilities<br />

2405 Skype < 1.0.0.100 CallTo URI Buffer Remote Overflow<br />

2406 Skype Detection (Host)<br />

2428 ProZilla Multiple Remote Buffer Overflows<br />

2599 MSN Messenger Version Detection<br />

2600 MSN Messenger UserID Detection<br />

2603 MSN Messenger < 6.2.0205 PNG File Remote Overflow<br />

2630 Yahoo! Messenger < 6.0.0.1750 Detection<br />

2631 Gaim < 1.1.3 Multiple DoS Vulnerabilities<br />

2654 Gaim < 1.1.4 Remote DoS<br />

2655 Gaim Detection<br />

2681 Yahoo! Messenger < 6.0.0.1921 Multiple DoS<br />

2749 Trillian HTTP-parsing Remote Overflow<br />

2793 Gaim < 1.2.1 Multiple Vulnerabilities<br />

2817 MSN Messenger Malformed GIF Remote Overflow<br />

2888 AOL Instant Messenger Font Tag sml Parameter Remote DoS<br />

2894 Gaim < 1.3.0 Multiple Vulnerabilities<br />

3008 AOL Instant Messenger Remote Malformed GIF DoS<br />

3012 Gaim < 1.3.1 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

16328<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

17611<br />

N/A<br />

N/A<br />

18299<br />

N/A<br />

18432<br />

Family Internet Messengers 90<br />

N/A


3070 Skype Temporary File Arbitrary File Overwrite<br />

3160 Gaim < 1.3.2 Multiple Vulnerabilities<br />

3199<br />

IndiaTimes Instant Messenger ActiveX RenameGroup Function<br />

Overflow<br />

3268 Skype Technologies Multiple Buffer Overflows<br />

3627 Skype Technologies < 2.5.0.78 Arbitrary File Download<br />

3665 Yahoo! Messenger <<br />

3700 Yahoo! Messenger < 8.0.0.863 File Extension Spoofing<br />

3772<br />

Skype Technologies < 1.5.0.80 NSRRunAlertPanel Function<br />

Format String (Mac OS X)<br />

3977 Trillian < 3.1.5.0 Multiple Vulnerabilities<br />

4084 Windows Live Messenger Version Detection<br />

4102 Trillian < 3.1.6.0 Multiple Vulnerabilities<br />

4103 AOL Instant Messenger <<br />

4104 AOL Instant Messenger 6 Version Detection<br />

4144 Trillian < 3.1.7.0 Multiple Vulnerabilities<br />

4196 Windows Live Messenger Version Detection<br />

4197 Windows Live Messenger < 8.1.0178 Video Processing Overflow<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

4199 Yahoo! Messenger < 8.1.0.419 YVerInfo ActiveX Buffer Overflow Internet<br />

Messengers<br />

4210<br />

4211<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Vulnerability in Microsoft MSN Messenger and Windows Live<br />

Messenger Could Allow Remote Code Execution (942099)<br />

Vulnerability in Microsoft MSN Messenger and Windows Live<br />

Messenger Could Allow Remote Code Execution (942099)<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

4215 AOL Instant Messenger < Internet N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

25120<br />

N/A<br />

25547<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

25955<br />

26019<br />

26019<br />

Family Internet Messengers 91


4280 Trillian Version Detection<br />

4310<br />

Skype Technologies < 3.6.0.216 skype4com URI Handler Remote<br />

Heap Corruption<br />

4404 ICQ 6 Version Detection<br />

4405 ICQ 6 HTML Code Generation Remote Format String<br />

4515 Trillian < 3.1.10.0 Multiple Vulnerabilities<br />

4531 Skype Technologies URI Handler Remote Code Execution<br />

4570 Jabber Client Detection<br />

4571 Jabber Server Detection<br />

4778 Trillian < 3.1.12.0 Multiple Vulnerabilities<br />

5032 Pidgin < 2.5.6 Multiple Buffer Overflow Vulnerabilities<br />

5137 Pidgin < 2.5.9 Buffer Overflow<br />

5168 Pidgin < 2.6.1 Multiple Vulnerabilities<br />

5298 Pidgin < 2.6.5 Information Disclosure Vulnerability<br />

5362 Skype < 4.2.0.155 URI Handler <strong>Security</strong> Vulnerability<br />

5898 Skype Detection (User-Agent)<br />

5980 Yahoo! Messenger Detection<br />

6234 Meebo Messenger Detected<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

Internet<br />

Messengers<br />

N/A<br />

29250<br />

N/A<br />

N/A<br />

32400<br />

N/A<br />

N/A<br />

N/A<br />

35042<br />

N/A<br />

40663<br />

40986<br />

43862<br />

45061<br />

Family Internet Messengers 92<br />

N/A<br />

N/A<br />

N/A


Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Messengers 93


Family IRC Clients<br />

<strong>PVS</strong><br />

ID<br />

PLUGIN NAME FAMILY NESSUS<br />

ID<br />

1855 BitchX IRC Client "/INVITE" Command Format String DoS IRC Clients N/A<br />

1856 BitchX IRC Clent DNS Response Remote Overflow IRC Clients N/A<br />

1857<br />

BitchX IRC Client Malformed RPL_NAMEREPLY Message<br />

DoS<br />

IRC Clients N/A<br />

1858 Multiple ircii-based Clients Remote Overflows IRC Clients N/A<br />

1859 BitchX Trojaned Distribution Authentication Bypass IRC Clients N/A<br />

1860 BitchX IRC Client Channel Mode Change DoS IRC Clients N/A<br />

1861 mIRC < 6.0 Long Nickname Buffer Overflow IRC Clients N/A<br />

1862 mIRC < 6.1 DCC Server Protocol Nickname Disclosure IRC Clients N/A<br />

1863 mIRC < 6.03 Scripting $asctime Overflow IRC Clients N/A<br />

1864 mIRC DCC Get Dialog File Spoofing Weakness IRC Clients N/A<br />

1865 Trillian IRC PART Message Remote DoS IRC Clients N/A<br />

1866 Trillian IRC User Mode Numeric Remote Overflow IRC Clients N/A<br />

1867 Trillian IRC Module DCC Length Remote Overflow IRC Clients N/A<br />

1868 Trillian IRC Oversized Data Block Remote Overflow DoS IRC Clients N/A<br />

1869 Trillian IRC Raw Message DoS IRC Clients N/A<br />

1870 Trillian IRC Module Channel Name Format String IRC Clients N/A<br />

1871 Trillian IRC Server Response Remote Overflow IRC Clients N/A<br />

1872 Trillian IRC JOIN Remote Overflow IRC Clients N/A<br />

1873 XChat Malformed Nickname Remote Format String IRC Clients N/A<br />

1874<br />

1875<br />

XChat /dns Reverse Lookup Response Arbitrary Command<br />

Execution<br />

XChat CTCP Ping Arbitrary Remote IRC Command<br />

Execution<br />

IRC Clients N/A<br />

IRC Clients N/A<br />

1876 XChat Client URL Metacharacter Command Execution IRC Clients N/A<br />

1877 mIRC Minimized Dialogue Window DoS IRC Clients N/A<br />

1878 IRC Client Detection IRC Clients N/A<br />

2547<br />

Konversation IRC Client < 0.15.1 Multiple Remote<br />

Vulnerabilities<br />

IRC Clients N/A<br />

3101 IRC Client Detection IRC Clients N/A<br />

3119 Generic Botnet Client Detection IRC Clients N/A<br />

Family IRC Clients 94


Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

3120 Generic Botnet Client Detection IRC Clients N/A<br />

3121 Generic Botnet Client Detection IRC Clients N/A<br />

3122 Generic Botnet Client Detection IRC Clients N/A<br />

3123 Generic Botnet Client Detection IRC Clients N/A<br />

3124 Generic Botnet Client Detection IRC Clients N/A<br />

3125 Generic Botnet Client Detection IRC Clients N/A<br />

3126 Generic Botnet Client Detection IRC Clients N/A<br />

3127 Generic Botnet Client Detection IRC Clients N/A<br />

3128 Generic Botnet Client Detection IRC Clients N/A<br />

3129 Generic Botnet Client Detection IRC Clients N/A<br />

3130 Generic Botnet Client Detection IRC Clients N/A<br />

3131 Generic Botnet Client Detection IRC Clients N/A<br />

3132 Generic Botnet Client Detection IRC Clients N/A<br />

3133 Generic Botnet Client Detection IRC Clients N/A<br />

3150 Generic Botnet Client Detection IRC Clients N/A<br />

3858 Generic Botnet Client Detection IRC Clients N/A<br />

4442 Generic Botnet Client Detection IRC Clients N/A<br />

Family IRC Clients 95


Family IRC Servers<br />

<strong>PVS</strong><br />

ID<br />

PLUGIN NAME FAMILY<br />

2152 ignitionServer < 0.3.2 SERVER Command Remote DoS IRC Servers N/A<br />

2153 Unreal IRCD < 3.2.1 Cloak IP Address Disclosure IRC Servers N/A<br />

2154 Unreal IRCD OperServ Raw Message Channel Join DoS IRC Servers N/A<br />

2403<br />

BNC < 2.9.1 getnickuserhost IRC Server Response Buffer<br />

Overflow<br />

IRC Servers N/A<br />

2404 BNC IRC Server < 2.9.1 Authentication Bypass IRC Servers N/A<br />

NESSUS<br />

ID<br />

2919 ignitionServer < 0.3.6p1 Channel Locking Remote DoS IRC Servers 18291<br />

3107 IRC Server Detection IRC Servers N/A<br />

3134 Generic Botnet Server Detection IRC Servers N/A<br />

3135 Generic Botnet Server Detection IRC Servers N/A<br />

3136 Generic Botnet Server Detection IRC Servers N/A<br />

3137 Generic Botnet Server Detection IRC Servers N/A<br />

3138 Generic Botnet Server Detection IRC Servers N/A<br />

3139 Generic Botnet Server Detection IRC Servers N/A<br />

3140 Generic Botnet Server Detection IRC Servers N/A<br />

3141 Generic Botnet Server Detection IRC Servers N/A<br />

3142 Generic Botnet Server Detection IRC Servers N/A<br />

3143 Generic Botnet Server Detection IRC Servers N/A<br />

3144 Generic Botnet Server Detection IRC Servers N/A<br />

3145 Generic Botnet Server Detection IRC Servers N/A<br />

3146 Generic Botnet Server Detection IRC Servers N/A<br />

3147 Generic Botnet Server Detection IRC Servers N/A<br />

3148 Generic Botnet Server Detection IRC Servers N/A<br />

3149 Generic Botnet Server Detection IRC Servers N/A<br />

Family IRC Servers 96


Family Peer-To-Peer File Sharing<br />

<strong>PVS</strong><br />

ID<br />

PLUGIN NAME FAMILY<br />

2050 Gnutella Server Detection<br />

2051 BearShare Detection<br />

2052 ICQ P2P Client Detection<br />

2053 Blubster Detection<br />

2054 Gnucleus Detection<br />

2055 Morpheus Detection<br />

2056 WinMX Detection<br />

2057 Xolox Detection<br />

2058 Kazaa Detection<br />

2059 Shareaza Detection<br />

2060 Edonkey2k Detection<br />

2061 MyNapster Detection<br />

2062 KazaaClient Detection<br />

2063 Trillian Detection<br />

2327 Zinf .pls File Overflow<br />

2347 Vypress < 4.0 First Message Field Overflow<br />

2434<br />

Open DC Hub RedirectAll Value Remote Buffer<br />

Overflow<br />

2576 BitTorrent P2P Protocol Detection<br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

NESSUS<br />

ID<br />

10946<br />

10946<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

11431<br />

11426<br />

Family Peer-To-Peer File Sharing 97<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


2577 BitTorrent P2P Client Detection<br />

2578 BitTorrent P2P Server Detection<br />

2656 PeerFTP Client Detection<br />

2709 eMule Peer-To-Peer File Sharing Server Detection<br />

2710<br />

LimeWire < 4.8.0 Directory Traversal Arbitrary File<br />

Access<br />

2813 DC++ < 0.674 File Content Manipulation<br />

2868 ICUII Peer-To-Peer Client Detection<br />

2872 BitTorrent Client Detection<br />

3378 WinComet Detection<br />

3385 Shareaza P2P Fileshare Client Integer Overflow<br />

3403 uTorrent Client Detection<br />

3404 uTorrent Server Detection<br />

3920 BitTorrent Client Detection<br />

3991 BitTorrent Server Detection<br />

4110 Limewire Server Detection<br />

4550 JXTA P2P Server Detection<br />

4551 JXTA P2P Client Detection<br />

4939 SMPP Peer-to-Peer Client Detection<br />

4940 SMPP Peer-to-Peer Server Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

4941 Manolito Peer-to-Peer Client Detection Peer-To-Peer File N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

17973<br />

18012<br />

Family Peer-To-Peer File Sharing 98<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


4942 Manolito Peer-to-Peer Server Detection<br />

5034 SoulSeek Version Detection<br />

5292 Transmission Client Detection<br />

5947 BitTorrent Protocol Traffic Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

6392 BitTorrent .torrent File Download Detection<br />

6393 BitTorrent .torrent File Download Detection<br />

6394 BitTorrent .torrent File Download Detection<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

Peer-To-Peer File<br />

Sharing<br />

Family Peer-To-Peer File Sharing 99<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


Family POP Server<br />

<strong>PVS</strong><br />

ID<br />

PLUGIN NAME FAMILY NESSUS<br />

ID<br />

1783 ipop2d fold Command Arbitrary File Access POP Server 10469<br />

1784 qpopper < 3.0.1b2 EIUDL Arbitrary Command Execution POP Server 10423<br />

1785 qpopper < 4.0 PASS Command Remote Overflow POP Server 10196<br />

1786 qpopper < 4.0.5fc2 Qvsnprintf Remote Overflow POP Server 11376<br />

1787 ipop2d < 4.5 FOLD Command Remote Overflow POP Server 10130<br />

1788 Netscape Messenging Server User Account Enumeration POP Server 10681<br />

1789 qpopper Options File Buffer Overflow POP Server 10948<br />

1790 ZetaMail Remote DoS POP Server 10184<br />

1791 Delegate Multiple Function Remote Overflows POP Server 10184<br />

1792 Qualcomm Qpopper Remote Overflow DoS POP Server 10184<br />

1793 Qualcomm Qpopper Remote Overflows POP Server 10184<br />

1794 Qualcomm Qpopper Username Remote Overflow POP Server 10184<br />

1795 Computalynx CMail POP3 Server DELE Function DoS POP Server N/A<br />

1796 Computalynx CMail < 2.4.10 HELO Command Overflow POP Server N/A<br />

1797 ALT-N MDaemon < 6.5.0 POP Server Overflow DoS POP Server N/A<br />

1798 Xtramail < 1.12 POP3 Overflow POP Server 10325<br />

1799 Xtramail < 1.12 Control Server Overflow Denial of Service POP Server 10323<br />

1800 XMail < 0.59 APOP Overflow DoS POP Server 10559<br />

1801 XMail < 2.4 (Build 0530) APOP Remote Format String POP Server N/A<br />

1802 POP Server Detection POP Server N/A<br />

2156<br />

Merak Mail Server < 7.5.1 Web Mail Module Multiple<br />

Vulnerabilities<br />

POP Server N/A<br />

2331 YahooPOPs! Proxy Detection POP Server N/A<br />

2332 Intellipeer User Account Enumeration POP Server 14829<br />

2413 Digital Mappings Systems POP3 Server Remote Buffer Overflow POP Server N/A<br />

2518 POP Password Changer Unauthorized Password Change POP Server N/A<br />

2740 DeleGate < 8.11.1 Multiple Remote Overflows POP Server 17599<br />

2823 AS400 Default POP Services Information Disclosure POP Server 18046<br />

2935 Qualcomm Qpopper < 4.0.5 Multiple Local Privilege Escalation POP Server 18361<br />

2938 GNU Mailutils Multiple IMAP Vulnerabilities POP Server 19605<br />

Family POP Server 100


2939 GNU Mailutils Multiple POP Vulnerabilities POP Server N/A<br />

3034<br />

True North eMailServer < 5.3.4 Build 2019 LIST Command<br />

Remote DoS<br />

POP Server N/A<br />

3035 POP Banner Detection POP Server N/A<br />

3243 Qualcomm Qpopper poppassd Local Privilege Escalation POP Server N/A<br />

3257 XMail < 1.22.0 Multiple Overflows POP Server N/A<br />

3300 Winmail Server < POP Server N/A<br />

3320 Apache James < 2.2.1 Spooler retrieve Function DoS POP Server N/A<br />

3655 MERCUR < 2005 SP4 Multiple Remote DoS POP Server N/A<br />

3734<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

ALT-N MDaemon POP Server < 9.06 USER / APOP Command<br />

Overflow<br />

POP Server N/A<br />

3815 ALT-N MDaemon < 9.0.7 / 9.54 Local Insecure Directory POP Server N/A<br />

3938 Ipswitch IMail Server < 2006.2 Multiple Overflows POP Server 24782<br />

4000 POP SSL/TLS Server Detection POP Server N/A<br />

4118 ALT-N MDaemon < 9.6.1 DomainPOP Malformed Message DoS POP Server N/A<br />

4260 Delegate < 9.7.5 Multiple Vulnerabilities POP Server N/A<br />

4292 Ability Mail Server < 2.61 Multiple Vulnerabilities POP Server 28289<br />

4765 MDaemon WorldClient < 10.0.2 Script Injection POP Server 34849<br />

5186 Ability Mail Server < 2.70 Remote Denial of Service POP Server 41644<br />

5517 Alt-N MDaemon < 11.0.1 Multiple Remote DoS Vulnerabilities POP Server 45627<br />

Family POP Server 101


Family RPC<br />

<strong>PVS</strong><br />

ID<br />

1018<br />

PLUGIN NAME FAMILY NESSUS<br />

ID<br />

RPC Status (rpc.statd) Service In<br />

Use<br />

RPC N/A<br />

1019 RPC rstatd Service In Use RPC N/A<br />

1020 RPC rusers Service In Use RPC N/A<br />

1021 RPC NFS Service In Use RPC N/A<br />

1022 RPC NIS ypserv Service In Use RPC N/A<br />

1023 RPC mountd Service In Use RPC N/A<br />

1024 RPC NIS ypbind Service In Use RPC N/A<br />

1025 RPC walld Service In Use RPC N/A<br />

1026<br />

RPC NIS yppasswd Service In<br />

Use<br />

RPC N/A<br />

1027 RPC etherstatd Service In Use RPC N/A<br />

1028 RPC rquotad Service In Use RPC N/A<br />

1029 RPC sprayd Service In Use RPC N/A<br />

1030<br />

RPC 3270_mapper Service In<br />

Use<br />

RPC N/A<br />

1031 RPC rje_mapper Service In Use RPC N/A<br />

1032<br />

1033<br />

RPC selection_svc Service In<br />

Use<br />

RPC database_svc Service In<br />

Use<br />

RPC N/A<br />

RPC N/A<br />

1034 RPC rexd Service In Use RPC N/A<br />

1035 RPC alis Service In Use RPC N/A<br />

1036 RPC sched Service In Use RPC N/A<br />

1037 RPC llockmgr Service In Use RPC N/A<br />

1038 RPC nlockmgr Service In Use RPC N/A<br />

1039 RPC x25.inr Service In Use RPC N/A<br />

1040 RPC statmon Service In Use RPC N/A<br />

1041 RPC bootparam Service In Use RPC N/A<br />

1042<br />

RPC NIS ypupdated Service In<br />

Use<br />

RPC N/A<br />

1043 RPC keyserv Service In Use RPC N/A<br />

Family RPC 102


1044<br />

RPC sunlink_mapper Service In<br />

Use<br />

RPC N/A<br />

1045 RPC tfsd Service In Use RPC N/A<br />

1046 RPC nsed Service In Use RPC N/A<br />

1047 RPC nsemntd Service In Use RPC N/A<br />

1048 RPC showfhd Service In Use RPC N/A<br />

1049 RPC ioadmd Service In Use RPC N/A<br />

1050 RPC NETlicense Service In Use RPC N/A<br />

1051 RPC sunisamd Service In Use RPC N/A<br />

1052 RPC debug_svc Service In Use RPC N/A<br />

1053 RPC NIS ypxfrd Service In Use RPC N/A<br />

1054 RPC bugtraqd Service In Use RPC N/A<br />

1055 RPC kerbd Service In Use RPC N/A<br />

1056<br />

1057<br />

1058<br />

RPC SunNet Manager event<br />

Service In Use<br />

RPC SunNet Manager logger<br />

Service In Use<br />

RPC SunNet sync Service In<br />

Use<br />

RPC N/A<br />

RPC N/A<br />

RPC N/A<br />

1059 RPC hostperf Service In Use RPC N/A<br />

1060<br />

RPC SunNet Manager activity<br />

Service In Use<br />

RPC N/A<br />

1061 RPC hostmem Service In Use RPC N/A<br />

1062 RPC sample Service In Use RPC N/A<br />

1063 RPC x25 Service In Use RPC N/A<br />

1064 RPC ping Service In Use RPC N/A<br />

1065<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RPC NFS (na.rpcnfs) Service In<br />

Use<br />

RPC N/A<br />

1066 RPC hostif Service In Use RPC N/A<br />

1067 RPC etherif Service In Use RPC N/A<br />

1068 RPC iproutes Service In Use RPC N/A<br />

1069 RPC layers Service In Use RPC N/A<br />

1070 RPC snmp Service In Use RPC N/A<br />

1071 RPC traffic Service In Use RPC N/A<br />

1072 RPC nfs_acl Service In Use RPC N/A<br />

Family RPC 103


1073 RPC sadmind Service In Use RPC N/A<br />

1074 RPC nisd Service In Use RPC N/A<br />

1075<br />

RPC NIS nispasswd Service In<br />

Use<br />

RPC N/A<br />

1076 RPC ufsd Service In Use RPC N/A<br />

1077 RPC pcnfsd Service In Use RPC N/A<br />

1078 RPC amd Service In Use RPC N/A<br />

1079 RPC sgi_fam Service In Use RPC N/A<br />

1080 RPC bwnfsd Service In use RPC N/A<br />

1081 RPC fypxfrd Service In Use RPC N/A<br />

1082 RPC portmapper Service In Use RPC N/A<br />

1083<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Superflous NFS Daemon<br />

Detection<br />

RPC N/A<br />

1084 RPC status Service In Use RPC N/A<br />

Family RPC 104


Family Samba<br />

<strong>PVS</strong><br />

ID<br />

PLUGIN NAME FAMILY NESSUS<br />

ID<br />

1337 Samba Version Detection Samba N/A<br />

1338 Samba < 2.0.10 Remote Arbitrary File Overwrite Samba 10786<br />

1339<br />

Samba < 2.2.8 Fragment Reassembly Overflow / Arbitrary File<br />

Overwrite<br />

Samba 11398<br />

1340 Samba < 2.2.5 Multiple Overflows Samba 11113<br />

1341 Samba-TNG < 0.3.1 Multiple Vulnerabilities Samba 11442<br />

1342 Samba < 2.2.8a trans2.c trans2open() Function Overflow Samba 11523<br />

1343 Samba < 2.2.7 Unicode Encrypted Password Decryption Overflow Samba 11168<br />

2337 Samba < 2.2.11 Remote Arbitrary File Access Samba 15394<br />

2338 Samba < 3.0.6 Remote Arbitrary File Access Samba 15394<br />

2397<br />

2463<br />

Samba < 3.0.8 Remote Wild Card DoS and QFILEPATHINFO<br />

Remote Overflow<br />

Samba < 3.0.10 Directory Access Control List Remote Integer<br />

Overflow<br />

Samba N/A<br />

Samba N/A<br />

3499 Samba < 3.0.22 Local File Permissions Credentials Disclosure Samba N/A<br />

3682 Samba < 3.0.23 smdb Share Remote DoS Samba N/A<br />

3905 Samba < 3.0.24 nss_winbind.so.1 Multiple Function Overflow Samba N/A<br />

3988 Samba < 3.0.25 NDR MS-RPC Request Heap-Based Overflow Samba 25216<br />

3990 Samba < 3.0.25 Multiple Vulnerabilities Samba 25217<br />

4208 Samba < 3.0.26 idmap_ad.co Local Privilege Escalation Samba N/A<br />

4285 Samba < 3.0.27 Multiple Vulnerabilities Samba 28228<br />

4311 Samba < 3.0.28 send_mailslot Function Buffer Overflow Samba 29252<br />

4522 Samba < 3.0.30 receive_smb_raw Buffer Overflow Vulnerability Samba 32476<br />

4774 Samba 3.0.29 - 3.2.4 Potential Memory Disclosure Samba 34993<br />

4807 Samba 3.2.0 - 3.2.6 Unauthorized Access Samba 35298<br />

5053 SMB AndX File Handle Detection (client) Samba N/A<br />

5054 SMB AndX File Handle Detection (server) Samba N/A<br />

5087 Samba < 3.3.6/3.2.13/3.0.35 Multiple Vulnerabilities Samba N/A<br />

5194 Samba < 3.0.37 / 3.2.15 / 3.3.8 / 3.4.2 Multiple Vulnerabilities Samba 41970<br />

5360 Samba 3.3.11 / 3.4.6 / 3.5.0 <strong>Security</strong> Bypass Vulnerability Samba 45047<br />

5534 Samba < 3.5.2/3.4.8 Multiple DoS Samba 46351<br />

Family Samba 105


5538 Microsoft Group Policy Client Detection Samba N/A<br />

5540 Microsoft Group Policy File Download Detection Samba N/A<br />

5541 Microsoft Group Policy File Download Detection Samba N/A<br />

5542 Microsoft Group Policy File Download Detection Samba N/A<br />

5543 Microsoft Group Policy File Download Detection Samba N/A<br />

5544 Microsoft Group Policy File Download Detection Samba N/A<br />

5572 Samba 3.x < 3.3.13 SMB1 Packet Chaining Memory Corruption Samba 47036<br />

5663 Samba 3.x < 3.5.5 / 3.4.9 / 3.3.14 sid_parse Buffer Overflow Samba 49228<br />

6299 Samba 3.6.x < 3.6.3 Denial of Service Samba 57752<br />

6443 Samba 3.x < 3.6.4 / 3.5.14 / 3.4.16 RPC Multiple Buffer Overflows Samba 58662<br />

6686<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Samba 3.x < 3.5.21 / 3.6.12 and 4.x < 4.0.2 SWAT Multiple<br />

Vulnerabilities<br />

Samba 64459<br />

Family Samba 106


Family SMTP Clients<br />

<strong>PVS</strong><br />

ID<br />

PLUGIN NAME FAMILY<br />

1098 Sylpheed IMAP Client literal_size Remote Overflow<br />

1100 E-mail Client Detection<br />

1140 Elm frm Command Mail Subject Line Handling Remote Overflow<br />

1188<br />

Mutt < 1.4.2 menu.c menu_pad_string Function Index Menu Code<br />

Remote Overflow DoS<br />

1218 Eudora Long URL Status Bar Obfuscation<br />

1283 Qualcomm Eudora < 5.2 Long Attachment Filename Handling DoS<br />

1284 Qualcomm Eudora File Attachment Spoofing Vulnerability<br />

1285<br />

1286<br />

Qualcomm Eudora MIME Multipart Boundary Buffer Overflow<br />

Vulnerability<br />

Qualcomm Eudora WebBrowser Control Embedded Media Player File<br />

Vulnerability<br />

1287 Qualcomm Eudora Hidden Attachment Execution Vulnerability<br />

1288 Qualcomm Eudora Client and Path Disclosure Vulnerability<br />

1289<br />

1290<br />

Qualcomm Eudora 4.2/4.3 Warning Message Circumvention<br />

Vulnerability<br />

Microsoft Outlook and Outlook Express Arbitrary Program Execution<br />

Vulnerability<br />

1291 Microsoft Outlook Express S/MIME Buffer Overflow Vulnerability<br />

1292 Microsoft Outlook Express POP Denial of Service Vulnerability<br />

1293<br />

1294<br />

1295<br />

Microsoft Outlook Express for MacOS HTML Attachment Automatic<br />

Download Vulnerability<br />

Microsoft Outlook 98 / Outlook Express 4.x Long Filename<br />

Vulnerability<br />

Mutt < 1.4.1 / 1.5 IMAP Remote Folder Buffer Overflow<br />

Vulnerabilities<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

NESSUS<br />

ID<br />

Family SMTP Clients 107<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


1296<br />

Mutt < 1.4.1 / 1.5 UTF-7 IMAP Remote Folder Buffer Overflow<br />

Vulnerability<br />

1297 Mutt < 1.4.1 / 1.5 Address Handling Buffer Overflow Vulnerability<br />

1298 Mutt < 1.4.1 / 1.5 IMAP Server Format String Vulnerability<br />

1299<br />

Mutt < 1.4.1 / 1.5 Text Enriched Handler Buffer Overflow<br />

Vulnerability<br />

1300 Elm Alternative Folder Buffer Overflow Vulnerability<br />

1301 Pegasus Mail <<br />

1302 Pegasus Mail <<br />

1303 Pegasus Mail < 4.02 To/From Header Overflow DoS<br />

1304 Lotus Notes R5 S/MIME Message Modification Warning Failure<br />

1305 Lotus Notes Password Hieroglyphics Information Disclosure<br />

1306<br />

Ximian Evolution < 1.1.1 camel Component Man-in-the-Middle SSL<br />

Session Weakness<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

1307 Ximian Evolution < 1.2.3 UUEncoding Overflow DoS / Data Injection SMTP<br />

Clients<br />

1308 Ximian Evolution < 1.2.3 MIME image/* Content-Type Data Injection SMTP<br />

Clients<br />

1310 Netscape/Mozilla Null Character Cookie Disclosure<br />

1311 Netscape/Mozilla/Galeon Local File Enumeration<br />

1312 Netscape/Mozilla Malformed Email Newline POP3 Remote DoS<br />

1313 Netscape/Mozilla Navigator Plugin Path Disclosure<br />

1314 Mozilla JavaScript URL Host Spoofing Arbitrary Cookie Disclosure<br />

1315 Mozilla FTP View URL Title Tag XSS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

1316 Mozilla OnUnload Referer Information Leakage Race Condition SMTP N/A<br />

Family SMTP Clients 108<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


Information Disclosure Clients<br />

1317 Mozilla onkeypress Function XPI Installation Weakness<br />

1318 Mozilla document.open() Memory Corruption Denial of Service<br />

1319 Mozilla Browser HTTP/HTTPS Redirection Weakness<br />

1320 Mozilla POP3 Mail Handler Remote Overflow<br />

1321 Mozilla Browser Large HTTP Header Handling Overflow<br />

1322 Mozilla JAR File Decompression Heap Overflow<br />

1323 Mozilla Browser 'onclick' Property Cross Domain Violation<br />

1324 Qualcomm Eudora Attachment Filename Handling Overflow<br />

1325 Microsoft Outlook Remote Buffer Overflow<br />

1326 Pine < 4.58 Multiple Overflows<br />

1327 Netscape/Mozilla/Galeon Long IRC Channel Name Overflow<br />

1328 Mozilla Javascript Array Object Heap Overflow<br />

1329 SMTP Client Return Email Address Detection<br />

1330 Mozilla Mail Client Detection<br />

1331 Qualcomm Eudora Mail Client Detection<br />

1332 Microsoft Outlook Express Mail Client Detection<br />

1333 Mutt Mail Client Detection<br />

1334 Lotus Notes Mail Client Detection<br />

1335 Pegasus Mail Client Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

Family SMTP Clients 109<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


1336 Elm Mail Client Detection<br />

2145 DtMail Local Format String Privilege Escalation<br />

2150 Outlook Express BCC: Recipient Disclosure<br />

2168 Nakedsoft Gaucho < 1.4.0 Build 151 Content-Type Header Overflow<br />

2288 Mozilla / Mozilla Thunderbird Multiple Vulnerabilities<br />

2341 Local POP Account Detection<br />

2588 Qualcomm Eudora < 6.2.1 Unspecified Remote Overflows<br />

2609 PGP Email Client Detection<br />

2610 Generic Email Client Detection<br />

2611 Generic Email Client Detection<br />

2672 Sylpheed < 1.0.3 Invalid Header Overflow<br />

2703 Mozilla Thunderbird < 1.0.2 Multiple Vulnerabilities<br />

2713 Ximian Evolution < 2.0.4 Content-Parsing DoS<br />

2777 Sylpheed MIME Content-parsing Overflow<br />

2811 KDE KMail HTML Email Information Spoofing<br />

2814 Pine < 4.63 rpdump Symlink Arbitrary File Overwrite<br />

3013 Outlook Express NNTP LIST Command Remote Overflow<br />

3052 Lotus Notes < 6.5.5 Web Mail Attachment HTML Injection<br />

3062 Outlook Express Multiple DoS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

3161 Ximian Evolution < 2.3.7 Content-Parsing Multiple Vulnerabilities SMTP N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

17605<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

18489<br />

N/A<br />

18680<br />

Family SMTP Clients 110


3172 Mutt < 1.5.11 imap/browse.c Remote Overflow<br />

3174 Elm 'Expires' Header Overflow<br />

3232 Opera < 8.50 Mail Client Multiple Vulnerabilities<br />

3258 Mozilla Thunderbird < 1.5 Multiple Vulnerabilities<br />

3285 Sylpheed < 2.0.4 Address Book LDIF Import Overflow<br />

3332 Pegasus Email Client < 4.31 Multiple Remote Overflows<br />

3365<br />

Microsoft Outlook / Exchange TNEF Decoding Arbitrary Code<br />

Execution<br />

3366 Microsoft Outlook Email Client Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

3388 Ximian Evolution < 2.3.8 Inline XML Content-parsing Overflow<br />

3412 DidTheyReadIt Email Tracker Application Detection<br />

3413 pointofmail Email Tracker Application Detection<br />

3422 Lotus Notes < 6.5.5 or 7.0.1 Multiple Vulnerabilities<br />

3510 Outlook Express .wab File Processing Overflow<br />

3513 Mozilla Thunderbird < 1.5.0.2 or 1.0.8 Multiple Vulnerabilities<br />

3638 Thunderbird < 1.5.0.4 Multiple Vulnerabilities<br />

3640 SpamAssassin spamd vpopmail Username Command Injection<br />

3694 Mozilla Thunderbird < 1.5.0.5 Multiple Vulnerabilities<br />

3745 Mozilla Thunderbird < 1.5.0.7 Multiple Vulnerabilities<br />

3811 Mozilla Thunderbird < 1.5.0.8 Multiple Vulnerabilities<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

20390<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

22096<br />

22370<br />

23635<br />

Family SMTP Clients 111


3860 Cumulative <strong>Security</strong> Update for Outlook Express (923694)<br />

3867 Mozilla Thunderbird < 1.5.0.9 Multiple Vulnerabilities<br />

3893 PGP Desktop < 9.5.1 PGPserv Arbitrary Code Execution<br />

3918 SpamAssassin < 3.1.8 Malformed HTML Long URI DoS<br />

3931 Mozilla Thunderbird < 1.5.0.10 Multiple Vulnerabilities<br />

3948 GnuPG < 1.4.7 Multiple Vulnerabilities<br />

4072 Mozilla Thunderbird < 1.5.0.12 Multiple Vulnerabilities<br />

4088<br />

4090<br />

4092<br />

4093<br />

Cumulative <strong>Security</strong> Update for Microsoft Outlook Express and<br />

Windows Mail (929123)<br />

Cumulative <strong>Security</strong> Update for Microsoft Outlook Express and<br />

Windows Mail (929123)<br />

Cumulative <strong>Security</strong> Update for Microsoft Outlook Express and<br />

Windows Mail (929123)<br />

Cumulative <strong>Security</strong> Update for Microsoft Outlook Express and<br />

Windows Mail (929123)<br />

4100 SpamAssassin < 3.2.1 spamd Symlink Local DoS<br />

4135 Apple iPhone Mail Program Detection<br />

4152 Mozilla Thunderbird < 1.5.0.13 Multiple Vulnerabilities<br />

4186 Lotus Notes < 7.0.2 ntmulti.exe Local Privilege Escalation<br />

4232<br />

4233<br />

4234<br />

4235<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Cumulative <strong>Security</strong> Update for Microsoft Outlook Express and<br />

Windows Mail (941202)<br />

Cumulative <strong>Security</strong> Update for Microsoft Outlook Express and<br />

Windows Mail (941202)<br />

Cumulative <strong>Security</strong> Update for Microsoft Outlook Express and<br />

Windows Mail (941202)<br />

Cumulative <strong>Security</strong> Update for Microsoft Outlook Express and<br />

Windows Mail (941202)<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

23835<br />

23929<br />

24246<br />

N/A<br />

24748<br />

N/A<br />

25350<br />

25487<br />

25487<br />

25487<br />

25487<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

26962<br />

26962<br />

26962<br />

26962<br />

4236 Cumulative <strong>Security</strong> Update for Microsoft Outlook Express and SMTP 26962<br />

Family SMTP Clients 112


Windows Mail (941202) Clients<br />

4256 Mozilla Thunderbird < 2.0.0.8 Multiple Vulnerabilities<br />

4262 Lotus Notes < 7.0.3 HTML Email RTF Conversion Overflow<br />

4367 Thunderbird < 2.0.0.12 Multiple Vulnerabilities<br />

4421<br />

Vulnerability in Microsoft Outlook Could Allow Remote Code<br />

Execution (949031)<br />

4446 Thunderbird < 2.0.0.13 Multiple Vulnerabilities<br />

4451 GnuPG < 1.4.9 / 2.0.9 Key Import Duplicate ID Memory Corruption<br />

4485 eTrust SCM SMTP Version Detection<br />

4492 eTrust SCM SMTP Version Detection<br />

4497 Mozilla Thunderbird < 2.0.0.14 Multiple Vulnerabilities<br />

4609 Mozilla Thunderbird < 2.0.0.16 Multiple Vulnerabilities<br />

4696 Mozilla Thunderbird < 2.0.0.17 Multiple Vulnerabilities<br />

4762 Mozilla Thunderbird < 2.0.0.18 Multiple Vulnerabilities<br />

4806 Mozilla Thunderbird < 2.0.0.19 Multiple Vulnerabilities<br />

4964 Mozilla Thunderbird < 2.0.0.21 Multiple Vulnerabilities<br />

5001 Mozilla Thunderbird < 2.0.0.21 Multiple Vulnerabilities<br />

5353<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Thunderbird < 2.0.0.23 Certificate Authority (CA) Common<br />

Null Byte Handling SSL MiTM Weakness<br />

5354 Mozilla Thunderbird < 3.0.1 Multiple Vulnerabilities<br />

5355 Mozilla Thunderbird < 3.0.2 Multiple Vulnerabilities<br />

5480 Mozilla Thunderbird < 2.0.0.24 Multiple Vulnerabilities<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

N/A<br />

N/A<br />

N/A<br />

31414<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

32134<br />

33563<br />

34294<br />

34819<br />

35287<br />

35977<br />

N/A<br />

40664<br />

44111<br />

44961<br />

45110<br />

Family SMTP Clients 113


5483 Mozilla Thunderbird Unsupported Version Detection<br />

5496 Mozilla Thunderbird < 3.0.4 Multiple Vulnerabilities<br />

5508 Possible RBL/CBL Blacklisting Message Detected<br />

5509 Possible RBL/CBL Blacklisting Message Detected<br />

5558 Mozilla Thunderbird Version Detection<br />

5582 Mozilla Thunderbird < 3.0.5 Multiple Vulnerabilities<br />

5608 Thunderbird 3.0.x < 3.0.6 Multiple Vulnerabilities<br />

5609 Thunderbird 3.1.x < 3.1.1 Multiple Vulnerabilities<br />

5658 Thunderbird < 3.0.x < 3.0.7 Multiple Vulnerabilities<br />

5659 Thunderbird < 3.1.3 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

5683 Mozilla Thunderbird 3.0.x < 3.0.9 Multiple Vulnerabilities<br />

5684 Mozilla Thunderbird 3.1.x < 3.1.5 Multiple Vulnerabilities<br />

5692 Mozilla Thunderbird 3.0.x < 3.0.10 Buffer Overflow Vulnerability<br />

5693 Mozilla Thunderbird 3.1.x < 3.1.6 Buffer Overflow Vulnerability<br />

5729 Mozilla Thunderbird 3.0.x < 3.0.11 Multiple Vulnerabilities<br />

5730 Mozilla Thunderbird 3.1.x < 3.1.7 Multiple Vulnerabilities<br />

5810 Mozilla Thunderbird 3.1.x < 3.1.8 Multiple Vulnerabilities<br />

5903 Mozilla Thunderbird 3.1.x < 3.1.10 Multiple Vulnerabilities<br />

5966 Mozilla Thunderbird 3.1.x < 3.1.11 Multiple Vulnerabilities<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

40362<br />

45394<br />

N/A<br />

N/A<br />

N/A<br />

47125<br />

47783<br />

47784<br />

49147<br />

49148<br />

50086<br />

50087<br />

50384<br />

50385<br />

51122<br />

51123<br />

52532<br />

53596<br />

55289<br />

6010 Mozilla Thunderbird 5 Multiple Vulnerabilities SMTP 55887<br />

Family SMTP Clients 114


6011 Mozilla Thunderbird 3.1 < 3.1.12 Multiple Vulnerabilities<br />

6029 Mozilla Thunderbird 6 Multiple Vulnerabilities<br />

6110 Mozilla Thunderbird 8 Multiple Vulnerabilities<br />

6357 E-mail Client Detection<br />

6498 Mozilla Thunderbird 12.x < 12 Multiple Vulnerabilities<br />

6499 Roving Constant Contact E-mail Marketing Client Detection<br />

6520 Mozilla Thunderbird 13.x < 13 Multiple Vulnerabilities<br />

6560 Mozilla Thunderbird 14.x <<br />

6604 Mozilla Thunderbird 15.x <<br />

6614 Mozilla Thunderbird 16.x < 16.0.2 Multiple Vulnerabilities<br />

6627 Mozilla Thunderbird 16.x <<br />

6669 Mozilla Thunderbird 17.x < 17.0.2 Multiple Vulnerabilities<br />

6683 Barracuda <strong>Network</strong>s device detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

6692 Mozilla Thunderbird 17.x < 17.0.3 Multiple Vulnerabilities<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

SMTP<br />

Clients<br />

55886<br />

56336<br />

57361<br />

N/A<br />

59409<br />

N/A<br />

60045<br />

61717<br />

62582<br />

62746<br />

63000<br />

63553<br />

N/A<br />

64724<br />

Family SMTP Clients 115


Family SMTP Servers<br />

<strong>PVS</strong><br />

ID<br />

PLUGIN NAME FAMILY<br />

1156 Novell GroupWise Internet Mail Server Detection<br />

1173 SMTP Server Inbound .exe Attachment Detection<br />

1206 Courier < 0.45 Japanese Codeset Conversion Overflows<br />

2004 SMTP Banner - Generic<br />

2005 SMTP Banner - Port Specific<br />

2006 CommuniGate Pro < 3.2 HTTP Configuration Port Remote Overflow<br />

2007 WebShield SMTP Header DoS / Filter Bypass<br />

2008 Lotus Domino < 5.0.12 / 6.0.1 Multiple Vulnerabilities<br />

2009 Sendmail .forward File Local Privilege Escalation<br />

2010 Sendmail .forward File Local Privilege Escalation<br />

2011 Sendmail < 8.12.1 RestrictQueueRun Option Local DoS<br />

2012 Sendmail < 8.9.3 Header Parsing Redirection DoS<br />

2013 Sendmail < 8.8.5 MIME Conversion Malformed Header Overflow<br />

2014 Sendmail < 8.8.3 mime7to8 Function Overflow<br />

2015 Sendmail < 8.10.0 mail.local Newline Handling Remote DoS<br />

2016 Sendmail < 8.6.8 Long Debug Local Overflow<br />

2017 Eserv SMTP Memory Leak<br />

2018 Sendmail < 8.11.6 Local Overflow<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

NESSUS<br />

ID<br />

N/A<br />

N/A<br />

12102<br />

10263<br />

10263<br />

10048<br />

10557<br />

11338<br />

11364<br />

11364<br />

11087<br />

11352<br />

10055<br />

10588<br />

11351<br />

11348<br />

11619<br />

10729<br />

Family SMTP Servers 116


2019 Sendmail < 8.6.10 IDENT Remote Overflow<br />

2020 Sendmail < 8.12.8 Header Handling Remote Overflow<br />

2021 Sendmail < 8.8.4 Group Permissions Local Privilege Escalation<br />

2022 EXPN Command Information Disclosure<br />

2023 EXPN Command Information Disclosure<br />

2024 Sendmail < 8.10.1 ETRN Command Remote DoS<br />

2025 Sendmail < 8.12.5 DNS Map TXT Query Overflow<br />

2026 Sendmail 'decode' Alias Arbitrary File Overwrite<br />

2027 Sendmail ResrictQueueRun Debug Information Disclosure<br />

2028 Sendmail DEBUG Arbitrary Command Execution<br />

2029 Sendmail < 8.8.3 Local Overflow<br />

2030 Sendmail < 8.12.1 Custom Configuration File Privilege Escalation<br />

2031 Sendmail < 8.12.9 NOCHAR Value Overflow<br />

2032 Sendmail HELO Command Overflow<br />

2033 Microsoft Exchange IMC SMTP EHLO Hostname Overflow<br />

2034 TFS SMTP < 4.0 Build 210 MAIL FROM Remote Overflow<br />

2035 Xtramail SMTP Multiple Command Remote Overflows<br />

2036 SLMail SMTP Multiple Overflows<br />

2037 FTGate Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

10278<br />

11316<br />

11349<br />

10249<br />

10249<br />

N/A<br />

11232<br />

10248<br />

11088<br />

10247<br />

11346<br />

11086<br />

11499<br />

10260<br />

11053<br />

10284<br />

10324<br />

11593<br />

11579<br />

2038 Lotus Domino < 6.0.1 Multiple SMTP Vulnerabilities SMTP 11386<br />

Family SMTP Servers 117


2039 Sendmail < 8.12.8 Double Pipe smrsh Bypass Overflow<br />

2040 MS SMTP NULL Session Mail Relay<br />

2041 ISMail < 1.4.5 Multiple Command Domain Name Handling Overflow<br />

2042 Youngzsoft CMailServer < 4.0.2003.03.30 RCPT TO Overflow<br />

2043 Sendmail < 8.12.10 prescan() Function Remote Overflow<br />

2044 Sendmail < 8.7.6 GECOS Field Local Overflow DoS<br />

2046 Sendmail SMTP Server Detection<br />

2047 Lotus Domino SMTP Server Detection<br />

2048 Clearswift MAILsweeper for SMTP < 4.3.15 Multiple Vulnerabilities<br />

2049 Ipswitch IMail Weak Password Encryption Weakness<br />

2157 Merak Mail Server < 7.5.2 Web Mail Module Multiple Vulnerabilities<br />

2256 Ipswitch IMail Server < 8.13.0 Multiple Vulnerabilities<br />

2257 Ipswitch IMail Server < 8.13.0 Multiple Vulnerabilities<br />

2311 Alt-N MDaemon Multiple Buffer Overflows<br />

2319 Canon ImageRUNNER Printer Email Arbitrary Content Printing / DoS<br />

2340 Kerio MailServer < 6.0.3 Unspecified Code Execution<br />

2358 Microsoft SMTP DNS Lookup Overflow (885881)<br />

2384 MailEnable SMTP Server < 1.5.1 Undisclosed Vulnerabilities<br />

2412<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

CCProxy < 6.3 Logging Function HTTP GET Request Remote<br />

Overflow<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

11321<br />

11308<br />

11272<br />

N/A<br />

11838<br />

11347<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

14819<br />

15404<br />

15464<br />

15611<br />

15774<br />

Family SMTP Servers 118


2430 Alt-N MDaemon File Creation Local Privilege Escalation<br />

2432 Youngzsoft CMailServer < 5.2.1 Multiple Remote Vulnerabilities<br />

2435<br />

MailEnable < 1.53 IMAP Service Multiple Remote Pre-Authentication<br />

Buffer Overflows<br />

2473 ArGoSoft Mail Server < 1.8.7.0 Unspecified XSS<br />

2482 Macallan Mail Solution < 4.1.1.0 Multiple HTTP Vulnerabilities<br />

2505<br />

Exim < 4.44 Illegal IPv6 Address / SPA Authentication Buffer<br />

Overflow<br />

2606 ArGoSoft Mail Server < 1.8.7.4 HTML Injection<br />

2695<br />

Ipswitch IMail < 8.15 Hotfix 1 IMAP EXAMINE Argument Buffer<br />

Overflow<br />

2717 MailEnable < 1.8.1 mailto Remote Format String Overflow<br />

2739<br />

NetWin SurgeMail < 3.0.0c2 Multiple Remote Unspecified<br />

Vulnerabilities<br />

2772 Smail < 3.2.0.121 Multiple Vulnerabilities<br />

2773 OpenBSD spamd Service Detection<br />

2818 GLD Greylisting Server < 1.5 Detection<br />

2834 Kerio MailServer < 6.0.9 Malformed Email DoS<br />

2847 ArGoSoft Mail Server Multiple Vulnerabilities<br />

2873 Kerio MailServer < 6.0.10 Unspecified Admin Web Interface DoS<br />

2921<br />

NetWin SurgeMail < 3.0.0c3 Multiple Unspecified Remote<br />

Vulnerabilities<br />

3009 GoodTech < 5.15 SMTP RCPT TO: Single Character DoS<br />

3029 Sendmail < 8.13.4 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

N/A<br />

N/A<br />

15852<br />

16012<br />

N/A<br />

N/A<br />

16364<br />

17311<br />

17364<br />

17594<br />

17633<br />

N/A<br />

N/A<br />

N/A<br />

18140<br />

18184<br />

18354<br />

18433<br />

3036 True North eMailServer < 5.3.4 Build 2019 LIST Command Remote SMTP 18570<br />

Family SMTP Servers 119<br />

N/A


3039<br />

DoS Servers<br />

Inframail SMTP Server < 7.12 MAIL FROM Command Remote<br />

Overflow<br />

3048 Courier Mail Server < 0.50.1 SPF Data Lookup Remote DoS<br />

3106<br />

GoodTech SMTP Server < 5.17 'RCPT TO' Command Remote<br />

Overflow<br />

3155 BusinessMail SMTP < 4.7 Multiple Command Remote Overflows<br />

3317 Ipswitch IMail Format String and 'LIST' Command DoS<br />

3321 Apache James < 2.2.1 Spooler retrieve Function DoS<br />

3322<br />

Courier Mail Server < 0.52.2 Deactivated Account Authentication<br />

Bypass<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

3361 Eudora Internet Mail Server < 3.2.8 NTLM Authentication Request DoS SMTP<br />

Servers<br />

3440 True North eMailServer SEARCH Command Remote Overflow<br />

3447 ArGoSoft Mail Server < 1.8.8.6 '_DUMP' Information Disclosure<br />

3448 MTS Professional < 1.61.1.85 SMTP Open Relay<br />

3469 Kerio MailServer < 6.1.3 Patch 1 Remote DoS<br />

3473<br />

Ipswitch Multiple Products < 2006.03 IMAP FETCH Command<br />

Overflow<br />

3484 Sendmail < 8.13.6 Unspecified Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

3487 Sendmail < 8.13.6 Signal Handler Remote Overflow<br />

3504 McAfee WebShield < 4.5 MR2 Bounced Emails Format String<br />

3646 Courier Mail Server < 0.53.2 Crafted Username Encoding DoS<br />

3653 Sendmail < 8.13.7 Multi-part MIME Message Handling DoS<br />

3659 Clearswift MAILsweeper for SMTP < 4.3.20 Multiple Vulnerabilities<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

18588<br />

18620<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

20977<br />

N/A<br />

N/A<br />

21051<br />

Family SMTP Servers 120<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


3670 MailEnable SMTP Service HELO Command Remote DoS<br />

3690<br />

VisNetic MailServer < 8.5.0.5 lang_settings Parameter Remote File<br />

Inclusion<br />

3738 Ipswitch IMail Server RCPT String Remote Overflow<br />

3892 Trend Micro InterScan VirusWall Version Detection<br />

3936 Ipswitch IMail Server < 2006.2 Multiple Overflows<br />

4077 Lotus Domino Web Server Multiple Vulnerabilities<br />

4122 Potential SPAM Server Detection<br />

4123 Potential SPAM Server Detection<br />

4124 Potential SPAM Server Detection<br />

4125 Potential SPAM Server Detection<br />

4126 Potential SPAM Server Detection<br />

4127 Potential SPAM Server Detection<br />

4141 Ipswitch IMail Server < 2006.21 Multiple Vulnerabilities<br />

4148 Kerio MailServer < 6.4.1 Attachment Filter Unspecified Issue<br />

4184 Potential SPAM Server Detection<br />

4185 Potential SPAM Server Detection<br />

4203 MailMarshal <<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

4207 Hexamail < 3.0.1.004 POP3 Service USER Command Overflow<br />

4217 Merak Mail < 9.0.0 BODY Element HTML Injection<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

4261 Lotus Domino Multiple Vulnerabilities SMTP N/A<br />

N/A<br />

22079<br />

N/A<br />

N/A<br />

24782<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

25737<br />

Family SMTP Servers 121<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


4268 Ipswitch IMail Client < 2006.23 Multipart MIME Email Overflow<br />

4291 Ability Mail Server < 2.61 Multiple Vulnerabilities<br />

4339 Lotus Domino < 7.0.2 FP3 Unspecified DoS<br />

4381 Kerio MailServer < 6.5.0 Multiple Vulnerabilities<br />

4431 NetWin SurgeMail <<br />

4469 Potential SPAM Server Detection<br />

4517 Lotus Domino < 8.0.1 / 7.0.3 FP1 Multiple Vulnerabilities<br />

4555 SurgeMail < 3.9g2-2 IMAP Command Handling Unspecified DoS<br />

4695 Postfix Detection<br />

4697 MailMarshal < 6.4 Spam Quarantine Management XSS<br />

4797 Kerio MailServer < 6.6.2 (KSEC-2008-12-16-01) Multiple XSS<br />

4800 IceWarp Merak Mail Server < 9.4.0 IMG Tag XSS<br />

5025 Sendmail < 8.13.2 Remote Overflow<br />

5048 Kerio MailServer < 6.6.2 Patch 3 / 6.7.0 Patch 1 XSS<br />

5185 Ability Mail Server < 2.70 Remote Denial of Service<br />

5293 Sendmail < 8.14.4 SSL Certificate NULL Character Spoofing<br />

5347 XMail < 1.27 Insecure Temporary File Creation<br />

5510<br />

MS10-024: Vulnerabilities in Microsoft Exchange and Windows SMTP<br />

Service Could Allow Denial of Service (981832)<br />

5557 Exim < 4.72 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

27590<br />

28289<br />

29925<br />

31119<br />

N/A<br />

N/A<br />

32433<br />

33277<br />

N/A<br />

34336<br />

35258<br />

35281<br />

N/A<br />

N/A<br />

41644<br />

43637<br />

44942<br />

45517<br />

46783<br />

Family SMTP Servers 122


5561<br />

Kerio MailServer / Connect < 7.0.1 Administration Console File<br />

Disclosure and File Corruption Vulnerability<br />

5600 Ipswitch IMail Server < 11.02 Multiple Vulnerabilities<br />

5752 Exim < 4.74 Local Privilege Escalation Vulnerability<br />

5910 Exim < 4.70 string_format Function Remote Overflow<br />

5911<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Exim < 4.76 dkim_exim_verify_finish Remote Format String<br />

Vulnerability<br />

5929 Checkpoint Firewall ESMTP Service Detection<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

SMTP<br />

Servers<br />

47140<br />

47743<br />

51861<br />

51179<br />

53856<br />

Family SMTP Servers 123<br />

N/A


Family SNMP Traps<br />

<strong>PVS</strong><br />

ID<br />

PLUGIN NAME FAMILY<br />

1344 SNMP Public Community String<br />

1345 SNMP Public Community String<br />

1346 SNMP Private Community String<br />

1347 SNMP Private Community String<br />

1348 SNMP ilmi Community String<br />

1349 SNMP ilmi Community String<br />

1350 SNMP ILMI Community String<br />

1351 SNMP ILMI Community String<br />

1352 SNMP System Community String<br />

1353 SNMP System Community String<br />

1354 SNMP Write Community String<br />

1355 SNMP Write Community String<br />

1356 SNMP all Community String<br />

1357 SNMP all Community String<br />

1358 SNMP Monitor Community String<br />

1359 SNMP Monitor Community String<br />

1360 SNMP Agent Community String<br />

1361 SNMP Agent Community String<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

NESSUS<br />

ID<br />

Family SNMP Traps 124<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


1362 SNMP Manager Community String<br />

1363 SNMP Manager Community String<br />

1364 SNMP OrigEquipMfr Community String<br />

1365 SNMP OrigEquipMfr Community String<br />

1366 SNMP Admin Community String<br />

1367 SNMP Admin Community String<br />

1368 SNMP Default Community String<br />

1369 SNMP Default Community String<br />

1370 SNMP Password Community String<br />

1371 SNMP Password Community String<br />

1372 SNMP Tivoli Community String<br />

1373 SNMP Tivoli Community String<br />

1374 SNMP Openview Community String<br />

1375 SNMP Openview Community String<br />

1376 SNMP community Community String<br />

1377 SNMP community Community String<br />

1378 SNMP snmp Community String<br />

1379 SNMP snmp Community String<br />

1380 SNMP snmpd Community String<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

1381 SNMP snmpd Community String SNMP N/A<br />

Family SNMP Traps 125<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


1382 SNMP security Community String<br />

1383 SNMP <strong>Security</strong> Community String<br />

1384 SNMP rmon Community String<br />

1385 SNMP rmon Community String<br />

1386 SNMP rmon_admin Community String<br />

1387 SNMP rmon_admin Community String<br />

1388 SNMP hp_admin Community String<br />

1389 SNMP hp_admin Community String<br />

1390 SNMP NoGaH$@! Community String<br />

1391 SNMP NoGaH$@! Community String<br />

1392 SNMP 0392a0 Community String<br />

1393 SNMP 0392a0 Community String<br />

1394 SNMP xyzzy Community String<br />

1395 SNMP xyzzy Community String<br />

1396 SNMP agent_steal Community String<br />

1397 SNMP agent_steal Community String<br />

1398 SNMP freekevin Community String<br />

1399 SNMP freekevin Community String<br />

1400 SNMP fubar Community String<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

Family SNMP Traps 126<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


1401 SNMP fubar Community String<br />

1402 SNMP secret Community String<br />

1403 SNMP secret Community String<br />

1404 SNMP cisco Community String<br />

1405 SNMP cisco Community String<br />

1406 SNMP apc Community String<br />

1407 SNMP apc Community String<br />

1408 SNMP ANYCOM Community String<br />

1409 SNMP ANYCOM Community String<br />

1410 SNMP cable-docsis Community String<br />

1411 SNMP cable-docsis Community String<br />

1412 SNMP c Community String<br />

1413 SNMP c Community String<br />

1414 SNMP cc Community String<br />

1415 SNMP cc Community String<br />

1416 SNMP cascade Community String<br />

1417 SNMP cascade Community String<br />

1418 SNMP comcomcom Community String<br />

1419 SNMP comcomcom Community String<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

1420 SNMP internal Community String SNMP N/A<br />

Family SNMP Traps 127<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


1421 SNMP internal Community String<br />

1422 SNMP blue Community String<br />

1423 SNMP blue Community String<br />

1424 SNMP yellow Community String<br />

1425 SNMP yellow Community String<br />

1426 SNMP Agent on Remote Host<br />

1427 SNMP Agent on Remote Host<br />

1428 SNMP Trap Agent on Remote Host<br />

1429 SNMP Trap Agent on Remote Host<br />

1430 Operating System Detection (SNMP)<br />

1431 Operating System Detection (SNMP)<br />

1432 <strong>Network</strong> Interfaces List Detection (SNMP)<br />

1433 <strong>Network</strong> Interfaces List Detection (SNMP)<br />

1434 Wireless Access Point Detection (SNMP)<br />

1435 Wireless Access Point Detection (SNMP)<br />

1436 Wireless Access Point Detection (SNMP)<br />

1437 Wireless Access Point Detection (SNMP)<br />

1438 Wireless Access Point Detection (SNMP)<br />

1439 Wireless Access Point Detection (SNMP)<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

10800<br />

10800<br />

10551<br />

10551<br />

11026<br />

11026<br />

11026<br />

11026<br />

11026<br />

11026<br />

Family SNMP Traps 128


1440 Wireless Access Point Detection (SNMP)<br />

1441 Wireless Access Point Detection (SNMP)<br />

2195 Cisco IOS ACL Bypass (Bug ID CSCdi34061)<br />

2196 Cisco IOS ACL Bypass (Bug ID CSCdi34061)<br />

2197 Cisco IOS ACL Bypass (Bug ID CSCdi34061)<br />

2198 Cisco IOS ACL Bypass (Bug ID CSCdi36962)<br />

2199 Cisco IOS ACL Bypass (Bug ID CSCdi36962)<br />

2200 Cisco IOS ACL Bypass (Bug ID CSCdi36962)<br />

2201<br />

2202<br />

2203<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Cisco IOS OSPF Neighbor Announcement Overflow DoS (Bug ID<br />

CSCdp58462)<br />

Cisco IOS OSPF Neighbor Announcement Overflow DoS (Bug ID<br />

CSCdp58462)<br />

Cisco IOS OSPF Neighbor Announcement Overflow DoS (Bug ID<br />

CSCdp58462)<br />

2204 Cisco IOS PPTP Packet Remote DoS (Bug ID CSCdt46181)<br />

2205 Cisco IOS PPTP Packet Remote DoS (Bug ID CSCdt46181)<br />

2206 Cisco IOS PPTP Packet Remote DoS (Bug ID CSCdt46181)<br />

2207 Cisco PPTP Authentication Bypass / DoS (Bug ID CSCdt56514)<br />

2208 Cisco PPTP Authentication Bypass / DoS (Bug ID CSCdt56514)<br />

2209 Cisco PPTP Authentication Bypass / DoS (Bug ID CSCdt56514)<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

2210 Cisco VPN Concentrator HTML Interface DoS (Bug ID CSCdu15622) SNMP<br />

Traps<br />

2211 Cisco VPN Concentrator HTML Interface DoS (Bug ID CSCdu15622) SNMP<br />

Traps<br />

11026<br />

11026<br />

10973<br />

10973<br />

10973<br />

10974<br />

10974<br />

10974<br />

11283<br />

11283<br />

11283<br />

10979<br />

10979<br />

10979<br />

11287<br />

11287<br />

11287<br />

11288<br />

11288<br />

2213 Cisco IOS CEF Packet Information Disclosure (Bug ID CSCdu20643) SNMP 10983<br />

Family SNMP Traps 129


2214 Cisco IOS CEF Packet Information Disclosure (Bug ID CSCdu20643)<br />

2215 Cisco IOS CEF Packet Information Disclosure (Bug ID CSCdu20643)<br />

2216<br />

2217<br />

2218<br />

Cisco VPN Concentrator Service Banners Information Disclosure (Bug<br />

ID CSCdu35577)<br />

Cisco VPN Concentrator Service Banner Information Disclosure (Bug<br />

ID CSCdu35577)<br />

Cisco VPN Concentrator Service Banner Information Disclosure (Bug<br />

ID CSCdu35577)<br />

2219 Cisco VPN Concentrator Invalid Login DoS (Bug ID CSCdu82823)<br />

2220 Cisco VPN Concentrator Invalid Login DoS (Bug ID CSCdu82823)<br />

2221 Cisco VPN Concentrator Invalid Login DoS (Bug ID CSCdu82823)<br />

2222<br />

2223<br />

2224<br />

2225<br />

2226<br />

2227<br />

2228<br />

2229<br />

2230<br />

2231<br />

2232<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Cisco VPN Concentrator PPTP Multiple Vulnerabilities (Bug ID<br />

CSCdv66718)<br />

Cisco VPN Concentrator PPTP Multiple Vulnerabilities (Bug ID<br />

CSCdv66718)<br />

Cisco VPN Concentrator PPTP Multiple Vulnerabilities (Bug ID<br />

CSCdv66718)<br />

Cisco VPN Concentrator HTML Source Cleartext Password Disclosure<br />

(Bug ID CSCdv88230, CSCdw22408)<br />

Cisco VPN Concentrator HTMl Source Cleartext Password Disclosure<br />

(Bug ID CSCdv88230, CSCdw22408)<br />

Cisco VPN Concentrator HTML Source Cleartext Password Disclosure<br />

(Bug ID CSCdv88230, CSCdw22408)<br />

Cisco VPN Concentrator HTML Source Certificate Password<br />

Disclosure (Bug ID CSCdw50657)<br />

Cisco VPN Concentrator HTML Source Certificate Password<br />

Disclosure (Bug ID CSCdw50657)<br />

Cisco VPN Concentrator HTML Source Certificate Password<br />

Disclosure (Bug ID CSCdw50657)<br />

Cisco VPN Concentrator ACL Bypass / DoS (Bug ID CSCdx07754,<br />

CSCdx24622, CSCdx24632)<br />

Cisco VPN Concentrator ACL Bypass / DoS (Bug ID CSCdx07754,<br />

CSCdx24622, CSCdx24632)<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

10983<br />

10983<br />

11289<br />

11289<br />

11289<br />

11290<br />

11290<br />

11290<br />

11291<br />

11291<br />

11291<br />

11292<br />

11292<br />

11292<br />

11294<br />

11294<br />

11294<br />

11293<br />

11293<br />

Family SNMP Traps 130


2233<br />

2234<br />

2235<br />

2236<br />

2237<br />

2238<br />

2239<br />

Cisco VPN Concentrator ACL Bypass / DoS (Bug ID CSCdx07754,<br />

CSCdx24622, CSCdx24632)<br />

Cisco VPN Concentrator "No Encryption" Option Remote DoS (Bug<br />

ID CSCdx39981)<br />

Cisco VPN Concentrator "No Encryption" Option Remote DoS (Bug<br />

ID CSCdx39981)<br />

Cisco VPN Concentrator "No Encryption" Option Remote DoS (Bug<br />

ID CSCdx39981)<br />

Cisco VPN Concentrator LAN-to-LAN IPSEC Tunnel Termination<br />

DoS (Bug ID CSCdx54675)<br />

Cisco VPN Concentrator LAN-to-LAN IPSEC Tunnel Termination<br />

DoS (Bug ID CSCdx54675)<br />

Cisco VPN Concentrator LAN-to-LAN IPSEC Tunnel Termination<br />

DoS (Bug ID CSCdx54675)<br />

2240 Cisco Multiple DoS (Bug ID CSCdx92043)<br />

2241 Cisco Multiple DoS (Bug ID CSCdx92043)<br />

2242 Cisco Multiple DoS (Bug ID CSCdx92043)<br />

2243 Cisco TFTP Server Long Filename DoS (Bug ID CSCdy03429)<br />

2244 Cisco TFTP Server Long Filename DoS (Bug ID CSCdy03429)<br />

2245 Cisco TFTP Server Long Filename DoS (Bug ID CSCdy03429)<br />

2246<br />

2247<br />

2248<br />

2249<br />

Cisco VPN Concentrator ISAKMP Packet Remote DoS (Bug ID<br />

CSCdy38035)<br />

Cisco VPN Concentrator ISAKMP PAcket Remote DoS (Bug ID<br />

CSCdy38035)<br />

Cisco VPN Concentrator ISAKMP Packet Remote DoS (Bug ID<br />

CSCdy38035)<br />

Cisco IOS SIP Packet Remote DoS (Bug ID CSCdz39284,<br />

CSCdz41124)<br />

2250 Cisco IOS SIP Packet DoS (Bug ID CSCdz39284, CSCdz41124)<br />

2251<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Cisco IOS SIP Packet Remote DoS (Bug ID CSCdz39284,<br />

CSCdz41124)<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

2299 GNU Radius < 1.2.94 SNMP Request Remote DoS SNMP N/A<br />

11293<br />

11295<br />

11295<br />

11295<br />

11296<br />

11296<br />

11296<br />

11379<br />

11379<br />

11379<br />

11056<br />

11056<br />

11056<br />

11297<br />

11297<br />

11297<br />

11380<br />

11380<br />

11380<br />

Family SNMP Traps 131


2300 GNU Radius < 1.2.94 SNMP Request Remote DoS<br />

3023 Cisco VPN Concentrator Group Name Enumeration<br />

3749 SNMP 'cable-docsis' Community String<br />

3750 SNMP 'cable-docsis' Community String<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

SNMP<br />

Traps<br />

Family SNMP Traps 132<br />

N/A<br />

N/A<br />

N/A<br />

N/A


Family SSH<br />

<strong>PVS</strong><br />

ID<br />

PLUGIN NAME FAMILY NESSUS<br />

ID<br />

1966 F-Secure SSH Password Authentication Policy Evasion SSH 12099<br />

1967 SSH Server Detection SSH 10267<br />

1968 SSH Client Detection SSH N/A<br />

1969 SSH < 3.1.5 / 3.2.2 setsid() Privilege Escalation SSH 11169<br />

1970 scp < 2.1 Traversal File Create/Overwrite SSH 11339<br />

1971 PKCS#1 Version 1.5 Session Key Retrieval SSH N/A<br />

1972 SSH RSAREF Library Multiple Overflows SSH 10269<br />

1973 SSH Multiple Vulnerabilities SSH 11195<br />

1974 SSH Multiple Vulnerabilities SSH 11195<br />

1975 SSH Multiple Vulnerabilities SSH 11195<br />

1976 SSH Secure-RPC Weak Encrypted Authentication Key Recovery SSH 11340<br />

1977 SSH < 1.2.28 Kerberos NFS Share Ticket Disclosure SSH 10472<br />

1978 SSH < 1.2.25 CBC/CFB Data Stream Injection SSH 10268<br />

1979 OpenSSH Client < 2.3.0 X11 Unauthorized Remote Forwarding SSH 11343<br />

1980 SSH1 CRC-32 detect_attack Function Overflow SSH 10607<br />

1981 SSH-1 < 1.2.31 SSH Daemon Account Login Attempt Logging Failure SSH 11341<br />

1982 SSH < 3.1.2 AllowedAuthentications Remote Bypass SSH 10965<br />

1983 SSH < 3.0.1 Locked Account Remote Authentication Bypass SSH 10708<br />

1984 Portable OpenSSH < 3.6.1p2 PAM Timing Side-Channel Weakness SSH 11574<br />

1985 OpenSSH < 2.3.2 SSHv2 Public Key Authentication Bypass SSH 10608<br />

1986 OpenSSH < 3.0.1 Multiple Vulnerabilities SSH 10802<br />

1987 OpenSSH < 3.4 Multiple Remote Overflows SSH 11031<br />

1988 OpenSSH < 2.9.9 Multiple Key Type ACL Bypass SSH 10771<br />

1989 OpenSSH < 3.2.1 AFS/Kerberos Ticket/Token Passing Overflow SSH 10954<br />

1990 OpenSSH < 3.1 Channel Code Off by One Privilege Escalation SSH 10883<br />

1991 OpenSSH < 2.1.1 UseLogin Local Privilege Escalation SSH 10439<br />

1992<br />

OpenSSH < 3.0.2 UseLogin Environment Variable Local Command<br />

Execution<br />

SSH 10823<br />

1993 Dropbear SSH Server Format String SSH N/A<br />

1994 OpenSSH < 3.7 buffer_append_space Function Overflow SSH N/A<br />

Family SSH 133


1995 LSH < 1.5 lshd Daemon Remote Overflow SSH 11843<br />

1996 Portable OpenSSH < 3.7.1p2 Multiple PAM Vulnerabilities SSH 11848<br />

1997 OpenSSH Detection SSH N/A<br />

1998 PuTTY < 0.55 modpow Function Arbitrary Code Execution SSH N/A<br />

1999 Putty < 0.54 SSH2 Authentication Password Persistence Weakness SSH N/A<br />

2371 PuTTY < 0.56 Remote SSH2_MSG_DEBUG Buffer Overflow SSH N/A<br />

2427 Van Dyke SecureCRT < 4.1.9 Telnet URI Remote Command Execution SSH N/A<br />

2637 PuTTY < 0.57 SFTP Remote Buffer Overflow SSH N/A<br />

2716 Lysator < 2.0.1 LSH Unspecified Remote DoS SSH 17352<br />

3043 Tectia SSH Server < 4.3.2 Local Key Disclosure SSH N/A<br />

3059 SSH Valid Banner Check SSH N/A<br />

3205 OpenSSH < 4.2p1 GSSAPI Authentication Credential Escalation SSH N/A<br />

3207<br />

AttachmateWRQ Reflection for Secure IT Server < 6.0 Build 24<br />

Multiple Vulnerabilities<br />

SSH 19589<br />

3329 SSH Tectia Server < 5.0.1 Host Authentication Authorization Bypass SSH 20316<br />

3331 Dropbear SSH Server < 0.47 svr_ses.childpidsize Remote Overflow SSH N/A<br />

3380 Lysator LSH Seed-file File Descriptor Leak SSH N/A<br />

3428 AttachmateWRQ Reflection for Secure IT Server SFTP Format String SSH 20902<br />

3432 SSH Tectia Server SFTP Filename Logging Format String SSH 20927<br />

3466 Dropbear < 0.48 Authorization-Pending Connection Saturation DoS SSH 21023<br />

3620 FortressSSH < 0.47 SSH_MSG_KEXINIT Logging Remote Overflow SSH N/A<br />

3648 WinSCP < 3.8.2 Arbitrary Command Insertion SSH N/A<br />

3751 OpenSSH < 4.4 Multiple GSSAPI Vulnerabilities SSH 22466<br />

3754<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

OpenBSD Portable OpenSSH < 4.4.p1 GSSAPI Authentication<br />

Overflow<br />

SSH 22466<br />

3787 OpenSSH < 4.1.0p2 / 4.2 Timing Attack SSH N/A<br />

3821 SSH Server Detection (Non-standard Port) SSH N/A<br />

3929 Dropbear < 0.49 Hostkey Host Spoofing Vulnerability SSH N/A<br />

4209 OpenSSH < 4.7 Trusted X11 Cookie Connection Policy Bypass SSH N/A<br />

4214 WinSCP < 4.0.4 URL Protocol Handler Arbitrary File Transfer SSH 26027<br />

4335 SSH Tectia Server < 5.2.4 / 5.3.6 Local Privilege Escalation SSH N/A<br />

4422 SSF Server Detection SSH 31421<br />

4459 OpenSSH < 5.0 X11 Forwarding Local Session Hijacking SSH 31737<br />

Family SSH 134


4598 OpenSSH X11 < 5.1 Session Hijacking SSH N/A<br />

4628 Reflections SSH Server Version Detection SSH N/A<br />

4632<br />

Attachmate Reflection for Secure IT UNIX Server < 7.0 SP1 Multiple<br />

Vulnerabilities<br />

SSH 33948<br />

4761 SSH Tectia CBC Information Disclosure SSH N/A<br />

5247 Sun Solaris sshd Timeout Mechanism Remote Denial of Service SSH N/A<br />

5593 XLight FTP Server SFTP Directory Traversal SSH 47680<br />

5712 Serv-U < 10.3.0.1 SFTP Server Authentication Bypass Vulnerability SSH 50659<br />

5784 OpenSSH Legacy Certificate Signing Information Disclosure SSH 51920<br />

5936 <strong>PVS</strong>-SSH-Server-Session_Start SSH N/A<br />

5937 <strong>PVS</strong>-SSH-Session_Start SSH N/A<br />

6088 SSH Server Detection (realtime) SSH N/A<br />

6089 SSH Client login detected (realtime) SSH N/A<br />

6300 OpenSSH < 5.7 Multiple Vulnerabilities SSH 44081<br />

6338<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Dropbear SSH Server Channel Concurrency Use-after-free Remote<br />

Code Execution<br />

SSH 58183<br />

6642 Tectia SSH Server Authentication Bypass SSH 63156<br />

Family SSH 135


Family Web Clients<br />

<strong>PVS</strong><br />

ID<br />

PLUGIN NAME FAMILY NESSUS<br />

ID<br />

1102 WinRoute Proxy Detection<br />

1136 lftp HTTP Directory Name Handling Remote Overflow<br />

1138 Policy - SETI@HOME Client Detection<br />

1171 HTTP Based ZIP File Download Detection<br />

1239 Mozilla < 1.7 Multiple Remote Overflows<br />

1243 Opera Web Browser < 7.5.4 Multiple Vulnerabilities<br />

1309<br />

Mozilla Predictable Temporary File Symbolic Link Arbitrary File<br />

Overwrite<br />

1734 HTTP Proxy Detection<br />

1735 Web Client Detection<br />

1736 Lynx Command Line URL CRLF Injection<br />

1737 Lynx < 2.8.5 dev 6 Syslog URI Format String<br />

1738 Lynx < 2.8.3pre5 Long URL Buffer Overflow<br />

1739 Lynx Internal URL Verification Code Execution<br />

1740 Lynx < 2.8.1dev 10 Mailer Buffer Overflow<br />

1741 Konqueror < 3.1.x Sub-Frames XSS<br />

1742 Konqueror < 3.0.3 Image Handling Overflow DoS<br />

1743 Wget < 1.5.4 Symlink Permission Modification<br />

1744 Wget < 1.8.3 Rogue FTP Site File Deletion<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Family Web Clients 136<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


1745 Curl < 7.4.1 Long Error Message Buffer Overflow<br />

1746 Mozilla < 0.9 Predictable Temporary File Name File Deletion<br />

1747 Mozilla < 0.9.7 Null Byte Cookie Disclosure<br />

1748 Mozilla < 1.0rc2 Local File Detection<br />

1749 Netscape < 6.2.3 Local File Detection<br />

1750 Galeon < 1.2.2 Local File Detection<br />

1751 Mozilla < 1.0rc2 IRC Client Buffer Overflow<br />

1752 Netscape < 6.2.3 IRC Client Buffer Overflow<br />

1753 Mozilla < 1.0rc2 XMLHttpRequest File / Directory Disclosure<br />

1754 Galeon < 1.2.2 XMLHttpRequest File / Directory Disclosure<br />

1755 Netscape < 6.2.3 XMLHttpRequest File / Directory Disclosure<br />

1756 Mozilla < 1.0.1 XMLSerializer Cross-domain Policy Access<br />

1757 Galeon < 1.2.7 XMLSerializer Cross-domain Policy Access<br />

1758 Mozilla < 1.1 POP3 Client Malformed Email DoS<br />

1759 Netscape < 4.78 POP3 Client Malformed Email DoS<br />

1760 Netscape < 6.2.3 POP3 Client Malformed Email DoS<br />

1761 Mozilla < 1.0.1 Plugin Path Disclosure<br />

1763 Opera < 7.11 Filename Extension Handling Overflow<br />

1764 Opera < 7.0.3 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

1765 MailMax/Web Remote Installation Path Disclosure Web N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

11578<br />

11404<br />

Family Web Clients 137


1766 DeskNow Web Mail Cleartext Authentication<br />

1767 MPlayer Detection<br />

1768 MPlayer < 0.92.0 ASX Header Parsing Buffer Overflow<br />

1769 Mozilla Web Client Detection<br />

1770 Mozilla < 1.7.1 SSL Redirect Spoofing<br />

1771 Mozilla Browser < 1.7.2 Non-FQDN SSL Certificate Spoofing<br />

1772 Mozilla < 1.7.1 Cross-Domain Frame Loading Vulnerability<br />

1773<br />

Mozilla Browser


2133 libNSS Hello Challenge Remote Heap Overflow<br />

2169 Gecko-based Browsers for MacOS X Content Spoofing<br />

2259 Opera < 7.54.0 Empty CCCC Object JavaScript-based DoS<br />

2265 mpg123 Multiple Remote Overflows<br />

2268 eZ Multiple Products Connection Saturation Remote DoS<br />

2281 Mozilla/Firefox Linux Installation Arbitrary File Overwrite<br />

2287 Mozilla-based Web Browser Multiple Vulnerabilities<br />

2295 Mozilla / Firefox enablePrivilege Dialog Weakness<br />

2301<br />

Microsoft Internet Explorer 6 SV 1 XHTML Comment User<br />

Confirmation Bypass<br />

2304 Xine-lib < 1.0 RC6a Heap and Stack Overflows<br />

2306 Google Toolbar HTML Injection<br />

2344 RealPlayer Multiple Remote Overflows<br />

2345 Mozilla/Firefox Linux Installation Arbitrary File Deletion<br />

2373 Opera < 7.55.0 Cross-Domain Dialog Box Spoofing<br />

2374 Konqueror < 3.2.2-2 Cross-Domain Dialog Box Spoofing<br />

2376 NetCaptor Cross-Domain Dialog Spoofing<br />

2379 Konqueror Cross-Domain Scripting<br />

2380 Quicktime Multiple Integer Overflows<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

2381 RealPlayer Skin File Handling Buffer Overflow<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

2396 Pavuk < 0.9.31 Multiple Unspecified Remote Buffer Overflows Web N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

17656<br />

15395<br />

15408<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

17637<br />

Family Web Clients 139<br />

N/A


2399 EZ-IPupdate show_message() Remote Format String<br />

2402 Firefox < 1.0.0 IMG Tag Multiple Vulnerabilities<br />

2424 OmniWeb Browser Cross-Domain Dialog Box Spoofing<br />

2449 GNU WGet Multiple Remote Vulnerabilities<br />

2458<br />

MPlayer < 1.0pre5try2 Get_Header Remote Client-Side Buffer<br />

Overflow<br />

2459 Xine-Lib < 1.0-rc8 Remote Client-Side Buffer Overflow<br />

2467 Opera < 7.54u1 Download Box Spoofing<br />

2468 Netscape < 7.2 Cross-domain Window Injection<br />

2471 GREED Multiple Remote Vulnerabilities<br />

2472 RealPlayer Unspecified Remote Buffer Overflow<br />

2481<br />

Mozilla < 1.7.5 <strong>Network</strong> News Transport Protocol Remote Heap<br />

Overflow<br />

2512 Dillo < 0.8.4-rc1 Interface Message Format String<br />

2519 Apple iTunes < 4.7.1 Playlist Buffer Overflow<br />

2521 Gracebyte <strong>Network</strong> Assistant Remote DoS<br />

2529 Konqueror < 3.3.2 Multiple Remote Java Sandbox Bypass<br />

2530 iCab Web Browser Remote Window Hijacking<br />

2531 Konqueror Web Browser < 3.3.3 Remote Window Hijacking<br />

2581 Lynx Malformed HTML Tags DoS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

2640 Curl < 7.13.1 NTLM Stack-based Buffer Overflow<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

N/A<br />

15712<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

14278<br />

16085<br />

Family Web Clients 140<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


2644 ProZilla < 1.3.7.4 Location Header Format String<br />

2652 Firefox < 1.0.1 Multiple Vulnerabilities<br />

2666 RealPlayer < 6.0.12.1059 Multiple Remote Overflows<br />

2671 Mozilla < 1.7.6 Multiple Vulnerabilities<br />

2704 Mozilla Firefox < 1.0.2 Multiple Vulnerabilities<br />

2788 Firefox < 1.0.3 Multiple Vulnerabilities<br />

2789 Mozilla < 1.7.7 Multiple Vulnerabilities<br />

2794 Pavuk < 0.9.32 Multiple Unspecified Remote Buffer Overflows<br />

2803 Axel < 1.0b conn.c HTTP Redirection Remote Overflow<br />

2832 MusicMatch Multiple Vulnerabilities<br />

2844 MPlayer < 1.0pre7 Multiple Remote Heap-based Overflows<br />

2869 FilePocket File Sharing Application Detection<br />

2887 Mozilla Firefox < 1.0.4 Multiple Vulnerabilities<br />

2889 Apple iTunes < 4.8 MPEG-4 File Handling Overflow<br />

2899 Quicktime < 7.0.1 Web Plugin Information Disclosure<br />

2902 Mozilla Browser < 1.7.8 Multiple Vulnerabilities<br />

3007 AVG AntiVirus Version Detection<br />

3015 Opera Multiple Injection Vulnerabilities<br />

3018 HTTP Plaintext Password Authentication<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

N/A<br />

17603<br />

17254<br />

17604<br />

N/A<br />

18064<br />

18065<br />

N/A<br />

N/A<br />

18049<br />

N/A<br />

N/A<br />

18243<br />

18214<br />

18521<br />

18244<br />

N/A<br />

18503<br />

3030 RealPlayer < 6.0.12.1212 vidplin.dll Crafted AVI Overflow Web 18560<br />

Family Web Clients 141<br />

N/A


3031 Metasploit Framework Engine Detection<br />

3033 ClamAV < 0.86.1 Content-parsing DoS<br />

3044 Prevx Pro 2005 <<br />

3066 Mozilla Firefox < 1.0.5 Multiple Vulnerabilities<br />

3067 Mozilla Browser < 1.7.10 Multiple Vulnerabilities<br />

3099 Firefox < 1.0.6 Multiple Vulnerabilities<br />

3108 ClamAV < 0.86.2 Content-parsing Multiple Overflows<br />

3115 Generic Botnet Client Detection<br />

3153 Opera Multiple Injection Vulnerabilities<br />

3154 MetaSploit < 2.4-current Unspecified Vulnerability<br />

3177 OpenVPN TCP Proxy Client Detection<br />

3183 MPlayer < 1.0pre8 Audio Header strf Overflow<br />

3229 ClamAV < 0.86.3 Content-parsing Multiple Overflows<br />

3233 Opera < 8.50 Upload Flaw<br />

3238 Mozilla Browser < 1.7.12 Multiple Vulnerabilities<br />

3239 Firefox < 1.0.7 Multiple Vulnerabilities<br />

3240 Maxthon Web Browser < 1.3.3 Cross-Domain Dialog Box Spoofing<br />

3254 ClamAV < 0.87.2 Content-parsing DoS<br />

3255 GNU WGet < 1.10.2 Buffer Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

N/A<br />

N/A<br />

18616<br />

18689<br />

18813<br />

18689<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

19718<br />

19719<br />

Family Web Clients 142<br />

N/A<br />

N/A<br />

N/A


3256 Curl NTLM Buffer Overflow<br />

3261 Lynx < 2.8.6 dev14 NNTP Headers Buffer Overflow<br />

3280 Quicktime < 7.0.3 (Windows) Detection<br />

3281 ClamAV < 0.87.1 Content-parsing Buffer Overflow<br />

3286 RealPlayer for Windows Multiple Overflows (2)<br />

3287 Lynx < 2.8.6 dev15 Arbitary Code Execution<br />

3292 Sony XCP-DRM Rootkit Detection<br />

3294 Absinthe SQL Injection Tool Detection<br />

3296 iTunes For Windows < 6.0 Local Code Execution<br />

3309 Opera <<br />

3310 SQL Injector SQL Injection Tool Detection<br />

3318 Curl <<br />

3359 SocketScanner Detection<br />

3362 ClamAV < 0.88.0 UPX File Processing Overflow<br />

3364 Quicktime < 7.0.4 (Windows) Multiple Vulnerabilities<br />

3381 Microsoft CryptoAPI Version Check<br />

3396 VMWare Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

3405 Mozilla Firefox < 1.5.0.1 Multiple Vulnerabilities<br />

3409 DidTheyReadIt Email Tracker (Client) Detection<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

3410 ReadNotify Email Tracker (Client) Detection Web N/A<br />

N/A<br />

N/A<br />

20136<br />

N/A<br />

20184<br />

N/A<br />

N/A<br />

N/A<br />

20218<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

20395<br />

Family Web Clients 143<br />

N/A<br />

N/A<br />

N/A<br />

N/A


3411 PointOfMail Email Tracker (Client) Detection<br />

3418 McAfee Client Detection (SPIPE)<br />

3420 McAfee Client Detection (UPDATE)<br />

3467 Mac OS X Intel Detection<br />

3481 Curl < 7.15.3 TFTP URL Parsing Overflow<br />

3485 RealPlayer for Linux, Mac, and Windows Remote Overflows<br />

3491 MPlayer Crafted Media File Integer Overflow<br />

3498 Internet Explorer Version 7 Detection<br />

3503 NOD32 < 2.51.26 Antivirus Local File Overwrite<br />

3505 ClamAV < 0.88.1 Multiple Vulnerabilities<br />

3512 Mozilla Firefox < 1.5.0.2 or 1.0.8 Multiple Vulnerabilities<br />

3514 Mozilla Browser < 1.7.13 Multiple Vulnerabilities<br />

3515 Opera < 8.54 signedness StyleSheet Overflow<br />

3516 SeaMonkey < 1.0.1 Multiple Vulnerabilities<br />

3525 ClamAV < 0.88.2 HTTP Header Remote Overflow<br />

3531 Mozilla Firefox < 1.5.0.3 Multiple Vulnerabilities<br />

3616 Quicktime < 7.1 on Mac OS X Multiple Vulnerabilities<br />

3624 WhatsUp <strong>Network</strong> Monitoring Tool Detection<br />

3636 Firefox < 1.5.0.4 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

21221<br />

N/A<br />

N/A<br />

N/A<br />

21554<br />

Family Web Clients 144<br />

N/A<br />

N/A


3637 SeaMonkey < 1.0.2 Multiple Vulnerabilities<br />

3661 Opera < 9.01 Malformed 'HREF' DoS<br />

3662 Opera < 9.01 Malformed JPEG Overflow<br />

3671 iTunes < 6.0.5 AAC File Parsing Overflow<br />

3695 Firefox < 1.5.0.5 Multiple Vulnerabilities<br />

3701 ClamAV < 0.88.4 UPX rsize Content-Parsing Overflow<br />

3705 Safari Version Detection<br />

3706 Firefox Version Detection<br />

3707 Microsoft Internet Explorer Detection<br />

3724 Firefox < 1.5.0.6 Multiple Vulnerabilities<br />

3725 Microsoft Internet Explorer Version Detection<br />

3726 Google Toolbar Detection<br />

3741 Quicktime < 7.1.3 Multiple Vulnerabilities<br />

3743 Firefox < 1.5.0.7 Multiple Viulnerabilities<br />

3744 SeaMonkey < 1.0.5 Multiple Vulnerabilities<br />

3746 RSSOwl < 1.2.3 Atom Feed XSS<br />

3748 SharpReader < 0.9.7.1 RSS Feed XSS<br />

3794 ClamAV < 0.88.5 PE Handler Content-Parsing Overflow<br />

3796 Opera < 9.02 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

N/A<br />

N/A<br />

N/A<br />

21781<br />

22095<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

22369<br />

22371<br />

N/A<br />

N/A<br />

N/A<br />

22875<br />

3810 SeaMonkey < 1.0.6 Multiple Vulnerabilities Web 23634<br />

Family Web Clients 145


3812 Firefox < 1.5.0.8 Multiple Vulnerabilities<br />

3817 Windows Media Player <<br />

3820 iTunes Client Detection<br />

3837 Python Urllib Version Detection<br />

3842 ClamAV < 0.88.7 MIME-encoded Scan Bypass<br />

3859 Windows Media Format Series Remote Code Execution (923689)<br />

3863 CA Antivirus Client Detection<br />

3864 LogMeIn Listening Server Detection<br />

3866 SeaMonkey < 1.0.7 Multiple Vulnerabilities<br />

3868 Firefox < 1.5.0.9 / 2.0.0.1 Multiple Vulnerabilities<br />

3878 Opera < 9.10 Multiple Vulnerabilities<br />

3879 OmniWeb Browser < 5.5.2 Javascript alert Function Format String<br />

3889 BitDefender Detection<br />

3891 Symantec Antivirus Version Number Detection<br />

3899 Policy - Nintendo Wii Detection<br />

3903 Firefox <<br />

3907 TiVo Detection<br />

3908 TiVo Detection<br />

3917 ClamAV < 0.90.0 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

23633<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

23838<br />

N/A<br />

N/A<br />

23928<br />

23930<br />

23977<br />

Family Web Clients 146<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


3922 Firefox < 1.5.0.10 / 2.0.0.2 Multiple Vulnerabilities<br />

3924 Google Desktop Detection<br />

3927 SeaMonkey < 1.0.8 Multiple Vulnerabilities<br />

3935 QuickTime < 7.1.5 Multiple Vulnerabilities<br />

3951 Firefox < 1.5.0.11 / 2.0.0.3 Multiple Vulnerabilities<br />

3954 IDA Pro Disassembler Software Detection<br />

3955 IDA Pro Remote Debugger Server Authentication Bypass<br />

3960 F-Secure Product Detection<br />

3966 ClamAV < 0.90.2 Multiple Vulnerabilities<br />

3975 QuickTime < 7.1.6 Multiple Vulnerabilities<br />

3996 Opera < 9.21 Multiple Vulnerabilities<br />

4001 NOD32 < 2.70.37 Directory Name Handling Multiple Overflows<br />

4071 Mozilla Firefox < 1.5.0.12 / 2.0.0.4 Multiple Vulnerabilities<br />

4073 Mozilla SeaMonkey < 1.0.9 / 1.1.2 Multiple Vulnerabilities<br />

4075 ClamAV < 0.90.3 Multiple Vulnerabilities<br />

4079 Yahoo! Messenger Webcam ActiveX Multiple Overflows<br />

4080 Windows CE < 5.1 Detection<br />

4082 AOL Instant Messenger User Enumeration<br />

4095 Windows CE < 5.1 Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

4096 Windows CE < 5.0 / 6.0 Buffer Overflow Web N/A<br />

24701<br />

24709<br />

24735<br />

24761<br />

24875<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

25290<br />

N/A<br />

25349<br />

25351<br />

N/A<br />

25459<br />

Family Web Clients 147<br />

N/A<br />

N/A<br />

N/A


4099 Windows Safari Detection<br />

4109 CF<strong>Network</strong> < 129.20 DoS<br />

4130 ClamAV < 0.91.0 Multiple RAR Content Parsing Vulnerabilities<br />

4131 AVG AntiVirus < 7.5.476 avg7core.sys Local Privilege Escalation<br />

4132 QuickTime < 7.2 Multiple Vulnerabilities<br />

4137 Curl < 7.16.4 Expired Certificate Access Restriction Bypass<br />

4140 Firefox < 2.0.0.5 Multiple Vulnerabilities<br />

4142 Opera < 9.22 Torrent File Overflow<br />

4151 Firefox < 2.0.0.6 Multiple Vulnerabilities<br />

4153 Mozilla SeaMonkey < 1.1.4 Multiple Vulnerabilities<br />

4171<br />

4172<br />

4173<br />

4174<br />

4175<br />

4176<br />

Vulnerability in Windows Media Player Could Allow Remote Code<br />

Execution (936782)<br />

Vulnerability in Windows Media Player Could Allow Remote Code<br />

Execution (936782)<br />

Vulnerability in Windows Media Player Could Allow Remote Code<br />

Execution (936782)<br />

Vulnerability in Windows Media Player Could Allow Remote Code<br />

Execution (936782)<br />

Vulnerability in Windows Media Player Could Allow Remote Code<br />

Execution (936782)<br />

Vulnerability in Windows Media Player Could Allow Remote Code<br />

Execution (936782)<br />

4177 Opera < 9.23 Arbitrary Code Execution<br />

4183 ClamAV < 0.91.2 Multiple Remote DoS<br />

4193 Netopia Timbuktu Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

25703<br />

N/A<br />

25735<br />

N/A<br />

25820<br />

N/A<br />

25885<br />

25885<br />

25885<br />

25885<br />

25885<br />

25885<br />

25900<br />

Family Web Clients 148<br />

N/A<br />

N/A


4204 iTunes < 7.4.0 MP4/AAC File covr atom Overflow<br />

4218 Firefox < 2.0.0.7 Multiple Vulnerabilities<br />

4249 Opera < 9.24 Multiple Vulnerabilities<br />

4253 Microsoft Internet Explorer Version Detection<br />

4254 Firefox < 2.0.0.8 Multiple Vulnerabilities<br />

4255 SeaMonkey < 1.1.5 Multiple Vulnerabilities<br />

4274 Firefox < 2.0.0.9 Multiple Vulnerabilities<br />

4277 QuickTime < 7.3 Multiple Vulnerabilities<br />

4296 Firefox < 2.0.0.10 Multiple Vulnerabilities<br />

4298 SeaMonkey < 1.1.7 Multiple Vulnerabilities<br />

4314 QuickTime < 7.3.1 Multiple Vulnerabilities<br />

4321 ClamAV < 0.92.0 PE File Handling Integer Overflow<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

4322 Flash Player < 9.0.115.0 / 7.0.73.0 APSB07-20 Multiple Vulnerabilities Web<br />

Clients<br />

4323 Opera < 9.25 Multiple Vulnerabilities<br />

4344 QuickTime < 7.4 Multiple Vulnerabilities<br />

4362 iPhoto < 7.1.2 Photocast Subscription Format String<br />

4363 QuickTime < 7.4.1 RTSP Response Handling Overflow<br />

4365 Firefox < 2.0.0.12 Multiple Vulnerabilities<br />

4366 SeaMonkey < 1.1.8 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

4374 WebDAV Mini Redirector Client Detection Web N/A<br />

N/A<br />

N/A<br />

27506<br />

N/A<br />

27521<br />

N/A<br />

N/A<br />

27626<br />

28329<br />

N/A<br />

29698<br />

N/A<br />

29741<br />

29742<br />

29982<br />

30201<br />

30204<br />

30209<br />

30210<br />

Family Web Clients 149


4375 ClamAV < 0.92.1 Multiple Overflows<br />

4384 Now SMS/MMS Gateway Version Detection<br />

4386 Opera < 9.26 Multiple Vulnerabilities<br />

4389 Now SMS/MMS Gateway Multiple Remote Overflows<br />

4394 Mobilink Monitor Server Version Detection<br />

4395 MobiLink Server < 10.0.1 Build 3649 Multiple Remote Overflows<br />

4396 Sybase SQL Anywhere Database Version Detection<br />

4406 Sony Playstation Version Detection<br />

4408 Eye-Fi Version Detection<br />

4409 WebSphere MQ Server Detection<br />

4418 IBM Rational Clearquest Server Detection<br />

4429 VLC Media Player < 0.8.6f Multiple Vulnerabilities<br />

4434 Mac OS X Safari < 3.1 Multiple Vulnerabilities<br />

4435 Mac OS X Version Detection<br />

4447 Firefox < 2.0.0.13 Multiple Vulnerabilities<br />

4448 SeaMonkey < 1.1.9 Multiple Vulnerabilities<br />

4453 X2 Thin Client Server Detection<br />

4457 Opera < 9.27 Multiple Vulnerabilities<br />

4458 QuickTime < 7.4.5 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

N/A<br />

N/A<br />

31129<br />

N/A<br />

N/A<br />

31719<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

31853<br />

31604<br />

N/A<br />

31652<br />

31653<br />

N/A<br />

31734<br />

31735<br />

Family Web Clients 150


4461 Flash Player < 9.0.124.0 APSB08-11 Multiple Vulnerabilities<br />

4465 ClamAV < 0.93.0 Multiple Overflows<br />

4468 MarketFirst Client Detection<br />

4472 Safari < 3.1.1 PCRE Nested Repetition Count Overflow<br />

4473 Firefox < 2.0.0.14 Javascript Garbage Collection DoS<br />

4537 QuickTime < 7.5 Multiple Vulnerabilities<br />

4541 Opera < 9.50 Multiple Vulnerabilities<br />

4543 Novell NetWare iPrint Client Version Detection<br />

4547 ClamAV < 0.93.1 memcpy() Function Overflow<br />

4548 Novell iPrint Client Unspecified Vulnerability<br />

4556 Safari < 3.1.2 Multiple Vulnerabilities<br />

4560 IronPort Version Detection<br />

4562 VLC Media Player < 0.8.6h Multiple Vulnerabilities<br />

4567 Firefox < 2.0.0.15 Multiple Vulnerabilities<br />

4568 SeaMonkey < 1.1.10 Multiple Vulnerabilities<br />

4569<br />

VLC Media Player < 0.8.6i WAV File Handling Remote Integer<br />

Overflow<br />

4572 Opera < 9.51 Multiple Vulnerabilities<br />

4588 Firefox < 2.0.0.16 / 3.0.1 Multiple Vulnerabilities<br />

4591 Firefox < 3.0.1 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

4592 F-PROT Antivirus Version Detection Web N/A<br />

31799<br />

N/A<br />

N/A<br />

N/A<br />

31864<br />

33131<br />

33168<br />

N/A<br />

N/A<br />

33227<br />

33226<br />

N/A<br />

33278<br />

33393<br />

33394<br />

33485<br />

33396<br />

33505<br />

33522<br />

Family Web Clients 151


4593 F-PROT Attachment Handling DoS<br />

4600 EMC Retrospect Server Detection<br />

4603 Agnitum Outpost Version Detection<br />

4604<br />

4607<br />

4608<br />

Agnitum Outpost <strong>Security</strong> Suite < 6.5.2358.316.0607 Detection Engine<br />

Bypass<br />

Retrospect Backup Server < 7.6 Authentication Module Password Hash<br />

Disclosure (ESA-08-009)<br />

RealPlayer for Windows < 6.0.14.806 / 6.0.12.1675 Multiple<br />

Vulnerabilities<br />

4611 AVG Scanning Engine < 8.0.156 UPX Parsing DoS<br />

4634 Opera < 9.52 Multiple Vulnerabilities<br />

4635 SQL Worm Client Detection<br />

4642 ClamAV < 0.93.1 memcpy() .chm File Handling DoS<br />

4645 Google Chrome Version Detection<br />

4647<br />

Novell iPrint Client nipplib.dll IppCreateServerRef Function Buffer<br />

Overflow<br />

4650 Microsoft Office OneNote Client Detection<br />

4651 QuickTime < 7.5.5 Multiple Vulnerabilities<br />

4653 iTunes < 8.0 Multiple Vulnerabilities<br />

4678 Virus / Backdoor Client Detection<br />

4681 Google Chrome < 0.2.149.29 Multiple Vulnerabilities<br />

4691 Firefox < 3.0.2 Multiple Vulnerabilities<br />

4692 Firefox < 2.0.0.17 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

33562<br />

33744<br />

33762<br />

33949<br />

N/A<br />

N/A<br />

N/A<br />

34085<br />

N/A<br />

34118<br />

N/A<br />

N/A<br />

34197<br />

34267<br />

34268<br />

Family Web Clients 152


4693 SeaMonkey < 1.1.12 Multiple Vulnerabilities<br />

4706 Opera < 9.60 Multiple Vulnerabilities<br />

4708 VLC Media Player < 0.9.3 XSPF Playlist Memory Corruption<br />

4715 Opera < 9.61 Multiple Vulnerabilities<br />

4726<br />

VLC Media Player < 0.9.5 TY Media File Handling Memory<br />

Curruption<br />

4729 Opera < 9.62 Multiple Vulnerabilities<br />

4741 System Requirements Lab Software Client Detection<br />

4744<br />

ClamAV < 0.94.1 get_unicode_name() Function Off-by-One Buffer<br />

Overflow<br />

4745 Mozilla Browser Plugin Detection<br />

4746 Flash Player APSB08-18 / APSB08-20 Multiple Vulnerabilities<br />

4747 VLC Media Player 0.5.0 to 0.9.5 Stack-Based Buffer Overflows<br />

4748 Google Chrome < 0.3.154.9 Address Spoofing<br />

4751 Firefox < 2.0.0.18 Multiple Vulnerabilities<br />

4752 Firefox 3.x < 3.0.4 Multiple Vulnerabilities<br />

4753 SeaMonkey < 1.1.13 Multiple Vulnerabilities<br />

4754 Safari < 3.2 Multiple Vulnerabilities<br />

4756 Microsoft Web Service client Version Detection<br />

4757 SOAP/XML Plaintext Credentials Disclosure<br />

4759 Adobe AIR Version Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

34269<br />

34368<br />

34400<br />

34459<br />

34400<br />

34680<br />

N/A<br />

34729<br />

N/A<br />

34741<br />

34730<br />

34742<br />

34766<br />

34767<br />

34768<br />

34772<br />

4760 Adobe AIR APSB08-23 / APSB08-22 / APSB08-20 / APSB08-18 Web 34815<br />

Family Web Clients 153<br />

N/A<br />

N/A<br />

N/A


Multiple Vulnerabilities Clients<br />

4763 Symantec Backup Exec Detection<br />

4770 NetWitness Version Detection<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

4776 ClamAV < 0.94.2 cli_check_jpeg_exploit() Malformed JPEG File DoS Web<br />

Clients<br />

4785<br />

VLC Media Player < 0.9.8a RealMedia Processing Remote Integer<br />

Overflow<br />

4787 ClamAV < 0.94 Multiple Vulnerabilities<br />

4791 Opera < 9.63 Multiple Vulnerabilities<br />

4792 Firefox < 2.0.0.19 Multiple Vulnerabilities<br />

4793 Firefox < 3.0.5 Multiple Vulnerabilities<br />

4794 SeaMonkey < 1.1.14 Multiple Vulnerabilities<br />

4796 Firefox < 2.0.0.20 Cross-Domain Data Theft<br />

4799 McAfee ePO Version Detection<br />

4817 QuickTime < 7.6 Multiple Vulnerabilities<br />

4920 Google Chrome < 1.0.154.46 Multiple Vulnerabilities<br />

4922 Firefox < 3.0.6 Multiple Vulnerabilities<br />

4932 Safari < 3.2.2 Multiple Vulnerabilities<br />

4935 Google Chrome < 1.0.154.48 Cross-browser Command Injection<br />

4937 Flash Player APSB09-01 Multiple Vulnerabilities<br />

4945 Opera < 9.64 Multiple Vulnerabilities<br />

4950 Firefox < 3.0.7 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

N/A<br />

N/A<br />

35009<br />

35068<br />

35087<br />

35185<br />

35218<br />

35219<br />

35220<br />

35251<br />

N/A<br />

35437<br />

35558<br />

35581<br />

35687<br />

35689<br />

35742<br />

35761<br />

35778<br />

Family Web Clients 154


4958 iTunes < 8.1 Multiple Vulnerabilities<br />

4965 SeaMonkey < 1.1.15 Multiple Vulnerabilities<br />

4980 Firefox < 3.0.8 Multiple Vulnerabilities<br />

4982 ClamAV < 0.95 Scan Evasion<br />

4986 ClamAV < 0.95.1 Multiple Vulnerabilities<br />

4988 SeaMonkey < 1.1.16 XSL Transformation Overflow DoS<br />

4998 Firefox < 3.0.9 Multiple Vulnerabilities<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

5004 Google Chrome < 1.0.154.59 Same Origin Policy Bypass Vulnerability Web<br />

Clients<br />

5008 Firefox 3.0.9 Memory Corruption<br />

5009 ESET Anti-Virus Version Detection<br />

5013 ESET Anti-Virus Version Detection<br />

5014 Avira Anti-Virus Version Detection<br />

5015 Avira Anti-Virus Zip File Scan Evasion<br />

5020 Google Chrome < 1.0.154.64 Multiple Vulnerabilities<br />

5021 AVG Scanning Engine UPX Parsing Denial of Service Vulnerability<br />

5024 Safari < 3.2.3 Multiple Vulnerabilities<br />

5026 Google Chrome < 1.0.154.65 Remote Code Execution<br />

5027 Avira Anti-Virus PDF File Scan Evasion<br />

5038 Avira Anti-Virus Multiple Scan Evasions<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

35914<br />

35978<br />

36045<br />

36075<br />

36131<br />

36130<br />

36215<br />

38154<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

38699<br />

N/A<br />

38745<br />

N/A<br />

N/A<br />

38973<br />

5041 iTunes < 8.2 Remote Overflow Web 38986<br />

Family Web Clients 155


5042 QuickTime < 7.6.2 Multiple Vulnerabilities<br />

5046 Safari < 4.0 Multiple Vulnerabilities<br />

5049 Google Chrome < 2.0.172.31 Multiple Vulnerabilities<br />

5072 Firefox < 3.0.11 Multiple Vulnerabilities<br />

5073 ClamAV < 0.95.2 File Scan Evasion<br />

5079 Google Chrome < 1.0.154.53 Multiple Vulnerabilities<br />

5082 Google Chrome < 2.0.172.33 Buffer Overflow vulnerability<br />

5084 Mozilla SeaMonkey < 1.1.17 Multiple Vulnerabilities<br />

5094 Safari < 4.0.2 Multiple Vulnerabilities<br />

5099 Google Chrome < 2.0.172.37 Buffer Overflow<br />

5101 Firefox < 3.0.12 Multiple Vulnerabilities<br />

5109 Adobe AIR < 1.5.2 Multiple Vulnerabilities (APSB09-10)<br />

5112 VLC Media Player < 1.0.1 Remote Integer Underflow<br />

5113 Firefox < 3.0.13/3.5.0 Multiple Vulnerabilities<br />

5114 Mozilla Firefox < 3.5.2/3.0.12 Multiple Vulnerabilities<br />

5115 Mozilla Firefox < 3.0.13/3.5.2 Proxy Response DoS<br />

5116 Mozilla Firefox 3.5 < 3.5.2 Proxy Response DoS<br />

5117 LoJack Software Detection<br />

5125 Safari < 4.0.3 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

38988<br />

39339<br />

N/A<br />

39372<br />

N/A<br />

39499<br />

N/A<br />

N/A<br />

N/A<br />

39852<br />

40351<br />

40447<br />

N/A<br />

N/A<br />

40479<br />

N/A<br />

N/A<br />

N/A<br />

40554<br />

Family Web Clients 156


5130 Curl < 7.19.6 Certificate Validation Bypass Vulnerability<br />

5141 Google Chrome < 2.0.172.43 Remote Code Execution<br />

5146 Opera < 10.00 Multiple Vulnerabilities<br />

5152 Mozilla SeaMonkey < 1.1.18 Multiple Vulnerabilities<br />

5158 Flash Client Version Detection<br />

5159 QuickTime < 7.6.4 Multiple Vulnerabilities<br />

5161 Mozilla Firefox < 3.0.14 / 3.5.3 Multiple Vulnerabilities<br />

5172 Aria2 Detection<br />

5175 Debian devscripts 'uscan' Input Validation Vulnerability<br />

5176 Google Chrome < 3.0.195.21 Multiple Vulnerabilities<br />

5182 iTunes < 9.0.1 Remote Code Execution<br />

5188 VLC Media Player < 1.0.2 Multiple Buffer Overflows<br />

5193 Google Chrome < 3.0.195.24 Remote Code Execution<br />

5197 OSSProxy Detection<br />

5198 Apple iPhone Wireless Connection Detection<br />

5199 Sophos Enterprise Anti-virus Version Detection<br />

5202 QuickBooks Accounting Software Version Detection<br />

5203 GtekClient Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

5204 Unsupported Software Detection (Windows 98)<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

5212 GNU Wget SSL Certificate <strong>Security</strong> Bypass Web N/A<br />

N/A<br />

40778<br />

40827<br />

40874<br />

N/A<br />

40929<br />

40930<br />

N/A<br />

N/A<br />

41000<br />

41061<br />

41626<br />

41958<br />

Family Web Clients 157<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


5217 Opera < 10.01 Multiple Vulnerabilities<br />

5218 Mozilla Firefox < 3.0.15 / 3.5.4 Multiple Vulnerabilities<br />

5219 Mozilla SeaMonkey < 2.0 Multiple Vulnerabilities<br />

5225 Google Chrome < 3.0.195.32 Remote Code Execution<br />

5232 Safari < 4.0.4 Multiple Vulnerabilities<br />

5234 Google Chrome < 3.0.195.33 <strong>Security</strong> Bypass Vulnerability.<br />

5241 Opera < 10.10 Multiple Vulnerabilities<br />

5254 Client .exe Download Detection<br />

5255 Novell iPrint Client < 5.32 Multiple Buffer Overflow Vulnerabilities<br />

5256 Adobe AIR < 1.5.3 Multiple Vulnerabilities (APSB09-19)<br />

5264 Mozilla Firefox < 3.0.16 / 3.5.6 Multiple Vulnerabilities<br />

5265 Mozilla SeaMonkey < 2.0.1 Multiple Vulnerabilities<br />

5266 Web Client Detection<br />

5299 Web Client Detection<br />

5325<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Real <strong>Network</strong>s RealPlayer < RealPlayer SP 1.0.5 Multiple<br />

Vulnerabilities<br />

5328 Google Chrome < 4.0.249.78 Multiple Vulnerabilities<br />

5335 cURL < 7.20.0 CURLOPT_ENCODING Option Buffer Overflow<br />

5336 Google Chrome < 4.0.249.89 Multiple Vulnerabilities<br />

5338 Flash Player < 10.0.45.2 Multiple Vulnerabilities<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

42291<br />

42306<br />

42307<br />

42413<br />

42478<br />

42798<br />

42892<br />

N/A<br />

43060<br />

43069<br />

43174<br />

43175<br />

N/A<br />

N/A<br />

44119<br />

44317<br />

N/A<br />

44587<br />

44596<br />

Family Web Clients 158


5342 Mozilla Firefox < 3.0.18 / 3.5.8 / 3.6 Multiple Vulnerabilities<br />

5343 Mozilla SeaMonkey < 2.0.3 Multiple Vulnerabilities<br />

5349 Opera < 10.50 Multiple Vulnerabilities<br />

5351 Client PDF Download Detection<br />

5352 Client ZIP Download Detection<br />

5359 Mozilla Firefox cpe Version Detection<br />

5361 Safari < 4.0.5 Multiple Vulnerabilities<br />

5364 Google Chrome < 4.1.249.1036 Multiple Vulnerabilities<br />

5479 Mozilla SeaMonkey < 1.1.19 Multiple Vulnerabilities<br />

5481 Mozilla Firefox Unsupported Version Detection<br />

5482 Mozilla SeaMonkey Unsupported Version Detection<br />

5484 Opera < 10.51 Multiple Vulnerabilities<br />

5485 Mozilla Firefox < 3.6.2 Multiple Vulnerabilities.<br />

5491 iTunes < 9.1 Multiple Vulnerabilities<br />

5492 QuickTime < 7.6.6 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

5493 Mozilla Firefox < 3.0.19 Multiple Vulnerabilities<br />

5494 Mozilla Firefox < 3.5.9 Multiple Vulnerabilities<br />

5495 Mozilla SeaMonkey < 2.0.4 Multiple Vulnerabilities<br />

5502 Firefox < 3.6.3 Remote Code Execution Vulnerability<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

44659<br />

44660<br />

44960<br />

N/A<br />

N/A<br />

N/A<br />

45045<br />

45086<br />

45111<br />

40362<br />

40362<br />

45121<br />

45133<br />

45391<br />

45388<br />

45392<br />

45393<br />

45395<br />

45403<br />

5505 ClamAV < 0.96 Multiple Vulnerabilities Web 45437<br />

Family Web Clients 159


5516 Google Chrome < 4.1.249.1059 Multiple Vulnerabilities<br />

5520 Google Chrome < 4.1.249.1064 Multiple Vulnerabilities<br />

5527<br />

Opera < 10.53 Asynchronous Content Modification Uninitialized<br />

Memory Access<br />

5529 Beyond Compare < 3.1.11 Zip File Buffer Overflow<br />

5539 Konqueror < 4.4.3 Multiple Vulnerabilities<br />

5548 ClamAV < 0.96.1 Multiple Vulnerabilities<br />

5553 Google Chrome < 5.0.375.55 Multiple Vulnerabilities<br />

5566 Safari < 4.1 / 5.0 Multiple Vulnerabilities<br />

5567 Google Chrome < 5.0.375.70 Multiple Vulnerabilities<br />

5569<br />

Flash Player < 10.1.53.64 / 9.0.277.0 Multiple Vulnerabilities<br />

(APSB10-14)<br />

5573 iTunes < 9.2 Multiple Vulnerabilities<br />

5576 Opera < 10.54 Multiple Vulnerabilities<br />

5579 Firefox < 3.5.10 Multiple Vulnerabilities<br />

5580 Firefox 3.6.x < 3.6.4 Multiple Vulnerabilities<br />

5581 SeaMonkey < 2.0.5 Multiple Vulnerabilities<br />

5584 Google Chrome < 5.0.375.86 Multiple Vulnerabilities<br />

5589 Opera < 10.60 Multiple Vulnerabilities<br />

5591 Google Chrome < 5.0.375.99 Multiple Vulnerabilities<br />

5602 Client .dat Download Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

45610<br />

46171<br />

46204<br />

46242<br />

N/A<br />

46706<br />

46732<br />

46838<br />

46850<br />

46859<br />

47038<br />

47113<br />

47123<br />

47124<br />

47126<br />

47139<br />

47583<br />

47595<br />

Family Web Clients 160<br />

N/A


5603 Client .dat Download Detection<br />

5605 iTunes < 9.2.1 'itpc:' Buffer Overflow Vulnerability<br />

5606 Firefox 3.5.x < 3.5.11 Multiple Vulnerabilities<br />

5607 Firefox 3.6.x < 3.6.7 Multiple Vulnerabilities<br />

5610 SeaMonkey 2.0.x < 2.0.6 Multiple Vulnerabilities<br />

5613 Firefox 3.6.7 Remote Code Execution Vulnerability<br />

5614 Google Chrome < 5.0.375.125 Multiple Vulnerabilities<br />

5617 Safari < 4.1.1 / 5.0.1 Multiple Vulnerabilities<br />

5625 Flash Player Multiple Vulnerabilities (APSB10-16)<br />

5626 Opera < 10.61 Multiple Vulnerabilities<br />

5628<br />

QuickTime < 7.6.7 QuickTimeStreaming.qtx SMIL File Debug<br />

Logging Overflow (Windows)<br />

5644 Google Chrome < 5.0.375.127 Multiple Vulnerabilities<br />

5647 Novell iPrint Client < 5.42 Multiple Vulnerabilities<br />

5648 Novell iPrint Client < 5.44 Multiple Vulnerabilities<br />

5650 Real <strong>Network</strong>s RealPlayer SP < 1.1.5 Multiple Vulnerabilities<br />

5651<br />

VLC Media Player < 1.1.4 Patch Subversion Arbitrary DLL Injection<br />

Code Execution<br />

5653 iTunes < 10.0 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

5654 Google Chrome < 6.0.472.53 Multiple Vulnerabilities<br />

5655 Safari < 4.1.2 / 5.0.2 Multiple Vulnerabilities<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

N/A<br />

47764<br />

47781<br />

47782<br />

47785<br />

47829<br />

47859<br />

47888<br />

48300<br />

48317<br />

48323<br />

48383<br />

48364<br />

48407<br />

48907<br />

48906<br />

49087<br />

49089<br />

49144<br />

5656 Firefox 3.5.x < 3.5.12 Multiple Vulnerabilities Web 49145<br />

Family Web Clients 161


5657 Firefox 3.6.x < 3.6.9 Multiple Vulnerabilities<br />

5660 SeaMonkey < 2.0.7 Multiple Vulnerabilities<br />

5661<br />

Opera < 10.62 Path Subversion Arbitrary DLL Injection Code<br />

Execution<br />

5664 Google Chrome < 6.0.472.59 Multiple Vulnerabilities<br />

5665 QuickTime < 7.6.8 Multiple Vulnerabilities (Windows)<br />

5669 Google Chrome < 6.0.472.62 Multiple Vulnerabilities<br />

5670 Flash Player Unspecified Code Execution (APSB10-22)<br />

5672 ClamAV < 0.96.3 Denial-of-Service Vulnerability<br />

5678 Opera < 10.63 Multiple Vulnerabilities<br />

5680 Google Chrome < 7.0.517.41 Multiple Vulnerabilities<br />

5681 Mozilla Firefox 3.5.x < 3.5.14 Multiple Vulnerabilities<br />

5682 Mozilla Firefox 3.6.x < 3.6.11 Multiple Vulnerabilities<br />

5685 Mozilla SeaMonkey 2.0.x < 2.0.9 Multiple Vulnerabilities<br />

5690 Mozilla Firefox 3.5.x < 3.5.15 Buffer Overflow Vulnerability<br />

5691 Mozilla Firefox 3.6.x < 3.6.12 Buffer Overflow Vulnerability<br />

5694 Mozilla SeaMonkey 2.0.x < 2.0.10 Buffer Overflow Vulnerability<br />

5696 Web Client Detection<br />

5697 Web Client Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

5698 Google Chrome < 7.0.517.44 Multiple Vulnerabilities<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

49146<br />

49149<br />

49174<br />

49237<br />

49260<br />

49285<br />

49307<br />

49712<br />

49964<br />

50049<br />

50084<br />

50085<br />

50088<br />

50382<br />

50383<br />

50386<br />

N/A<br />

N/A<br />

50476<br />

Family Web Clients 162


5699<br />

5709<br />

5710<br />

Flash Player < 9.0.289 / 10.1.102.64 Multiple Vulnerabilities<br />

(APSB10-26)<br />

Real <strong>Network</strong>s RealPlayer < 14.0.1.609 (Build 12.0.1.609) Multiple<br />

Vulnerabilities<br />

VLC Media Player < 1.1.5 Samba Share Access Module Code<br />

Execution<br />

5711 Safari < 4.1.3 / 5.0.3 Multiple Vulnerabilities<br />

5719 Google Chrome < 8.0.552.215 Multiple Vulnerabilities<br />

5722 ClamAV < 0.96.5 Multiple Vulnerabilities<br />

5725 QuickTime < 7.6.9 Multiple Vulnerabilities<br />

5727 Mozilla Firefox 3.6.x < 3.6.13 Multiple Vulnerabilities<br />

5728 Mozilla Firefox < 3.5.16 Multiple Vulnerabilities<br />

5731 Mozilla SeaMonkey 2.0.x < 2.0.11 Multiple Vulnerabilities<br />

5734 Google Chrome < 8.0.552.224 Multiple Vulnerabilities<br />

5735 Opera < 11.00 Multiple Vulnerabilities<br />

5742 Google Chrome < 8.0.552.237 Multiple Vulnerabilities<br />

5746 VLC Media Player < 1.1.6 Multiple Vulnerabilities<br />

5747 Opera < 11.01 Multiple Vulnerabilities<br />

5748<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Real <strong>Network</strong>s RealPlayer < 14.0.2.633 (Build 12.0.1.633) Multiple<br />

Remote Code Execution Vulnerabilities<br />

5756 VLC Media Player < 1.1.7 Code Execution Vulnerability<br />

5758 Google Chrome < 9.0.597.84 Multiple Vulnerabilities<br />

5780 Google Chrome < 9.0.597.94 Multiple Vulnerabilities<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

50493<br />

50612<br />

50650<br />

50654<br />

50977<br />

51125<br />

51062<br />

51121<br />

51120<br />

51124<br />

51161<br />

51343<br />

51511<br />

51772<br />

51774<br />

51814<br />

51851<br />

51872<br />

51921<br />

5781 Flash Player < 10.2.152.26 Multiple Vulnerabilities (APSB11-02) Web 51926<br />

Family Web Clients 163


5783 Flash Player Unsupported Version Detection<br />

5796 ClamAV < 0.97 Multiple Vulnerabilities<br />

5805 Symantec Enterprise AV Client Detection<br />

5806 iTunes < 10.2 Multiple Vulnerabilities<br />

5807 Google Chrome < 9.0.597.107 Multiple Vulnerabilities<br />

5808 Mozilla Firefox 3.6.x < 3.6.14 Multiple Vulnerabilities<br />

5809 Mozilla Firefox 3.5.x < 3.5.17 Multiple Vulnerabilities<br />

5811 Mozilla SeaMonkey 2.0.x < 2.0.12 Multiple Vulnerabilities<br />

5812 Google Chrome < 10.0.648.127 Multiple Vulnerabilities<br />

5813 Safari < 5.0.4 Multiple Vulnerabilities<br />

5815 Dropbox Client Retrieval Detection<br />

5818 Google Chrome < 10.0.648.133 Code Execution Vulnerability<br />

5823 Google Chrome < 10.0.648.134 Code Execution Vulnerability<br />

5827<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Flash Player < 10.2.152.33 Unspecified Memory Corruption<br />

(APSB11-05)<br />

5842 Mozilla Firefox 3.6.x < 3.6.16 Invalid HTTP Certificates<br />

5843 Mozilla Firefox 3.5.x < 3.5.18 Invalid HTTP Certificates<br />

5844 Mozilla SeaMonkey 2.0.x < 2.0.13 Invalid HTTP Certificates<br />

5845 Google Chrome < 10.0.648.204 Multiple Vulnerabilities<br />

5846 VLC Media Player < 1.1.8 Multiple Buffer Overflows<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

51937<br />

51935<br />

N/A<br />

52535<br />

52501<br />

52531<br />

52530<br />

52533<br />

52589<br />

52613<br />

N/A<br />

52657<br />

52713<br />

52673<br />

52767<br />

52766<br />

52769<br />

52975<br />

52976<br />

Family Web Clients 164


5883 VLC Media Player < 1.1.9 Heap Corruption Vulnerability<br />

5886<br />

Real <strong>Network</strong>s RealPlayer < 14.0.3.647 (Build 12.0.1.647) Multiple<br />

Vulnerabilities<br />

5890 Safari < 5.0.5 Multiple Vulnerabilities<br />

5891 Google Chrome < 10.0.648.205 Multiple Vulnerabilities<br />

5892<br />

Flash Player < 10.2.159.1 Unspecified Memory Corruption<br />

(APSB11-07)<br />

5894 iTunes < 10.2.2 Multiple Vulnerabilities<br />

5899 Google Chrome < 11.0.696.57 Multiple Vulnerabilities<br />

5900 Mozilla Firefox < 3.5.19 Multiple Vulnerabilities<br />

5901 Mozilla Firefox 3.6.x < 3.6.17 Multiple Vulnerabilities<br />

5902 Mozilla Firefox 4.0.x < 4.0.1 Multiple Vulnerabilities<br />

5904 Mozilla SeaMonkey < 2.0.14 Multiple Vulnerabilities<br />

5912 Google Chrome < 11.0.696.68 Multiple Vulnerabilities<br />

5916 Flash Player < 10.3.181.14 Multiple Vulnerabilities (APSB11-12)<br />

5925 Opera < 11.11 Frameset Memory Corruption<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

5931 Google Chrome < 11.0.696.71 Multiple Vulnerabilities<br />

5941 Flash Player < 10.3.181.22 Cross-Site Scripting (APSB11-13)<br />

5942 Novell iPrint Client < 5.64 Multiple Vulnerabilities<br />

5943 Google Chrome < 12.0.742.91 Multiple Vulnerabilities<br />

5946 VLC Media Player < 1.1.10 XSPF Playlist Parser Integer Overflow<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

53405<br />

53409<br />

53411<br />

53392<br />

53472<br />

53489<br />

53569<br />

53593<br />

53594<br />

53595<br />

53597<br />

53879<br />

54299<br />

54587<br />

54647<br />

54973<br />

54988<br />

54989<br />

55024<br />

5964 Mozilla Firefox 3.6.x < 3.6.18 Multiple Vulnerabilities Web 55418<br />

Family Web Clients 165


5965 Mozilla Firefox > 4.0 and < 5.0 Multiple Vulnerabilities<br />

Clients<br />

Web<br />

Clients<br />

5967 Flash Player < 10.3.181.26 Code Execution Vulnerability (APSB11-18) Web<br />

Clients<br />

5970 Google Chrome < 12.0.742.112 Multiple Vulnerabilities<br />

5971 Opera < 11.50 Multiple Vulnerabilities<br />

5987<br />

VLC Media Player > 0.5.0 and < 1.1.11 Multiple Code Execution<br />

Vulnerabilities<br />

5988 Opera < 11.10 Multiple Vulnerabilities<br />

5992 Safari < 5.1 Multiple Vulnerabilities<br />

5994 ClamAV < 0.97.2 'cli_hm_scan' Denial of Service<br />

5998 Google Chrome < 13.0.782.107 Multiple Vulnerabilities<br />

6000 QuickTime < 7.7 Multiple Vulnerabilities<br />

6001 Flash Player < 10.3.183.5 Multiple Vulnerabilities (APSB11-21)<br />

6008 Mozilla Firefox 5.0 Multiple Vulnerabilities<br />

6009 Mozilla Firefox 3.6 < 3.6.20 Multiple Vulnerabilities<br />

6012 Mozilla SeaMonkey 2.x < 2.3.0 Multiple Vulnerabilities<br />

6016 Google Chrome < 13.0.782.215 Multiple Vulnerabilities<br />

6019 Opera < 11.51 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

6020 Google Chrome < 13.0.782.218 Out of Date CA List<br />

6023 Google Chrome < 14.0.835.186 Multiple Vulnerabilities<br />

6024 Google Chrome < 14.0.835.163 Multiple Vulnerabilities<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

55419<br />

55141<br />

55460<br />

55470<br />

55608<br />

55506<br />

55369<br />

N/A<br />

55765<br />

55764<br />

55804<br />

55902<br />

55901<br />

55885<br />

55959<br />

56042<br />

56023<br />

56241<br />

56230<br />

Family Web Clients 166


6025 Flash Player < 10.3.183.10 Multiple Vulnerabilities (APSB11-26)<br />

6027 Mozilla Firefox 3.6 < 3.6.23 Multiple Vulnerabilities<br />

6028 Mozilla Firefox 6.0 Multiple Vulnerabilities<br />

6030 Mozilla SeaMonkey 2.x < 2.4.0 Multiple Vulnerabilities<br />

6032 Google Chrome < 14.0.835.202 Multiple Vulnerabilities<br />

6037 iTunes < 10.5 Multiple Vulnerabilities<br />

6038 Safari < 5.1.1 Multiple Vulnerabilities<br />

6044 ClamAV < 0.97.3 Unspecified Denial of Service<br />

6050 Google Chrome < 15.0.874.102 Multiple Vulnerabilities<br />

6051 Apple iTunes Client Detection<br />

6052 QuickTime < 7.7.1 Multiple Vulnerabilities<br />

6053 Opera < 11.52 Multiple Vulnerabilities<br />

6054 Novell iPrint Client < 5.72 Code Execution Vulnerability<br />

6063 PS3 Login Detection<br />

6064 PS3 Version Detection<br />

6094 Google Chrome < 15.0.874.120 Multiple Vulnerabilities<br />

6095 Google Chrome < 15.0.874.121 Code Execution Vulnerability<br />

6096 Apple iOS 3.0 through 5.0 Multiple Vulnerabilities<br />

6097<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Flash Player < 10.3.183.11 / 11.1.102.55 Multiple Vulnerabilities<br />

(APSB11-26)<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

56259<br />

56334<br />

56335<br />

56337<br />

56391<br />

56470<br />

56483<br />

N/A<br />

56650<br />

N/A<br />

56667<br />

56585<br />

56682<br />

N/A<br />

N/A<br />

56779<br />

56920<br />

N/A<br />

56875<br />

6098 iTunes < 10.5.1 Update Authenticity Verification Weakness Web 56873<br />

Family Web Clients 167


6105 Opera < 11.60 Multiple Vulnerabilities<br />

6108 Google Chrome < 16.0.912.63 Multiple Vulnerabilities<br />

6109 Mozilla Firefox 8.0 Multiple Vulnerabilities<br />

6244 Java version detection<br />

6245 Flash Player version detection<br />

6262 Google Chrome < 16.0.912.75 Multiple Vulnerabilities<br />

6294 Google Chrome < 16.0.912.77 Multiple Vulnerabilities<br />

6295 Opera < 11.61 Multiple Vulnerabilities<br />

6306 Mozilla Firefox 9.0 Multiple Vulnerabilities<br />

6307 Mozilla Firefox 3.6.x < 3.6.26 Multiple Vulnerabilities<br />

6308 Mozilla Thunderbird 9.0 Multiple Vulnerabilities<br />

6309 Mozilla Thunderbird 3.1.x Multiple Vulnerabilities<br />

6310 Mozilla SeaMonkey 2.x < 2.7.0 Multiple Vulnerabilities<br />

6311 Real <strong>Network</strong>s RealPlayer < 15.0.2.72 Multiple Vulnerabilities<br />

6312 Google Chrome < 17.0.963.46 Multiple Vulnerabilities<br />

6315 Novell iPrint Client < 5.78 Multiple Code Execution Vulnerabilities<br />

6322 Google Chrome < 17.0.963.56 Multiple Vulnerabilities<br />

6324 Mozilla Firefox 10.x < 10.0.1 Memory Corruption<br />

6325<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Firefox 10.x < 10.0.2 'png_decompress_chunk' Integer<br />

Overflow<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

57039<br />

57288<br />

57359<br />

N/A<br />

N/A<br />

57468<br />

57666<br />

57751<br />

57773<br />

57774<br />

57775<br />

57776<br />

57772<br />

57863<br />

57876<br />

57890<br />

57974<br />

57919<br />

58005<br />

Family Web Clients 168


6326 Mozilla Thunderbird 10.x < 10.0.1 Memory Corruption<br />

6327<br />

Mozilla Thunderbird 10.x < 10.0.2 'png_decompress_chunk' Integer<br />

Overflow<br />

6328 Mozilla SeaMonkey 2.x < 2.7.1 Memory Corruption<br />

6329<br />

Mozilla SeaMonkey 2.x < 2.7.2 'png_decompress_chunk' Integer<br />

Overflow<br />

6341 Google Chrome < 17.0.963.65 Multiple Vulnerabilities<br />

6344 Apple iOS 3.0 through 5.0.1 Multiple Vulnerabilities<br />

6345 iTunes < 10.6 Multiple Vulnerabilities<br />

6346 Safari < 5.1.4 Multiple Vulnerabilities<br />

6348 Google Chrome < 17.0.963.78 Code Multiple Vulnerabilities<br />

6349 Google Chrome < 17.0.963.79 Memory Corruption Vulnerabilities<br />

6350 Mozilla Firefox 10.x < 10.0.3 Multiple Vulnerabilities<br />

6351 Mozilla Firefox 3.6.x < 3.6.28 Multiple Vulnerabilities<br />

6352 Mozilla Thunderbird 10.x < 10.0.3 Multiple Vulnerabilities<br />

6353 Mozilla Thunderbird 3.1.x < 3.1.20 Multiple Vulnerabilities<br />

6354 Mozilla SeaMonkey 2.x < 2.8 Multiple Vulnerabilities<br />

6355 VLC Media Player < 2.0.1 Multiple Code Execution Vulnerabilities<br />

6356 Google Chrome < 17.0.963.83 Multiple Vulnerabilities<br />

6399 Opera < 11.62 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

6402 Google Chrome < 18.0.1025.142 Multiple Vulnerabilities<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

57920<br />

58075<br />

57921<br />

58009<br />

58206<br />

N/A<br />

58320<br />

58323<br />

58328<br />

58342<br />

58353<br />

58354<br />

58355<br />

58356<br />

58352<br />

58416<br />

58434<br />

N/A<br />

58536<br />

6403 Google Chrome < 18.0.1025.151 Multiple Vulnerabilities Web 58644<br />

Family Web Clients 169


6455<br />

Real <strong>Network</strong>s RealPlayer < 14.0.6.666 (Build 12.0.1.666) Multiple<br />

Vulnerabilities<br />

6460 Skype Client Detection<br />

6480 Epiphany Browser Version Detection<br />

6481 Apple iOS 3.0 through 5.1 Multiple Vulnerabilities<br />

6483 Safari < 5.1.7 Multiple Vulnerabilities<br />

6487 Google Chrome < 19.0.1084.46 Multiple Vulnerabilities<br />

6488 Real <strong>Network</strong>s RealPlayer < 15.0.4.53 Multiple Vulnerabilities<br />

6489 QuickTime < 7.7.2 Multiple Vulnerabilities<br />

6490 Google Chrome < 19.0.1084.52 Multiple Vulnerabilities<br />

6496 Mozilla SeaMonkey 2.x < 2.10 Multiple Vulnerabilities<br />

6497 Mozilla Firefox 12.x < 12 Multiple Vulnerabilities<br />

6500 iTunes < 10.6.3 Multiple Vulnerabilities<br />

6501 Facebook SocialCam Application Detection<br />

6503 Facebook Viddy Application Detection<br />

6504 Facebook Viddy Application Detection<br />

6505 Flash player version detection<br />

6506 Adobe Media player version detection<br />

6507 Outlook Social Connector version detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

6508 Google Chrome < 20.0.1132.43 Multiple Vulnerabilities<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

55908<br />

N/A<br />

N/A<br />

N/A<br />

59069<br />

59117<br />

59173<br />

59113<br />

59255<br />

59411<br />

59407<br />

59499<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

59735<br />

Family Web Clients 170


6512 Google Chrome < 20.0.1132.57 Multiple Vulnerabilities<br />

6514 Java version detection<br />

6518<br />

VLC Media Player < 2.0.2 Ogg_DecodePacket Function OGG File<br />

Handling Overflow<br />

6519 Mozilla Firefox 13.x < 13 Multiple Vulnerabilities<br />

6521 Mozilla SeaMonkey 2.x < 2.11 Multiple Vulnerabilities<br />

6522 Safari < 6.0 Multiple Vulnerabilities<br />

6528 Google Chrome < 21.0.1180.60 Multiple Vulnerabilities<br />

6534 Mozilla Firefox Android client<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

6536 Google Chrome < 21.0.1180.60 Multiple PDF Viewer Vulnerabilities Web<br />

Clients<br />

6544 Flash Player < 11.3.300.271 Code Execution (APSB12-18)<br />

6545<br />

Flash Player < 10.3.183.20 / 11.3.300.257 Multiple Vulnerabilities<br />

(APSB12-14)<br />

6548 VMWare VI Client Version Detection<br />

6549 Sophos Anti-virus Version Detection<br />

6551 Opera < 12.01 Multiple Vulnerabilities<br />

6554 Oracle Java SE 7 <<br />

6555 Flash Player <<br />

6559 Mozilla Firefox 14.x <<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

6561 Mozilla SeaMonkey 2.x < 2.12 Multiple Vulnerabilities<br />

6562 Opera < 12.02 Truncated Dialog Vulnerability<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

59958<br />

N/A<br />

60049<br />

60043<br />

60046<br />

60127<br />

61381<br />

N/A<br />

61462<br />

61551<br />

59428<br />

N/A<br />

N/A<br />

61414<br />

61681<br />

61623<br />

61715<br />

61718<br />

61732<br />

6563 Google Chrome < 21.0.1180.89 Multiple Vulnerabilities Web 61774<br />

Family Web Clients 171


6566 Mac Outlook Client Version Detection<br />

6574 Real <strong>Network</strong>s RealPlayer < 15.0.6.14 Multiple Vulnerabilities<br />

6575 iTunes < 10.7 Multiple Vulnerabilities<br />

6582 Mac OS X : Safari < 6.0.1 Multiple Vulnerabilities<br />

6589 Apple iOS < 6.0 Multiple Vulnerabilities<br />

6592 Google Chrome < 22.0.1229.79 Multiple Vulnerabilities<br />

6598 Flash Player <<br />

6599 Flash Player <<br />

6600 Google Chrome < 22.0.1229.92 Multiple Vulnerabilities<br />

6601 Google Chrome < 22.0.1229.94 Multiple Vulnerabilities<br />

6602 Mozilla Firefox 15.x <<br />

6603 Mozilla SeaMonkey 2.x < 2.13 Multiple Vulnerabilities<br />

6605 BigFix Client Detection<br />

6606 BigFix Client Version Detection<br />

6608 BigFix Server Detection<br />

6612 BigFix Client Patch Update<br />

6613 Mozilla SeaMonkey 2.13.x < 2.13.2 Multiple Vulnerabilities<br />

6615 Apple iOS < 6.0.1 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

6616 Google Chrome < 23.0.1271.64 Multiple Vulnerabilities<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

N/A<br />

62065<br />

62077<br />

62216<br />

N/A<br />

62313<br />

62467<br />

62480<br />

62518<br />

62519<br />

62580<br />

62583<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

62747<br />

62803<br />

62861<br />

Family Web Clients 172


6617 Steam Valve Client Detection<br />

6618 Opera < 12.10 Multiple Vulnerabilities<br />

6620 QuickTime < 7.7.3 Multiple Vulnerabilities (Windows)<br />

6621 Opera < 12.11 Multiple Vulnerabilities<br />

6622 Mac OS X : Safari < 6.0.2 Multiple Vulnerabilities<br />

6625 Mozilla Firefox 16.x <<br />

6626 Mozilla SeaMonkey 2.x <<br />

6628 Google Chrome < 23.0.1271.91 Multiple Vulnerabilities<br />

6629 Google Chrome < 23.0.1271.95 Multiple Vulnerabilities<br />

6643 Google Chrome < 23.0.1271.97 Multiple Vulnerabilities<br />

6645 Flash Player <<br />

6646 Flash Player <<br />

6647 Flash Player <<br />

6649 Opera < 12.12 Multiple Vulnerabilities<br />

6650 Netsuite Client Detection<br />

6652 Real <strong>Network</strong>s RealPlayer < 16.0.0.282 Multiple Vulnerabilities<br />

6654 Flash Player <<br />

6655 Flash Player <<br />

6656 Flash Player <<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

N/A<br />

62821<br />

62890<br />

62984<br />

62802<br />

62998<br />

63001<br />

63063<br />

63110<br />

63232<br />

63242<br />

63242<br />

63242<br />

63301<br />

N/A<br />

63289<br />

62836<br />

62836<br />

62836<br />

6658 VLC Media Player < 2.0.5 Multiple Vulnerabilities Web 63381<br />

Family Web Clients 173


6659 Red Hat Satellite Client Communication<br />

6660 Red Hat Satellite Client Communication<br />

6663 Google Chrome < 24.0.1312.52 Multiple Vulnerabilities<br />

6664 Oracle Java SE 7 <<br />

6665 Flash Player <<br />

6666 Flash Player <<br />

6667 Flash Player <<br />

6668 Mozilla Firefox 17.x <<br />

6670 Mozilla SeaMonkey 2.x <<br />

6673 Google Chrome < 24.0.1312.56 Multiple Vulnerabilities<br />

6679 Apple iOS < 6.1 Multiple Vulnerabilities<br />

6680 Opera < 12.13 Multiple Vulnerabilities<br />

6685 Oracle Java SE 7 <<br />

6687 Flash Player <<br />

6688 Flash Player <<br />

6691 Mozilla Firefox 18.x <<br />

6693 SeaMonkey < 2.16 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

6694 Google Chrome < 25.0.1364.97 Multiple Vulnerabilities<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

Web<br />

Clients<br />

6699 Oracle Java SE Multiple Vulnerabilities (February 2013 CPU Update 1) Web<br />

Clients<br />

N/A<br />

N/A<br />

63468<br />

63521<br />

63450<br />

63450<br />

63450<br />

63551<br />

63554<br />

63645<br />

64287<br />

64363<br />

64454<br />

64506<br />

64584<br />

64723<br />

N/A<br />

64813<br />

64790<br />

Family Web Clients 174


Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Web Clients 175


Family Web Servers<br />

<strong>PVS</strong><br />

ID<br />

PLUGIN NAME FAMILY NESSUS<br />

ID<br />

1103 Weak SSL Ciphers Supported<br />

1104 Weak SSL Ciphers Supported<br />

1105 Weak SSL Ciphers Supported<br />

1133 Web Server SSLv3 Detection<br />

1134 Web Server SSLv2 Detection<br />

1135 Web Server SSLv1 Detection<br />

1139 SHOUTcast Media Server Detection<br />

1157 NetWare Apache Web Server Detection<br />

1160 Sami HTTP Server 1.0.4 GET Request Remote Overflow<br />

1161 Jigsaw < 2.2.4 URI Parsing Remote Code Execution<br />

1167<br />

1169<br />

Apache-SSL < 1.3.29 / 1.53 SSLVerifyClient SSLFakeBasicAuth Client<br />

Certificate Forgery<br />

Finjan SurfinGate Proxy FHTTP Command Admin Functions<br />

Authentication Bypass<br />

1205 Apache HTTP Server < 2.0.49 mod_ssl Plain HTTP Request DoS<br />

1209 MetaSploit Framework Web Server Detection<br />

1211 HP Jet Admin 7.x Traversal Arbitrary Command Execution<br />

1212 Squid Proxy < 2.5.STABLE6 %xx URL Encoding ACL Bypass<br />

1213 Oracle Application Server Web Cache Multiple Vulnerabilities<br />

1221 Apache < 1.3.31 / 2.0.49 Error Log Escape Sequence Injection<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

10863<br />

10863<br />

10863<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

12073<br />

12071<br />

12046<br />

12036<br />

12100<br />

N/A<br />

12120<br />

12124<br />

12126<br />

12239<br />

Family Web Servers 176


1237 Apache Input Header Folding Remote DoS<br />

1238 Trojan/Backdoor - Apache mod_rootme Detection<br />

1242 Microsoft Outlook Web Access (OWA) Version Detection<br />

1442 Web Server Detection<br />

1443 Apache < 2.0.46 Multiple Vulnerabilities<br />

1444 Zope < 2.1.7 DocumentTemplate Unauthorized Modification<br />

1445 Zope < 2.2.5 Multiple Vulnerabilities<br />

1446<br />

Zope < 2.3.3 ZClass Permission Mapping Modification Local Privilege<br />

Escalation<br />

1447 Zeus < 3.3.5a Web Server Null Byte Request CGI Source Disclosure<br />

1448 Webserver4everyone < 1.30 URI Overflow<br />

1449 WebsitePro


1459 UltraSeek < 4.0 Malformed URL DoS<br />

1460 UltraSeek Server Detection<br />

1461 Tripwire for WebPages Installation Disclosure<br />

1462 Apache Tomcat /status Information Disclosure<br />

1463 Apache Tomcat < 4.x JSP Source Code Disclosure<br />

1464 Apache Tomcat Snoop Servlet Remote Information Disclosure<br />

1465 Jakarta Tomcat < 3.2.1 Path Disclosure<br />

1466 Apache Tomcat < 3.3.1a Directory Listing and File Disclosure<br />

1467 Apache Tomcat < 3.3.1a Servlet Engine MS/DOS Device Name DoS<br />

1468 thttpd < 2.20 ssi Servlet Traversal File Access<br />

1469 thttpd < 2.05 If-Modified-Since Header Remote Overflow<br />

1470 SWAT Server Detection<br />

1471 Sun Cobalt Adaptative Firewall Detection<br />

1472 StrongHold Web Server Detection<br />

1473 StrongHold < 3.0 build 3015 System File Disclosure<br />

1474 StrongHold < 3.0 build 3015 File System Disclosure<br />

1475 Abyss Web Server < 1.1.4 HTTP GET Header Remote DoS<br />

1476 PHP < 4.2.2 Malformed POST Requests<br />

1477 PHP < 4.3.1 CGI Module File Access<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

10542<br />

N/A<br />

10743<br />

11218<br />

11176<br />

10478<br />

10807<br />

11438<br />

11150<br />

10523<br />

10286<br />

10273<br />

N/A<br />

11230<br />

10803<br />

10803<br />

11521<br />

11050<br />

11237<br />

Family Web Servers 178


1478 PHP < 3.0.17 / 4.0.3 Hidden Form Field File Upload<br />

1479 PHP < 4.0.4 IMAP Module Overflow<br />

1480 PHP < 3.0.17 / 4.0.3 Error Log Command Injection<br />

1481 PHP < 4.2.3 Mail Function Header Spoofing<br />

1482 PHP < 4.0.4 php.cgi Shell Access Overflow<br />

1483 PHP < 4.1.0 Safe Mode Mail Function Command Execution<br />

1484 PHP < 4.3.2 Multiple Function Remote Overflows<br />

1485 PHP < 4.1.2 POST Request file_upload Overflow<br />

1486 RemotelyAnywhere Web Server Detection<br />

1487 Alibaba 2.0 HTTP Request Overflow DoS<br />

1488 Apache < 1.3.27 Multiple Vulnerabilities<br />

1489 Apache < 2.0.43 HTTP POST Request Source Disclosure<br />

1490 Apache mod_auth_pgsql < 0.9.6 SQL Injection<br />

1491 Apache mod_auth_pg < 1.2b3 SQL Injection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

1492 Apache mod_auth_mysql < 1.10 SQL Injection<br />

1493 Apache mod_auth_oracle < 0.52 SQL Injection<br />

1494 Apache mod_auth_pgsql_sys < 0.9.5 SQL Injection<br />

1495 Apache Chunked Encoding Remote Overflow / DoS<br />

1496 Apache-SSL < 1.47 mod_ssl i2d_SSL_SESSION Function Overflow<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

10513<br />

10628<br />

10535<br />

11444<br />

N/A<br />

12307<br />

11468<br />

N/A<br />

10920<br />

10012<br />

11137<br />

11408<br />

10752<br />

10752<br />

10752<br />

10752<br />

10752<br />

11030<br />

10918<br />

1497 Apache < 2.0.44 MS-DOS Device Name DoS / Code Execution Web 11209<br />

Family Web Servers 179


1498 Apache < 2.0.40 Win32 Directory Traversal File Access<br />

1499 Apache < 2.0.44 File Access on Win32<br />

1500 BadBlue < 2.3 ISAPI Extension Administrative Actions Bypass<br />

1501 BitKeeper 3.0.x Remote Command Execution<br />

1502 Communigate Pro < 3.2 HTTP Configuration Port Remote Overflow<br />

1503 Compaq WBEM Server Detection<br />

1504 Lotus Domino < 5.0.12 / 6.0.1 Multiple Vulnerabilities<br />

1505 Domino < 5.0.7 NSF File Request Directory Traversal File Access<br />

1506 dwhttpd < 4.2 GET Request Remote Format String<br />

1507 IMail < 7.0.6 Account Hijacking<br />

1508 LocalWeb2000 2.10 Crafted Request File Disclosure<br />

1509 Apache mod_frontpage < 1.6.1 Remote Overflow<br />

1510 Apache mod_jk < 1.2.1 Chunked Encoding DoS<br />

1511 Apache mod_python < 2.7.8 Imported Function Access<br />

1512 Apache mod_ssl < 2.8.10 Off-by-one Overflow<br />

1513 Apache mod_ssl Session Cache Code Overflow<br />

1514 Monkey HTTP Daemon < 0.6.2 POST Request Remote Overflow<br />

1515 OpenSSL Private Key Disclosure<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

1516 Oracle WebCache Server < 2.0.0.3.x Multiple Vulnerabilities<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

11092<br />

11210<br />

11554<br />

11198<br />

10048<br />

10746<br />

11338<br />

11344<br />

11075<br />

11271<br />

11005<br />

11303<br />

11519<br />

10947<br />

11039<br />

10888<br />

11544<br />

11267<br />

10808<br />

Family Web Servers 180


1517 Resin < 2.1s020604 MS-DOS Device Path Disclosure<br />

1518 Savant < 3.0 GET Request CGI Source Disclosure<br />

1519 Pi3Web WebServer < 2.0.1 CGI Handler Overflow<br />

1520 Shoutcast Multiple GET Request Remote DoS<br />

1521 AnalogX SimpleServer:WWW < 1.2 Remote DoS<br />

1522 thttpd < 2.05 If-Modified-Since Header Overflow<br />

1523 Squid < 2.4.STABLE6 Multiple Overflows<br />

1524 Squid Proxy mkdir-only PUT Request DoS<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

1525 BEA WebLogic < 5.1.0 SP8 Hex-encoded Request JSP Source Disclosure Web<br />

Servers<br />

1526<br />

BEA WebLogic < 6.1 SP2 Encoded Null Byte Request JSP Source<br />

Disclosure<br />

1527 SHOUTcast Server Log Files XSS<br />

1529 mod_ssl < 2.8.10 Wildcard DNS Server Name XSS<br />

1531 eServ HTTP Connection Saturation Memory Leak Remote DoS<br />

1535 Apache < 2.0.46 on OS/2 filestat.c Device Name Request DoS<br />

1536 BEA WebLogic Server GET Request Name Disclosure<br />

1538 BEA WebLogic < 5.1 SP 11 JSP Source Disclosure<br />

1541 NetCharts Server Default Password<br />

1544 JetDB Direct Request Database Download<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

1545 YaBB SE < 1.5.2 Remote File Inclusion and SQL Injection<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

11048<br />

N/A<br />

11099<br />

10717<br />

11305<br />

10285<br />

10923<br />

10768<br />

10715<br />

10949<br />

11624<br />

11622<br />

11619<br />

11607<br />

11606<br />

11604<br />

11600<br />

N/A<br />

11588<br />

1546 XMB < 1.8 SP1 member.php SQL Injection Web 11587<br />

Family Web Servers 181


1547 Sambar Cleartext Password Remote Disclosure<br />

1550<br />

thttpd < 2.24 Host:' Header Traversal File Access / libhttpd.c defang<br />

Overflow<br />

1552 CommuniGate Pro < 4.0 .1b2 Referer Field Hijacking<br />

1554 BadBlue < 2.2 Unspecified Admin Access<br />

1556 mod_NTLM Overflow / Format String<br />

1560 Xeneo Web Server < 2.1.5 GET Request Denial of Service<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

1561 Monkey HTTP Daemon < 0.6.2 PostMethod Function Remote Overflow Web<br />

Servers<br />

1566 Vignette StoryServer Information Disclosure<br />

1568 Linksys Router Default Password<br />

1570 Abyss Malformed GET Request Remote DoS<br />

1571 mod_jk Chunked Encoding DoS<br />

1572 AutomatedShops webc.cgi Multiple Overflows<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

1573 NETGEAR ProSafe Router Password Disclosure / Port Filtering Bypass Web<br />

Servers<br />

1574 Ecartis User Password Reset Privilege Escalation<br />

1575 Sambar Default 'billy-bob' Account<br />

1576 Sambar Default Admin Account<br />

1577 Sambar Default Anonymous Account<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

1580 Advanced Poll info.php Information Disclosure<br />

1581 Advanced Poll info.php Information Disclosure<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

11585<br />

11576<br />

11567<br />

N/A<br />

11552<br />

11546<br />

11544<br />

11526<br />

11522<br />

11521<br />

11519<br />

11516<br />

11514<br />

11505<br />

11493<br />

11493<br />

11493<br />

11487<br />

11487<br />

Family Web Servers 182


1583 Microsoft IIS UNC Mapped Virtual Host Source Disclosure<br />

1585 WebDAV Enabled<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

1586 Sun ONE (iPlanet) Application Server < 6.5 SP1 NSAPI Plugin Overflow Web<br />

Servers<br />

1587 Lotus Domino < 6.0.1 Multiple Overflows<br />

1590 Proxy Accepts gopher:// Protocol Requests<br />

1591 PHP-Nuke Software Detection<br />

1593<br />

Oracle 9iAS SOAP Default Configuration Unauthenticated Application<br />

Deployment<br />

1594 Oracle 9iAS .JSP File Request Default Error Information Disclosure<br />

1595 Phorum < 3.4.3 Message Post XSS<br />

1596 WebGUI < 5.2.4 Crafted HTTP Request DoS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

1597 Web Server .mdb File Remote Information Disclosure<br />

1599 Wireless Access Point (WAP) Detection (HTTP)<br />

1600 D-Link Wireless Access Point (WAP) Detection (HTTP)<br />

1601 Cisco Wireless Access Point (WAP) Detection (HTTP)<br />

1602 Cisco Wireless Access Point (WAP) Detection (HTTP)<br />

1603 Linksys Wireless Access Point (WAP) Detection (HTTP)<br />

1604 Linksys WRT Wireless Access Point (WAP) Detection (HTTP)<br />

1605 Linksys BEFW Wireless Access Point (WAP) Detection (HTTP)<br />

1606 Linksys WPG Wireless Access Point (WAP) Detection (HTTP)<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

11443<br />

11424<br />

11403<br />

11386<br />

11305<br />

11236<br />

11227<br />

11226<br />

N/A<br />

N/A<br />

N/A<br />

11026<br />

11026<br />

11026<br />

11026<br />

11026<br />

11026<br />

11026<br />

11026<br />

1607 SOHO Wireless Access Point (WAP) Detection (HTTP) Web 11026<br />

Family Web Servers 183


Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

1608 Buffalo WBR-G54 Wireless Access Point (WAP) Detection (HTTP)<br />

1609 R2 Wireless Access Point (WAP) Detection (HTTP)<br />

1610 Wireless Access Point (WAP) Detection (HTTP)<br />

1611 Wireless Access Point (WAP) Detection (HTTP)<br />

1612 Wireless Access Point (WAP) Detection (HTTP)<br />

1613 Wireless Access Point (WAP) Detection (HTTP)<br />

1614 Wireless Access Point (WAP) Detection (HTTP)<br />

1615 Wireless Access Point (WAP) Detection (HTTP)<br />

1616 Wireless Access Point (WAP) Detection (HTTP)<br />

1617 Wireless Access Point (WAP) Detection (HTTP)<br />

1618 Wireless Access Point (WAP) Detection (HTTP)<br />

1619 Wireless Access Point (WAP) Detection (HTTP)<br />

1620 Wireless Access Point (WAP) Detection (HTTP)<br />

1621 Wireless Access Point (WAP) Detection (HTTP)<br />

1622 NETGEAR Wireless Access Point (WAP) Detection (HTTP)<br />

1623 NETGEAR Wireless Access Point (WAP) Detection (HTTP)<br />

1624 Broadcom Wireless Access Point (WAP) Detection (HTTP)<br />

1625 Apache < 1.3.14 Multiple Forward Slash Directory Listing<br />

1626 Stalkerlab Mailers CGIMail.exe Arbitrary File Retrieval<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

11026<br />

11026<br />

11026<br />

11026<br />

11026<br />

11026<br />

11026<br />

11026<br />

11026<br />

11026<br />

11026<br />

11026<br />

11026<br />

11026<br />

11026<br />

11026<br />

11026<br />

10440<br />

11721<br />

Family Web Servers 184


1627 Trend Micro Virus Buster cgiWebupdate.exe Arbitrary File Access<br />

1628 PDGSoft Shopping Cart redirect.exe Remote Overflow<br />

1629 PDGSoft Shopping Cart changepw.exe Remote Overflow<br />

1630 counter.exe Detection<br />

1631 WebLogic FileServlet Source Code Disclosure<br />

1632 CSNews.cgi Arbitrary File Access<br />

1633 NetWin CWMail.exe < 2.8a Remote Overflow<br />

1634<br />

Excite for Web Servers (EWS) AT-admin.cgi Remote Password<br />

Disclosure<br />

1635 CSMailto.cgi Multiple Vulnerabilities<br />

1636 UltraBoard UltraBoard.cgi Arbitrary File Access<br />

1637 UltraBoard UltraBoard.pl Arbitrary File Access<br />

1638 YaBB YaBB.cgi num Parameter XSS<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

1639 Drummond Miles A1Statistics a1disp4.cgi Traversal Arbitrary File Read Web<br />

Servers<br />

1640 Cobalt RAQ alert.cgi XSS<br />

1641 Aplio Internet Phone authenticate.cgi Arbitrary Command Execution<br />

1642 Extropia WebBBS bbs_forum.cgi Remote Command Execution<br />

1643 BNBForm bnbform.cgi Automessage Arbitrary File Retrieval<br />

1644<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

bsguest.cgi Guestbook Email Address Variable Arbitrary Command<br />

Execution<br />

1645 bslist.cgi Email Address Variable Arbitrary Command Execution<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

1646 Aktivate Shopping System catgy.cgi desc Parameter XSS Web N/A<br />

11722<br />

11723<br />

11723<br />

11725<br />

11724<br />

11726<br />

11727<br />

N/A<br />

11748<br />

11748<br />

Family Web Servers 185<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


1647 cgforum.cgi Multiple Vulnerabilities<br />

1648 classifieds.cgi Multiple Vulnerabilities<br />

1649 csPassword.cgi Multiple Vulnerabilities<br />

1650 cvsview2.cgi Multiple Vulnerabilities<br />

1651 cvslog.cgi Multiple Vulnerabilities<br />

1652 multidiff.cgi Multiple Vulnerabilities<br />

1653 dnewsweb.cgi Multiple Vulnerabilities<br />

1654 download.cgi Multiple Vulnerabilities<br />

1655 edit_action.cgi Multiple Vulnerabilities<br />

1656 emumail.cgi Multiple Vulnerabilities<br />

1657 everythingform.cgi Multiple Vulnerabilities<br />

1658 ezadmin.cgi Multiple Vulnerabilities<br />

1659 ezboard.cgi Multiple Vulnerabilities<br />

1660 ezman.cgi Multiple Vulnerabilities<br />

1661 ezadmin.cgi Multiple Vulnerabilities<br />

1662 FileSeek.cgi Multiple Vulnerabilities<br />

1663 fom.cgi Multiple Vulnerabilities<br />

1664 gbook.cgi Multiple Vulnerabilities<br />

1665 getdoc.cgi Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

11748<br />

N/A<br />

11748<br />

11748<br />

11748<br />

11748<br />

11748<br />

11748<br />

11748<br />

11748<br />

11748<br />

11748<br />

11748<br />

11748<br />

11748<br />

11748<br />

11748<br />

11748<br />

11748<br />

Family Web Servers 186


1666 global.cgi Multiple Vulnerabilities<br />

1667 guestserver.cgi Multiple Vulnerabilities<br />

1668 imageFolio.cgi Multiple Vulnerabilities<br />

1669 lastlines.cgi Multiple Vulnerabilities<br />

1670 mailfile.cgi Multiple Vulnerabilities<br />

1671 mailview.cgi Multiple Vulnerabilities<br />

1672 sendmessage.cgi Multiple Vulnerabilities<br />

1673 nsManager.cgi Multiple Vulnerabilities<br />

1674 perlshop.cgi Multiple Vulnerabilities<br />

1675 readmail.cgi Multiple Vulnerabilities<br />

1676 printmail.cgi Multiple Vulnerabilities<br />

1677 register.cgi Multiple Vulnerabilities<br />

1678 sendform.cgi Multiple Vulnerabilities<br />

1679 sendmessage.cgi Multiple Vulnerabilities<br />

1680 service.cgi Multiple Vulnerabilities<br />

1681 setpasswd.cgi Multiple Vulnerabilities<br />

1682 simplestmail.cgi Multiple Vulnerabilities<br />

1683 simplestguest.cgi Multiple Vulnerabilities<br />

1684 talkback.cgi Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

11748<br />

11748<br />

11748<br />

11748<br />

11748<br />

11748<br />

11748<br />

11748<br />

11748<br />

11748<br />

11748<br />

11748<br />

11748<br />

11748<br />

11748<br />

11748<br />

11748<br />

11748<br />

11748<br />

1685 ttawebtop.cgi Multiple Vulnerabilities Web 11748<br />

Family Web Servers 187


1686 ws_mail.cgi Multiple Vulnerabilities<br />

1688 Microsoft FrontPage Extensions Detection<br />

1689 Microsoft FrontPage Extensions Detection<br />

1690 Microsoft FrontPage Extensions Detection<br />

1691<br />

Microsoft IIS FrontPage Visual Studio RAD Support fp30reg.dll<br />

Overflow<br />

1692 Hosting Controller Multiple Script Arbitrary Directory Browsing<br />

1693 Hosting Controller Multiple Script Arbitrary Directory Browsing<br />

1694 Hosting Controller Multiple Script Arbitrary Directory Browsing<br />

1695 Hosting Controller Multiple Script Arbitrary Directory Browsing<br />

1696 Hosting Controller Multiple Script Arbitrary Directory Browsing<br />

1697 Hosting Controller Multiple Script Arbitrary Directory Browsing<br />

1698 Hosting Controller Multiple Script Arbitrary Directory Browsing<br />

1699 Hosting Controller Multiple Script Arbitrary Directory Browsing<br />

1700 Hosting Controller Multiple Script Arbitrary Directory Browsing<br />

1701 Hosting Controller Multiple Script Arbitrary Directory Browsing<br />

1702 Microsoft IIS bdir.htr Directory Listing<br />

1703 Microsoft IIS 5.0 PROPFIND Remote DoS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

1704 Microsoft IIS viewcode.asp Arbitrary File Access<br />

1705 Microsoft IIS viewcode.asp Arbitrary File Access<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

11748<br />

10077<br />

10077<br />

10077<br />

10699<br />

11745<br />

11746<br />

11745<br />

11746<br />

11745<br />

11746<br />

11745<br />

11746<br />

11745<br />

11746<br />

10577<br />

10667<br />

10576<br />

10576<br />

Family Web Servers 188


1706 Microsoft IIS viewcode.asp Arbitrary File Access<br />

1707 Microsoft IIS viewcode.asp Arbitrary File Access<br />

1708 Microsoft IIS viewcode.asp Arbitrary File Access<br />

1709 Microsoft IIS viewcode.asp Arbitrary File Access<br />

1710 Microsoft IIS viewcode.asp Arbitrary File Access<br />

1711 ION ion-p.exe Traversal File Access<br />

1712 Netdynamics ndcgi.exe Previous User Session Replay<br />

1713 TrendMicro eManager Detection<br />

1714 AspUpload Multiple Script File Upload / Directory Traversal<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

1715 Lucent VitalNet VsSetCookie.exe Direct Request Authentication Bypass Web<br />

Servers<br />

1716 Netwin WebNews Webnews.exe Remote Overflow<br />

1717 Microsoft IIS Patch Level Detection (English versions only)<br />

1718 Microsoft IIS Patch Level Detection (English versions only)<br />

1719 Microsoft IIS Patch Level Detection (English versions only)<br />

1720 Microsoft IIS Patch Level Detection (English versions only)<br />

1721 Microsoft IIS Patch Level Detection (English versions only)<br />

1722 Microsoft IIS Patch Level Detection (English versions only)<br />

1723 Apache Web Server Detection<br />

1724 Microsoft Web Server Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

1725 Kerio Mailserver Embedded HTTP Server Multiple Unspecified Web N/A<br />

10576<br />

10576<br />

10576<br />

10576<br />

10576<br />

11729<br />

11730<br />

11747<br />

11746<br />

11731<br />

11732<br />

Family Web Servers 189<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


Vulnerabilities Servers<br />

1726 CuteNews show_archives.php XSS<br />

1727 QuiXplorer < 2.3.1 item Parameter Directory Traversal File Access<br />

1728<br />

AWStats Rawlog Plugin Logfile Parameter Arbitrary Command<br />

Execution<br />

1729 phpBB < 2.0 Multiple Vulnerabilities<br />

1730 WackoWiki < R4.0 TextSearch XSS<br />

1731 PScript PForum < 1.26 User Profile XSS<br />

1732 Powie PHP Forum < 1.15 Multiple Vulnerabilities<br />

1733 Sympa < 4.1.2 List Creation Authentication Bypass<br />

1762 Web Server JavaScript File (.js) Copyright Information<br />

1894 Oracle 9iAS Administrative Web Interface Authentication Weakness<br />

2120 thttpd < 2.20 Arbitrary World-Readable File Disclosure<br />

2121 THTTPD/Mini_HTTPD < 2.22 File Disclosure<br />

2122 THTTPD/Mini_HTTPD < 1.16 File Disclosure<br />

2123 thttpd < 2.21 Error Page XSS<br />

2124 thttpd/mini_httpd Virtual Hosting File Disclosure<br />

2125 thttpd/mini_httpd < 2.24 Virtual Hosting File Disclosure<br />

2126 thttpd CGI Test Script XSS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

2127 BadBlue Webserver Connection Saturation Remote DoS<br />

2134 libNSS Hello Challenge Remote Heap Overflow<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

11452<br />

Family Web Servers 190<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


2136 Icecast list.cgi User-Agent XSS<br />

2137 Icecast < 2.0.1 HTTP Basic Authentication Remote Overflow<br />

2138<br />

Icecast Server < 2.0.0 list_directory Function Traversal Directory<br />

Enumeration<br />

2139 Icecast < 1.3.12 Multiple Remote Buffer Overflows<br />

2140 Icecast < 1.3.10 Multiple Remote Buffer Overflows<br />

2141 Icecast < 1.3.12-1 HTTP GET Request Remote Overflow<br />

2142 Icecast Server < 1.3.10 Crafted URI Remote DoS<br />

2143 Icecast Server < 1.3.10 Directory Traversal Arbitrary File Access<br />

2144 Icecast < 1.3.10 print_client() Format String<br />

2147 Easy File Share Virtual Folders Arbitrary File Access<br />

2148 Easy File Sharing Large HTTP Request Remote DoS<br />

2164 Keene Digital Media Server Directory Traversal Arbitrary File Access<br />

2165<br />

Keene Digital Media Server < 1.0.4 Directory Traversal and<br />

Authentication Bypass<br />

2167 HastyMail HTML Attachment Content-Disposition Header XSS<br />

2170 4D WebStar < 5.3.3 FTP Pre-Authentication Overflow<br />

2171 4D WebStar < 5.3.3 Information Disclosure<br />

2172 Abyss < 1.1.6 httpd GET Request Remote Overflow<br />

2173 Apache < 1.3.28 Multiple Vulnerabilities<br />

2174 Apache < 1.3.29 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

2175 Apache < 2.0.48 Multiple Vulnerabilities Web N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

14370<br />

14195<br />

14196<br />

11784<br />

11793<br />

11915<br />

Family Web Servers 191


2176 Argosoft HTTP GET Request Saturation Remote DoS<br />

2177 BadBlue < 2.3 ISAPI Module Remote Administrative Interface Access<br />

2178 CommuniGatePro < 4.1b2 Session Token Disclosure<br />

2179 Dune Web Server HTTP GET Request Remote Overflow<br />

2180 Microsoft IIS FrontPage Extensions Detection<br />

2181<br />

iPlanet Web Server < 4.1 SP7 URL-Encoded Host: Information<br />

Disclosure<br />

2182 MyServer <<br />

2183 OpenSSL < 0.9.6m / 0.9.7d Multiple DoS<br />

2184 Pi3Web Webserver < 2.0.3 HTTP GET Request Overflow DoS<br />

2185<br />

Squid Remote NTLM Authentication Password Handling Remote<br />

Overflow<br />

2186 WebServer 4D HTTP GET Request Remote Overflow<br />

2192 pLog register.php HTML Injection<br />

2193 dasBlog Multiple HTTP Headers HTML Injection<br />

2194 Cerbere Proxy Server Long Host Header Field Overflow DoS<br />

2253 CuteNews <<br />

2254 Apache < 2.0.51 Multiple Vulnerabilities<br />

2255 Squid NTLM Authentication NTLMSSP Packet Remote DoS<br />

2260 phpMyBackupPro < 1.0.0 Multiple Input Sanitization Vulnerabilities<br />

2261 Keene Digital Media Server Multiple XSS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

11734<br />

11641<br />

11567<br />

11751<br />

11923<br />

11856<br />

11770<br />

12110<br />

11695<br />

12294<br />

11560<br />

N/A<br />

N/A<br />

N/A<br />

17256<br />

Family Web Servers 192<br />

N/A<br />

N/A<br />

N/A<br />

N/A


2262 Keene Digital Media Server Multiple Script Authentication Bypass<br />

2263 Ipswitch WhatsUp Gold prn.htm GET Request Remote DoS<br />

2264 Ipswitch WhatsUp Gold Notification Instance Name Remote Overflow<br />

2276 Apache < 2.0.51 mod_ssl Rewrite Rules DoS<br />

2282 BEA WebLogic < 8.1.0 SP 3 Multiple Vulnerabilities<br />

2286 PHP Arbitrary File Upload<br />

2290 Apache < 2.0.51 ${ENVVAR} Local Overflow<br />

2291 Apache < 2.0.51 mod_dav DAV LOCK Command Remote DoS<br />

2292 Apache < 2.0.51 IPv6 Remote Buffer Overflow<br />

2293 myServer < 0.7.1 Directory Traversal Arbitrary File Access<br />

2303 HTML Comment 'href' Link Obfuscation<br />

2307 Rhinosoft DNS4Me Multiple Vulnerabilities<br />

2309 Apache < 2.0.52-dev 'Satisfy' Directive Access Control Bypass<br />

2314 EmuLive Server4 Authentication Bypass / DoS<br />

2316 Macromedia JRun Multiple Vulnerabilities<br />

2328 BroadBoard Message Board Detection<br />

2329 BroadBoard Message Board SQL Injection<br />

2330 MegaBBS ASP Forum SQL Injection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

2333 @lex Guestbook livre_include.php Remote File Inclusion<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

2335 Icecast < 2.0.2 Multiple HTTP Headers Remote Overflow Web N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

14770<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

14810<br />

N/A<br />

14828<br />

N/A<br />

14830<br />

Family Web Servers 193


2339 W-Agora Multiple Input Validation Vulnerabilities<br />

2342 AJ-Fork Permission Weakness Information Disclosure<br />

2343 Bblog Blog Software Detection<br />

2346 BugPort < 1.134 Remote Privilege Escalation<br />

2348 <strong>Network</strong>Active Web Server Resource Exhaustion DoS<br />

2350 PHPLinks SQL Injection<br />

2351 Jetty Web Server < 4.2.4 Directory Traversal Arbitrary File Access<br />

2354 PHP < 5.0.2 Open Bracket Memory Disclosure<br />

2355 DCP-Portal < 6.1 Multiple Vulnerabilities<br />

2356 WordPress BLOG < 1.2.1 wp-login.php HTTP Response Splitting<br />

2357 Helix RealServer Remote Integer Handling DoS<br />

2363 Squid < 2.5.STABLE7 SNMP ASN.1 Parser Remote DoS<br />

2364 CJOverkill < 4.0.4 trade.php XSS<br />

2365 IceWarp Web Mail < 5.3.0 Multiple Vulnerabilities<br />

2367 Serendipity < 0.7.0rc1 HTTP Response Splitting<br />

2378 PHPList < 2.6.5 Multiple Remote Vulnerabilities<br />

2382 Caudium Web Server < 1.4.4 RC2 Malformed URI DoS<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

2383 Cherokee Web Server < 0.4.17.1 auth_pam Authentication Format String Web<br />

Servers<br />

2386 MailPost.exe Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Web<br />

Servers<br />

15402<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

15463<br />

15462<br />

15469<br />

15543<br />

N/A<br />

N/A<br />

N/A<br />

15626<br />

Family Web Servers 194


2387 IceWarp Web Mail < 5.3.1 Multiple Vulnerabilities (2)<br />

2388 Moodle < 1.4.3 Glossary Module SQL Injection<br />

2389 Gallery < 1.4.4-p12 Unspecified HTML Injection<br />

2390 Helm Control Panel < 3.1.20 Multiple Input Validation Vulnerabilities<br />

2391 cPanel Front Page Extension Installation Information Disclosure<br />

2392 cPanel Remote Backup Module Information Disclosure<br />

2400 04WebServer Multiple Remote Vulnerabilities<br />

2408 Ipswitch IMail Server < 8.14.0 Delete Command Buffer Overflow<br />

2437 JanaServer < 2.4.5 Multiple Remote DoS<br />

2448<br />

Squid Proxy Failed DNS Lookup Random Error Messages Information<br />

Disclosure<br />

2450 OpenText FirstClass HTTP Daemon Search DoS<br />

2460 PHP < 4.3.10 / 5.0.3 Multiple Vulnerabilities<br />

2461<br />

IBM WebSphere Commerce Database Update Default User Information<br />

Disclosure<br />

2476 SHOUTcast < 1.9.5 Filename Remote Format String<br />

2490 Big Sister Information Leak<br />

2491 Squid Server Report Information Disclosure<br />

2492 Ganglia Cluster Report Information Disclosure<br />

2493 WebLog Information Disclosure<br />

2494 Getstats Report Information Disclosure<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

2495 wwwstat Report Information Disclosure Web N/A<br />

15643<br />

15639<br />

15624<br />

N/A<br />

N/A<br />

18540<br />

N/A<br />

N/A<br />

15862<br />

15929<br />

15934<br />

15973<br />

N/A<br />

16064<br />

Family Web Servers 195<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


2496 Hassan Shopping Cart Detection<br />

Servers<br />

Web<br />

Servers<br />

2497 Cisco 'tech-support' Anonymous User Debugging Information Disclosure Web<br />

Servers<br />

2498 Xerox Default Administrative Web Page Detection<br />

2499 Mnogosearch search.cgi Detection<br />

2500 Gallery Configuration Mode Authentication Bypass<br />

2504 Awstats Web Statistics Server Detection<br />

2506 Webalizer Report Information Disclosure<br />

2507 osCommerce Admin Interface Detection<br />

2508 Terminal Services Web Detection<br />

2509 Nessus Scan Report Disclosure<br />

2510 ISS Scan Report Disclosure<br />

2511 Big Brother Information Disclosure<br />

2514 SNAP <strong>Network</strong> Attached Server Administration Page<br />

2515 MikroTik Router Detection<br />

2516 Oracle HTTP Listener Default Web Page Detection<br />

2520 Squid Proxy < 2.5.STABLE8 Multiple Vulnerabilities<br />

2527 Siteman forum.php page Parameter XSS<br />

2528 MaxDB WebSQL < 7.5.00.18 Remote Overflow<br />

2536 SparkleBlog journal.php SQL Injection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

N/A<br />

N/A<br />

N/A<br />

11735<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

12234<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

10849<br />

Family Web Servers 196<br />

N/A<br />

N/A<br />

N/A<br />

N/A


2537<br />

Squid Proxy < 2.5.STABLE8 Gopher, WCCP, and Cache Poisoning<br />

Vulnerabilities<br />

2538 NETGEAR Router Detection<br />

2539 NETGEAR Router Log Viewer XSS<br />

2540 Ocean12 ASP Calendar Administrative Interface Access<br />

2552 3[APA3A] Proxy Remote Overflow<br />

2553 3[APA3A] Proxy Detection<br />

2565 MRTG Web Application Detection<br />

2566 Mercury Test Director Application Detection<br />

2567 Lotus Domino Address Book Information Disclosure<br />

2569 CoolForum < 0.8 SQL Injection<br />

2570 WebWasher Proxy Server < 3.4 Detection<br />

2571 WebWasher Proxy Server Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

2572 Alt-N WebAdmin < 3.0.3 Multiple Remote Vulnerabilities<br />

2573 IceWarp Web Mail < 5.3.3 Multiple Vulnerabilities (3)<br />

2575 phpPGAds/phpAdNew < 2.0.2 HTTP Response Splitting<br />

2586 Ventia DeskNow Multiple Remote Vulnerabilities<br />

2587 Savant Web Server Multiple Remote Overflows<br />

2589 Mambo Content Server < 4.5.1b Detection Global Variables Overwrite<br />

2590 Sunshop < 3.4RC2 index.php search Parameter XSS<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

2594 RaidenHTTPd < 1.1.31 Crafted Request Remote File Access Web N/A<br />

16190<br />

N/A<br />

N/A<br />

15974<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

16271<br />

16273<br />

16276<br />

N/A<br />

N/A<br />

16312<br />

Family Web Servers 197<br />

N/A


2608 Apache mod_python < 3.1.4 Information Disclosure<br />

2612 IBM WebSphere JSP Engine Source Disclosure<br />

2615 BEA WebLogic < 8.1.0 SP4 Information Disclosure<br />

2620 Sami HTTP Server v1.0.5 Remote Overflow<br />

2623 Compaq WBEM < 5.96 Multiple Remote Overflows<br />

2624 Lighttpd < 1.3.8 CGI Source Disclosure<br />

2625 DCP-Portal < 6.1.2 Multiple SQL Injection<br />

2632 TrackerCam Multiple Remote Overflows<br />

2638 Mambo Content Server Detection Global Variables Overwrite<br />

2657 BadBlue < 2.60 'GET' Request Remote Overflow<br />

2659 Policy - WebMod Gaming HTTP Server Detection<br />

2660 WebMod < 0.48 HTTP Server 'Content-Length' Heap Overflow<br />

2664 RaidenHTTPd < 1.1.33 Remote Buffer Overflow<br />

2669<br />

Squid < 2.5.STABLE10 Set-Cookie Authentication Information<br />

Disclosure<br />

2670 CProxy Directory Traversal Arbitrary File Access / DoS<br />

2677 Sun WebServer Detection<br />

2701 Apache Tomcat AJP12 Protocol Remote DoS<br />

2705 Phorum < 5.0.15 HTML Injection<br />

2708 Dell Remote Access Controller Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

N/A<br />

N/A<br />

N/A<br />

16468<br />

17997<br />

16475<br />

16478<br />

N/A<br />

18495<br />

N/A<br />

N/A<br />

N/A<br />

17243<br />

N/A<br />

N/A<br />

N/A<br />

17322<br />

17596<br />

Family Web Servers 198<br />

N/A


2712 IBM WebSphere 'ResetPassword' Information Disclosure<br />

2714 Jetty < 4.2.19 HttpRequest.java Content-Length DoS<br />

2724 Icecast Multiple Vulnerabilities<br />

2727 Panasonic Camera Detection<br />

2728 MOBOTIX AG Camera Detection<br />

2729 AXIS Camera Detection<br />

2733 SAP Internet Transaction Server Version Detection<br />

2741 Sun Cobalt RAQ Server Detection<br />

2744 Apache < 2.0.50 Input Header Folding and mod_ssl DoS<br />

2775 AOLServer Multiple Remote Vulnerabilities<br />

2782 PHP Remote getimagesize DoS<br />

2790<br />

CommuniGatePro < 4.3c3 Undisclosed LISTS Module Multipart Message<br />

DoS<br />

2800 Lotus Domino Server < 6.5.3 Web Service Remote DoS<br />

2804 ColdFusion MX Server Detection<br />

2805 ColdFusion MX Server Detection<br />

2806 ColdFusion < 7.0 MX File Disclosure<br />

2810 Autocomplete Not Disabled for 'Password' Field<br />

2825 IBM WebSphere JSP Source Disclosure / XSS Vulnerabilities<br />

2830 Oracle Application Server 10g Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

2831 Oracle Application Server J2EE Container Detection Web N/A<br />

17337<br />

17348<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

12293<br />

N/A<br />

18033<br />

17985<br />

17991<br />

Family Web Servers 199<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


2835 Monkey HTTP Daemon < 0.9.1 Multiple Vulnerabilities<br />

2842 webcamXP < 2.16.478 Chat Name HTML Injection<br />

2845 SunOne Web Proxy < 3.6 SP7 Unspecified Remote Buffer Overflows<br />

2860<br />

Fastream NETFile < 7.5.0 Beta 7 Directory Traversal Arbitrary File<br />

Access<br />

2862 BEA WebLogic < 8.1 SP5 Multiple Vulnerabilities<br />

2866<br />

2870<br />

Oracle Application Server Web Cache OHS mod_access Authentication<br />

Bypass<br />

Lotus Domino Server Web Service NRPC Authentication Format String<br />

DoS<br />

2881 Oracle Application Server < 10.1.0.0.3 Privilege Escalation<br />

2882 Oracle Application Server < 10.1.0.0.4 Logging Service Interruption<br />

2883<br />

Software602 602Pro LAN SUITE < 2004.0.05.0509 Directory Traversal<br />

Arbitrary File Access<br />

2884 Apache htdigest realm Variable Overflow<br />

2890 GeoVision Digital Surveillance System Detection<br />

2891 GeoVision Digital Surveillance System Detection<br />

2892 myServer Multiple Vulnerabilities<br />

2893 ColdFusion Error Page XSS<br />

2896 Woppoware Postmaster < 4.2.3 Multiple Vulnerabilities<br />

2940 Apache htpasswd Overflow<br />

2943 PeerCast < 0.1212 URL Error Message Format String<br />

2946 FlexCast < 2.0 Remote Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

N/A<br />

18122<br />

18114<br />

N/A<br />

18365<br />

18181<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

18220<br />

N/A<br />

18218<br />

N/A<br />

18246<br />

14771<br />

18417<br />

18429<br />

Family Web Servers 200


2947 Sawmill < 7.1.6 Multiple Vulnerabilities<br />

3014 Outlook Web Access with Exchange 5.5 SP4 XSS<br />

3019 YAWS < 1.56 Script File Source Code Disclosure<br />

3021<br />

3027<br />

JBoss Malformed HTTP Request Remote Configuration Information<br />

Disclosure<br />

IpSwitch WhatsUp < 2005 SP 1A Login.asp Multiple Parameter SQL<br />

Injection<br />

3042 Apache HTTP Request Parsing HTML Injection<br />

3057 Apache Webserver Valid Banner Check<br />

3063 Moodle < 1.5.1 Unspecified Vulnerability<br />

3105 Alt-N MDaemon < 8.0.4 IMAP Multiple Buffer Overflows<br />

3112 Apache < 2.0.55 HTTP Smuggling Vulnerability<br />

3114 Lotus Domino Server Multiple Information Disclosure Vulnerabilities<br />

3116 Generic Botnet Server Detection (Web Admin)<br />

3151 MDaemon < 8.1.0 Content Filter Traversal Arbitrary File Overwrite<br />

3152 PHPList admin/index.php id Parameter SQL Injection<br />

3156 <strong>Network</strong>Activ < 3.5.14 Multiple Parameter XSS<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

3171 W-Agora < 4.2.1 index.php site Parameter Traversal Arbitrary File Access Web<br />

Servers<br />

3196 BNBT P2P Tracking Detection<br />

3197 BNBT EasyTracker Malformed Request DoS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

3200 Barracuda Spam Firewall < Firmware 3.1.18 Multiple Vulnerabilities<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

18507<br />

18488<br />

18522<br />

18526<br />

18552<br />

N/A<br />

N/A<br />

N/A<br />

19252<br />

19296<br />

19309<br />

N/A<br />

19310<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

19548<br />

19556<br />

3203 Phorum < 5.0.18 register.php XSS Web 19584<br />

Family Web Servers 201


3206 Squid sslConnectTimeout Function Remote DoS<br />

3212 ASP/ASA Source Using Microsoft Translate f: bug (IIS 5.1)<br />

3213 IIS Patch Level Detection (English Versions Only)<br />

3214 IIS Patch Level Detection (English Versions Only)<br />

3215 IIS Patch Level Detection (English Versions Only)<br />

3218 SunOne Web Proxy < 3.6 SP8 Unspecified DoS<br />

3219 Sawmill < 7.1.14 GET Request Query String XSS<br />

3221 Linksys Wireless Router < 4.20.7 Multiple Vulnerabilities<br />

3226 Lotus Domino Server Multiple XSS<br />

3230 CuteNews flood.db.php HTTP Header PHP Code Injection<br />

3247 Squid < 2.5 STABLE11 NTLM Authentication Header DoS<br />

3249 4D WebStar < 5.3.5 IMAP Mac OS Client DoS<br />

3262 PHP < 5.0.5 Multiple Vulnerabilities<br />

3263 Xerver < 4.20 Multiple Vulnerabilities<br />

3270 WindWeb <<br />

3273 PHP < 5.0.6 GLOBAL Variable Overwrite<br />

3279 CuteNews <<br />

3282 Acme thttpd < 2.24 CGI Test Script Symlink Arbitrary File Overwrite<br />

3283 PHPList < 2.10.3 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

N/A<br />

19596<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

19681<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

20062<br />

20097<br />

Family Web Servers 202<br />

N/A<br />

N/A<br />

N/A<br />

N/A


3291 Moodle < 1.5.3 Multiple Scripts SQL Injection<br />

3295 Macromedia Flash < 2.0 Malformed RTMP Data DoS<br />

3301 Jetty < 5.16.0 JSP Source Code Disclosure<br />

3312 Nokia Intellisync Web Portal Detection<br />

3325 Sights 'N Sounds Media Server <<br />

3326 Sights 'N Sounds Media Server Detection<br />

3330 ColdFusion < 7.01 MX Multiple Vulnerabilities<br />

3347 Broadlogic XLT Router Default Password<br />

3348 'admin/1234' Default Password<br />

3358 Apache < 2.0.3 mod_auth_pgsql Module Server Log Format String<br />

3360 Apache < 1.6.1 auth_ldap Module Remote Format String<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

3367 BEA WebLogic < 8.1.0 SP6 MBeanHome Config Information Disclosure Web<br />

Servers<br />

3368 PHP < 5.1.2 mysqli Error Message Format String<br />

3386 TiVo Detection<br />

3387 Communigate Pro < 5.0.7 LDAP Module BER Decoding DoS<br />

3389 HTTP Proxy Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

3415 Communigate Pro < 5.0.8 LDAP Module BER Decoding DoS<br />

3416 Lotus Domino Server < 7.0.1 LDAP Component Unspecified DoS<br />

3419 McAfee ePolicy Orchestrator Server Detection<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

3437 Warez P2P Server/Client Detection Web N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

20813<br />

20827<br />

N/A<br />

20827<br />

Family Web Servers 203<br />

N/A<br />

N/A


3438 Fedora DS Administration Server < 1.0.1 Information Disclosure<br />

3442 CherryPy < 2.1.1 staticfilter Directory Traversal Arbitrary File Access<br />

3443 ViRobot Linux Server filescan Authentication Bypass<br />

3444 Mambo Undisclosed Authentication Bypass<br />

3449 MDaemon < 8.15 IMAP Mail Folder Name Remote Overflow<br />

3450 Lighttpd < 1.4.10a Crafted Filename Request Source Disclosure<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

3451 <strong>Network</strong>Activ < 3.5.16 Crafted Filename Request Source Code Disclosure Web<br />

Servers<br />

3453 Apache mod_python < 3.2.8 Remote Command Execution<br />

3455 RaidenHTTPd < 1.1.48 Crafted Request Script Source Disclosure<br />

3456 SPLUNK Online Log Search Detection<br />

3458 Listserv < 14.5 Multiple Buffer Overflows<br />

3463 Acme thttpd < 2.26 htpasswd Utility Overflow<br />

3468 PeerCast < 0.1217 procConnectArgs Function Remote Overflow<br />

3470 Easy File Sharing Web Server Format String<br />

3478 Dwarf HTTP Server < 1.3.3 Multiple Vulnerabilities<br />

3486 Orion < 2.0.7 Crafted Filename Extension Source Code Disclosure<br />

3508 Cherokee Web Server < 0.5.1 XSS<br />

3509 PHP < 5.1.4 Multiple Vulnerabilities<br />

3524 Oracle 10g Application Server SQL Injection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

20952<br />

20961<br />

20968<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

21016<br />

N/A<br />

21041<br />

21039<br />

Family Web Servers 204<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


3559 IBM WebSphere < 6.0.2.3 Authentication Bypass<br />

3618 BEA WebLogic Server Multiple Vulnerabilities<br />

3619 SonicWall Firewall Detection<br />

3621 Resin < 3.0.19 Directory Traversal and Path Disclosure Vulnerabilities<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

3625 WhatsUp <strong>Network</strong> Monitoring Tool Default Administrative Credentials Web<br />

Servers<br />

3634 MDaemon < 8.1.4 Remote Overflow<br />

3642 WinGate < 6.1.3 POST Request Buffer Overflow<br />

3645<br />

TIBCO < 7.5.1 Rendezvous HTTP Administrative Interface Remote<br />

Overflow<br />

3656 Mambo < 4.6.1 Login Function usercookie Cookie SQL Injection<br />

3679 CommuniGate Pro < 5.1c2 POP3 Overflow<br />

3680 Zope < 2.9.4 docutils Information Disclosure<br />

3681<br />

WinGate < 6.1.4 Build 1099 IMAP Service Traversal Arbitrary Mail<br />

Access<br />

3692 CheckPoint Firewall Default Web Server<br />

3702 ColdFusion Administrative Interface Authentication Bypass<br />

3723 IPCheck Server Monitor < 5.3.3.639 Traversal Arbitrary File Access<br />

3732 PHP < 4.4.4 / 5.1.4 Multiple Vulnerabilities<br />

3740 RaidenHTTPD SoftParserFileXml Parameter Remote File Inclusion<br />

3742 Moodle < 1.6.2 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

3752 SAP Internet Transaction Server (ITS) Detection<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

3755 OpenSSL < 0.9.7l / 0.9.8d Multiple Vulnerabilities Web N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

21674<br />

N/A<br />

N/A<br />

20827<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

22205<br />

N/A<br />

22317<br />

Family Web Servers 205<br />

N/A<br />

N/A


3758 Mercury SiteScope Server Detection<br />

3766<br />

McAfee ePolicy Orchestrator HTTP Server Source Header Remote<br />

Overflow<br />

3769 Asterisk VoIP Administrative Interface Detection<br />

3770 Cisco Call Manager (VoIP) Administrative Interface Detection<br />

3771 Cisco IP Phone Detection<br />

3792 ColdFusion <<br />

3802 FreePBX VoIP Administrative Interface Detection<br />

3809 Sun-One Application Server Version Detection<br />

3816 Apache mod_auth_kerb <<br />

3818 WinGate < 6.2.0 Compressed Name Pointer DoS<br />

3819 iTunes Detection<br />

3829 Web Server Type<br />

3830 Web Server Detection on Port Other Than TCP/80<br />

3831 FreePBX < 2.2.1 VoIP Input Validation Vulnerabilities<br />

3832 Xerox WorkCentre Detection<br />

3833 Xerox WorkCentre Version Detection<br />

3834 Xerox WorkCentre Multiple Vulnerabilities<br />

3857 PHP < 4.4.5 / 5.2.1 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

3877 Wireless Access Point (WAP) Web Server Detection<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

N/A<br />

22494<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

11026<br />

Family Web Servers 206


3887 Squid < 2.6 STABLE7 Multiple Vulnerabilities<br />

3898 Phorum < 5.1.19 register.php XSS<br />

3904 Jetty Non-random Session ID Vulnerability<br />

3910<br />

Firefox < 0.0.9 'Plain Old Webserver' (POW) Directory Traversal<br />

Arbitrary File Access<br />

3913 Cisco VPN Concentrator Administrative Interface Detection<br />

3915 Microsoft FrontPage Version Detection<br />

3916<br />

3925<br />

3928<br />

LifeType < 1.1.6 rss.php profile Parameter Traversal Arbitrary File<br />

Access<br />

SQLiteManager include/config.inc.php SQLiteManager_currentTheme<br />

Cookie Local File Inclusion<br />

OrangeHRM < 2.1 alpha 5 login.php txtUserName Parameter SQL<br />

Injection<br />

3932 Apache TomCat mod_jk < 1.2.21 Worker Map Remote Overflow<br />

3942 LedgerSMB / SQL-Ledger Authentication Bypass<br />

3949<br />

Apache Tomcat < 5.5.23 / 6.0.10 Directory Traversal Arbitrary File<br />

Access<br />

3952 Squid < 2.6 STABLE12 TRACE Request DoS<br />

3961 F-Secure Product Server Detection<br />

3962 F-Secure Policy Manager fsmsh.dll Path Disclosure<br />

3969 Lighttpd < 1.4.14 Multiple DoS<br />

3972 Tivoli Provisioning Manager Detection<br />

3981<br />

Mambo < 4.6.2 includes/pdf.php dofreePDF Function Authentication<br />

Bypass<br />

3982 PHP < 4.4.7 / 5.2.2 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

24356<br />

24726<br />

24743<br />

N/A<br />

24748<br />

N/A<br />

24873<br />

N/A<br />

15931<br />

N/A<br />

N/A<br />

N/A<br />

25159<br />

3992 Resin < 3.1.1 Directory Traversal Vulnerability (2) Web 25241<br />

Family Web Servers 207


4070 Openfire < 3.3.1 Admin Console Privilege Escalation<br />

4074 PHP < 5.2.3 Multiple Vulnerabilities<br />

4107 cPanel Remote Backup Information Disclosure<br />

4139 Tivoli Provisioning Manager <<br />

4165 Sun ONE Web Server Version Detection<br />

4166 WinGate < 6.2.2 Invalid SMTP State Remote DoS<br />

4167 Apache Tomcat <<br />

4202 PHP < 5.2.4 Multiple Vulnerabilities<br />

4206 Lighttpd < 1.4.18 mod_fastcgi HTTP Request Header Overflow<br />

4221 OpenSSL < 0.9.8f Multiple Vulnerabilities<br />

4225 HTTP Server Basic Authentication Detection<br />

4237 SQL-Ledger < 2.6.27 Multiple Fields SQL Injection<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

4245 Apache Tomcat < 6.0.15 WEBDAV Lock Request Information Disclosure Web<br />

Servers<br />

4246 Ruby Version Detection<br />

4247 Ruby on Rails Version Detection<br />

4248 Ruby on Rails < 1.2.5 Multiple Vulnerabilities<br />

4251 Oracle 10g Application Server SQL Injection<br />

4252 Avocent DSView Server Detection<br />

4263 Adaptec Storage Manager Server Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

25343<br />

25368<br />

N/A<br />

N/A<br />

N/A<br />

25879<br />

Family Web Servers 208<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


4266 IBM Server RAID Manager Detection<br />

4270 WebSphere Server Version Detection<br />

4272 WebSphere SSL Server Detection<br />

4273 WebSphere UDDI Console Multiple Vulnerabilities<br />

4278 OrangeHRM < 2.2.2 RepViewController.php Privilege Escalation<br />

4281 PHP < 5.2.5 Multiple Vulnerabilities<br />

4282 Oracle Web Listener Version Detection<br />

4286 WebSphere HTML 'Expect' Header HTML Injection<br />

4293 Ability Mail Server < 2.61 Multiple Vulnerabilities<br />

4294 Microsoft Outlook Web Access (OWA) Version Detection<br />

4297 Sentinel Protection Server < 7.4.1 Directory Traversal File Access<br />

4299 Ruby on Rails < 1.2.6 Cookie Related Session Fixation<br />

4305 Squid < 2.6.STABLE18 Update Reply Processing DoS<br />

4307 Jetty < 6.1.6 Multiple Vulnerabilities<br />

4318<br />

PeerCast < 0.1218 servhs.cpp handShakeHTTP Function Remote<br />

Overflow<br />

4319 RaidenHTTPD <<br />

4320 CUPS < 1.3.5 Back End SNMP Response Remote Overflow<br />

4324 CuteNews < 1.4.6 search.php files_arch Array Arbitrary File Access<br />

4327 OpenBiblio < 0.6.0 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

28181<br />

N/A<br />

N/A<br />

28289<br />

N/A<br />

N/A<br />

N/A<br />

29216<br />

4330 Mort Bay Jetty < 6.1.7 Double Slash Information Disclosure Web 29852<br />

Family Web Servers 209<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


4331 PHP < 4.4.8 Multiple Vulnerabilities<br />

Servers<br />

Web<br />

Servers<br />

4349 WebSphere serveServletsByClassnameEnabled Unspecified Vulnerability Web<br />

Servers<br />

4350 WebSphere serveServletsByClassnameEnabled Unspecified Vulnerability Web<br />

Servers<br />

4354 Tivoli Provisioning Manager < 5.1.0.3 DoS<br />

4355 WebSphere Application Server < 6.0.2.25 Multiple Vulnerabilities<br />

4356 NetCache Version Detection<br />

4368 Apache Tomcat < 6.0.16 Information Disclosure<br />

4369 ExtremeZ-IP Version Detection<br />

4370 F5 BIG-IP Web Management Version Detection<br />

4371 ExtremeZ-IP Version Detection<br />

4376 Apache mod_jk2 < 2.0.4 Multiple Overflows<br />

4378 Flash Media Server Detection<br />

4379 Flash Media Server Detection<br />

4380 Flash Media Server Detection<br />

4383 BEA WebLogic Server Multiple Vulnerabilities<br />

4385 Apache < 2.2.8 Multiple Vulnerabilities<br />

4390 CUPS < 1.3.6 Multiple Vulnerabilities<br />

4411 Lighttpd < 1.4.19 Information Disclosure<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

4424 IBM WebSphere Application Server < 6.1.0.15 Multiple Vulnerabilities Web<br />

Servers<br />

29833<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

30216<br />

30253<br />

31786<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

31118<br />

31131<br />

N/A<br />

45422<br />

Family Web Servers 210


4436 cPanel <<br />

4444 PHP < 5.2.0 Multiple Vulnerabilities<br />

4452 X2 Thin Client Server Detection<br />

4456 CUPS < 1.3.7 Multiple Vulnerabilities<br />

4460 Apache-SSL Environment Variables Manipulation<br />

4462 TIBCO Rendezvous < 8.0.1 Remote Overflow<br />

4483 eTrust Proxy Detection<br />

4484 CA eTrust SCM Plaintext Login Detection<br />

4486 ePOclient Version Detection<br />

4493 PHP < 5.2.6 Multiple Vulnerabilities<br />

4501<br />

Apache Tomcat Sample App cal2.jsp time Parameter XSS<br />

(CVE-2009-0781)<br />

4507 SUN Java System Application Server Version Detection<br />

4508 JSP information disclosure in Sun Java System application server<br />

4509 cPanel Remote Privilege Escalation vulnerability<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

4518 Barracuda Spam Firewall ldap_test.cgi Cross-Site Scripting Vulnerability Web<br />

Servers<br />

4521 OpenSSL < 0.9.8h Multiple Vulnerabilities<br />

4528 IBM Content Manager (ICM) Version Detection<br />

4529 Snap Appliance Version Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

4530 IBM WebSphere Application Server < 6.1.0.17 Unspecified Vulnerability Web<br />

Servers<br />

4532 Sun-One ASP Server Version Detection Web N/A<br />

N/A<br />

31649<br />

N/A<br />

31730<br />

31738<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

32123<br />

35806<br />

N/A<br />

N/A<br />

N/A<br />

32434<br />

N/A<br />

N/A<br />

N/A<br />

33127<br />

Family Web Servers 211


4533 Sun Java System ASP < 4.0.3 Multiple Vulnerabilities<br />

4539 Gordano Messaging Suite Version Detection<br />

4542 Novell NetWare Print Server Detection<br />

4544 Sun-One ASP Server Version Detection<br />

4546 Sun-One ASP Server Test Application Detection<br />

4552 Sun Java Calendar Version Detection<br />

4553 Sun Java Calendar Logging Component Unspecified Remote DoS<br />

4561 Resin < Viewfile file Parameter XSS<br />

4565 Sun Java System Access Manager Version Detection<br />

4575 Sun Java ASP Server Default Admin Password<br />

4576 trixbox Version Detection<br />

4577<br />

trixbox Dashboard user/index.php langChoice Parameter Local File<br />

Inclusion<br />

4579 Apache < 2.2.9 Multiple Vulnerabilities<br />

4580 Xerox Centreware Version Detection<br />

4582 Xerox CentreWare < 4.6.46 Multiple Vulnerabilities<br />

4589 Blackberry Enterprise Server Version Detection<br />

4590<br />

BlackBerry Enterprise Server < 4.1.6 PDF Processing Arbitrary Code<br />

Execution<br />

4594 HP System Management Version Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

4595 HP System Management Homepage (SMH) < 2.1.12 Unspecified XSS<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

33439<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

33273<br />

N/A<br />

33437<br />

N/A<br />

33445<br />

33477<br />

N/A<br />

33478<br />

N/A<br />

33550<br />

N/A<br />

33548<br />

Family Web Servers 212


4610 CUPS < 1.3.8 Crafted PNG File Integer Overflow<br />

4614 Apache Tomcat < 4.1.37/5.5.26/6.0.16 Multiple Vulnerabilities<br />

4620 PHP < 4.4.9 Multiple Vulnerabilities<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

4621 Apache Tomcat < 6.0.18 UTF-8 Directory Traversal Arbitrary File Access Web<br />

Servers<br />

4623<br />

JBoss EAP < 4.2.0.CP03 / 4.3.0.CP01 Status Servlet Information<br />

Disclosure<br />

4625 Sun Java System Web Proxy Server Detection<br />

4631 RhinoSoft Serv-U Web Server Version Detection<br />

4633 Cisco Secure Access Control Server Detection<br />

4656 Database Connection Configuration Information Disclosure<br />

4658 Database Connection Configuration Information Disclosure<br />

4659 Database Connection Configuration Information Disclosure<br />

4660 Database Connection Configuration Information Disclosure<br />

4666 Internal IP Address Disclosure<br />

4667 Persistent Cookie Utilization<br />

4668 ActiveX Control Detection<br />

4669 ActiveX Control Detection<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

4679 Ruby on Rails < 2.1.1 Active Record Multiple Parameter SQL Injection Web<br />

Servers<br />

4683 Hitachi IP Phone Detection<br />

4685<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

IBM WebSphere Application Server 6.1 < Fix Pack 19 Unspecified<br />

Vulnerability<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

4689 JBoss EAP < 4.2.0.CP04 / 4.3.0.CP02 Status Servlet Information Web N/A<br />

33577<br />

N/A<br />

33849<br />

33866<br />

33869<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

34219<br />

Family Web Servers 213


Disclosure Servers<br />

4698 lighttpd < 1.4.20 Multiple Vulnerabilities<br />

4700 Blue Coat Reporter Detection<br />

4701 Blue Coat Reporter Default admin Credentials<br />

4702 OpenNMS Server Detection<br />

4707 CUPS < 1.3.9 Multiple Vulnerabilities<br />

4709 Copyright Information Within HTML Comments<br />

4710 Email Address Obfuscated Within HTML Comments<br />

4712 Apache < 2.2.10 Multiple Vulnerabilities<br />

4714 <strong>Security</strong> Center < 3.4 Multiple Unspecified Traversals<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

4725 IBM WebSphere Application Server < 6.0.2.31 Multiple Vulnerabilities Web<br />

Servers<br />

4731 Obsolete Web Server Detection<br />

4749 Zope < 2.11.3 PythonScript Handling DoS<br />

4755 Sun Java System Identity Manager Version Detection<br />

4758 SOAP/XML Plaintext Credentials Disclosure<br />

4764 Ruby on Rails < 2.0.5 Multiple Vulnerabilities<br />

4769 Apple iPhone Web Utility Detection<br />

4771 CUPS < 1.3.10 Multiple Overflows<br />

4779 PHP 5 < 5.2.7 Multiple Vulnerabilities<br />

4783<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

IBM WebSphere Application Server 7.0 < Fix Pack 1 Multiple<br />

Vulnerabilities<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

34332<br />

34334<br />

34346<br />

N/A<br />

34385<br />

N/A<br />

N/A<br />

34433<br />

34443<br />

34501<br />

34460<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

35043<br />

35082<br />

Family Web Servers 214


4784 PHP < 5.2.8 magic_quotes_gpc <strong>Security</strong> Bypass<br />

4795<br />

Barracuda Spam Firewall < 3.5.12.007 Multiple Vulnerabilities (SQLi,<br />

XSS)<br />

4819 OpenX Version Detection<br />

4820 3COM CellPlex Default Password<br />

4821 3COM Netbuilder Default Password<br />

4822 Web Server 'admin' Default Password<br />

4823 Web Server 'admin/password' Default Credentials<br />

4824 3Com Shark Fin Comcast-supplied Default Password<br />

4825 Web Server 'Administrator/admin' Default Password<br />

4826 3ware Default Password<br />

4827 ACCTON Wirelessrouter T-online Default Password<br />

4828 ADIC Scalar 100/1000 Default Password<br />

4829 Web Server 'admin/admin' Default Password<br />

4830 APC UPSes (Web/SNMP Mgmt Card) Default Password<br />

4831 ASMAX Web Server Default Password<br />

4832 Web Server 'admin/NULL' Default Password<br />

4833 Allied Telesyn AT-8024(GB) Default Password<br />

4834 GigaTribe Detection<br />

4836 Allied Telesyn AT Router Default Password<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

4837 Allied Telesyn AT-AR130 (U) -10 Default Password Web N/A<br />

35067<br />

35224<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

35468<br />

Family Web Servers 215<br />

N/A


4838 Alteon ACEswitch 180e Default Password<br />

4839 Ambit Default Password<br />

4840 Aspect ACD 6 Default Password<br />

4841 Axis Webcams Default Password<br />

4842 HTTP NULL User ID and Password<br />

4843 Blue Coat Systems ProxySG 3.x Default Password<br />

4844 Cisco Ciso Aironet 1100 Series Rev. 01 Default Password<br />

4845 Cisco Aironet 1200 Default Password<br />

4846 Conexant Router Default Password<br />

4848 Cyclades TS800 Default Password<br />

4849 D-Link DI-614+ Default Password<br />

4850 D-Link DI-624 All Default Password<br />

4851 Deerfield MDaemon Default Password<br />

4852 Dell Remote Access Card Default Password<br />

4853 Deutsch Telekomm T-Sinus 130 DSL Default Password<br />

4854 Enterasys ANG-1105 Unknown Default Password<br />

4855 Ericsson BP250 Default Password<br />

4856 Fujitsu Siemens Routers Default Password<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

4857 Hewlett-Packard webmin 0.84 Default Password<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Family Web Servers 216<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


4858 IBM Directory - Web Administration Tool 5.1 Default Password<br />

4859 IBM 3583 Tape Library Default Password<br />

4860 IBM Web Server Default Password<br />

4861 Infosmart SOHO Router Default Password<br />

4862 Intel Wireless Gateway 3.x Default Password<br />

4863 Intershop Intershop 4 Default Password<br />

4864 Irongate NetSurvibox 266 1 Default Password<br />

4865 Konica Minolta Magicolor 5430 DL Default Password<br />

4866 Konica/ Minolta Di 2010f n/a Default Password<br />

4867 Kyocera EcoLink 7.2 Default Password<br />

4868 Linksys Comcast Comcast-supplied Default Password<br />

4869 Linksys/ Cisco RTP300 w/2 Phone Ports 1.0 Default Password<br />

4870 Minolta PagrPro QMS 4100GN PagePro Default Password<br />

4871 Minolta QMS Magicolor 3100 3.0.0 Default Password<br />

4872 Mitel 3300 ICP All Default Password<br />

4873 Motorola Default Password<br />

4874 NGSec NGSecureWeb Default Password<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

4875 NRG or RICOH DSc338 Printer 1.19 Default Password<br />

4876 NETGEAR Comcast Comcast-supplied Default Password<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

4877 NetGenesis NetAnalysis Web Reporting Default Password Web N/A<br />

Family Web Servers 217<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


4878 NETGEAR WG602 Firmware Version 1.04.0 Default Password<br />

4879 NETGEAR WG602 Firmware Version 1.7.14 Default Password<br />

4880<br />

4881<br />

<strong>Network</strong> Associates WebShield <strong>Security</strong> Appliance e500 Default<br />

Password<br />

<strong>Network</strong> Associates WebShield <strong>Security</strong> Appliance e250 Default<br />

Password<br />

4882 Nortel Contivity Extranet/VPN Switches Default Password<br />

4883 Nortel Business Communications Manager 3.5 / 3.6 Default Password<br />

4884 OKI C5700 Default Password<br />

4885 Openwave WAP Gateway Any Default Password<br />

4886 Openwave MSP Any Default Password<br />

4887 Pirelli Pirelli AGE-SB Default Password<br />

4888 Polycom Soundpoint VoIP Phones Default Password<br />

4889 Psion Teklogix 9150 Default Password<br />

4890 RedHat 6.2 Default Password<br />

4891 RedHat 6.2 Default Password<br />

4892 Ricoh AP410N 1.13 Default Password<br />

4893 SMC Default Password<br />

4894 SMC 7401BRA 1 Default Password<br />

4895 SMC 7401BRA 2 Default Password<br />

4896 SMC Barricade7204BRB Default Password<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Family Web Servers 218<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


4897 SMC Modem/Router Default Password<br />

4898 SOPHIA (Schweiz) AG Protector Default Password<br />

4899 Samsung MagicLAN SWL-3500RG 2.15 Default Password<br />

4900 Scientific Atlanta DPX2100 Comcast-supplied Default Password<br />

4901 Sharp AR-M355N Default Password<br />

4902 Siemens SpeedStream 4100 Default Password<br />

4903 Sun Microsystems ILOM of X4100 1.0 Default Password<br />

4904 Sybase EAServer Default Password<br />

4905 Symbol Spectrum Series 4100-4121 Default Password<br />

4906 Symbol CB3000 A1 Default Password<br />

4907 'Administrator' NULL Password<br />

4908 US ROBOTICS ADSL Ethernet Modem Default Password<br />

4909<br />

X-Micro X-Micro WLAN 11b Broadband Router 1.6.0.1 Default<br />

Password<br />

4910 Xerox DocuCentre 425 Default Password<br />

4911 Xerox 240a Default Password<br />

4912 ZyXEL Prestige Default Password<br />

4913 apc Smartups 3000 Default Password<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

4914 iPSTAR iPSTAR Satellite Router/Radio v2 Default Password<br />

4915 iPSTAR iPSTAR <strong>Network</strong> Box v.2+ Default Password<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

4916 ihoi oihoh lknlkn Default Password Web N/A<br />

Family Web Servers 219<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


4917 longshine isscfg Default Password<br />

4918 medion Routers Default Password<br />

4919 Real<strong>Network</strong>s Helix Server < 11.1.8 / 12.0.1 Multiple Vulnerabilities<br />

4923<br />

Squid < 2.7.STABLE6 / 3.0.STABLE13 / 3.1.0.5 HTTP Version Numbers<br />

DoS<br />

4928 TrendMicro Interscan Web <strong>Security</strong> Suite (IWSS) Default Password<br />

4929<br />

IBM WebSphere Application Server 6.1 < Fix Pack 21 Multiple<br />

Vulnerabilities<br />

4943 PHP < 5.2.9 Multiple Vulnerabilities<br />

4956 Apache modsecurity Plugin Detection<br />

4984 Apache TomCat mod_jk < 1.2.27 Cross-user Information Disclosure<br />

4987 Microsoft TMG Proxy Detection<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

4990 IBM WebSphere Application Server < 6.0.2.33 Multiple Vulnerabilities Web<br />

Servers<br />

4991<br />

IBM WebSphere Application Server 7.0 < Fix Pack 3 Multiple<br />

Vulnerabilities<br />

Web<br />

Servers<br />

4996 IBM WebSphere Application Server < 6.1.0.23 Multiple Vulnerabilities Web<br />

Servers<br />

5000 BlackBerry Enterprise Server < 4.1.6 MR5 XSS<br />

5005 OrangeHRM < 2.4.2 Multiple Vulnerabilities<br />

5007 Fortify 360 Web Interface Detection<br />

5010 Citrix Web Interface 4.6/5.0/5.0.1 XSS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

5011 Flash Media < 3.0.4/3.5.2 Privilege Escalation<br />

5017 Mort Bay Jetty < 6.1.17 Multiple Vulnerabilities<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

N/A<br />

N/A<br />

35555<br />

35620<br />

N/A<br />

35659<br />

35750<br />

N/A<br />

N/A<br />

N/A<br />

36132<br />

36133<br />

36161<br />

N/A<br />

N/A<br />

38155<br />

Family Web Servers 220<br />

N/A<br />

N/A<br />

N/A


5022 A-A-S Server Detection<br />

5029 Sun GlassFish Enterprise Server Detection<br />

5030 Sun GlassFish Enterprise Server Multiple Vulnerabilities<br />

5035 lighttpd < 1.4.24 Information Disclosure<br />

5044 Apache Tomcat < 4.1.40 / 5.5.28 / 6.0.20 Multiple Vulnerabilities<br />

5045 LogMeIn 'cfgadvanced.html' HTTP Header Injection<br />

5047 Microsoft SharePoint Detection<br />

5057 Big-IP Web Application Firewall Detection<br />

5058 WebKnight Web Application Firewall Detection<br />

5059 AirLock Web Application Firewall Detection<br />

5060 Barracuda Web Application Firewall Detection<br />

5061 F5 ASM Web Application Firewall Detection<br />

5062 F5 TrafficShield Web Application Firewall Detection<br />

5063 Teros Web Application Firewall Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

5064 NetContinuum Web Application Firewall Detection<br />

5065 BinarySEC Web Application Firewall Detection<br />

5066 HyperGuard Web Application Firewall Detection<br />

5067 Profense Web Application Firewall Detection<br />

5068 Netscaler Web Application Firewall Detection<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

5069 dotDefender Web Application Firewall Detection Web N/A<br />

Family Web Servers 221<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


Servers<br />

5076 IBM WebSphere Application Server < 6.0.2.35 Multiple Vulnerabilities Web<br />

Servers<br />

5077 IBM WebSphere Application Server < 6.1.0.25 Multiple Vulnerabilities Web<br />

Servers<br />

5080 PHP < 5.2.10 Multiple Vulnerabilities<br />

5100 Real<strong>Network</strong>s Helix Server 12.x Multiple DoS<br />

5103 RaidenHTTPD workspace.php ulang Parameter Local File Inclusion<br />

5104 CommuniGate Pro POP3 < 5.1c2 Buffer Overflow<br />

5108 Squid 3.0.STABLE16 / 3.10.11 Remote DoS<br />

5111 Apache < 2.2.12 Multiple Vulnerabilities<br />

5124 Oracle Secure Enterprise Search 10.x Version Detection<br />

5127 Microsoft IIS 7.0 Webserver Detection<br />

5128<br />

MS09-036: Vulnerability in ASP.NET in Microsoft Windows Could<br />

Allow Denial of Service (970957)<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

5132 Sun Java System Access Manager 7.1 < Patch 2 Multiple Vulnerabilities Web<br />

Servers<br />

5133 Sun Java System Access Manager 7.1 < Patch 3 Multiple Vulnerabilities Web<br />

Servers<br />

5134 Sun OpenSSO Enterprise 8.0 < Patch1 Update1 Memory Corruption<br />

5142<br />

IBM WebSphere Application Server 7.0 < Fix Pack 5 Multiple<br />

Vulnerabilities<br />

5151 Sun GlassFish Server 3.0 Preview Multiple Vulnerabilities<br />

5173 nginx Webserver Detection<br />

5174 nginx HTTP Request Remote Buffer Overflow<br />

5178 PHP < 5.2.11 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

38978<br />

39450<br />

N/A<br />

40350<br />

29728<br />

N/A<br />

40420<br />

N/A<br />

N/A<br />

N/A<br />

40555<br />

35618<br />

N/A<br />

N/A<br />

40823<br />

N/A<br />

N/A<br />

41608<br />

41014<br />

Family Web Servers 222


5183 IBM WebSphere Application Server < 6.1.0.27 Multiple Vulnerabilities Web<br />

Servers<br />

5187 Ability Mail Server < 2.70 Remote Denial of Service<br />

5192 Websense Proxy Detection<br />

5196 Apache < 2.2.14 Multiple Vulnerabilities<br />

5201 Ubicom Embedded Web Server Detection<br />

5216 nginx HTTP Request Header Remote Buffer Overflow<br />

5220<br />

5221<br />

5222<br />

5223<br />

5224<br />

MS09-061: Vulnerabilities in the Microsoft .NET Framework 1.1<br />

Common Language Runtime Could Allow Remote Code Execution<br />

(974378)<br />

MS09-061: Vulnerabilities in the Microsoft .NET Framework 2.0<br />

Common Language Runtime Could Allow Remote Code Execution<br />

(974378)<br />

MS09-061: Vulnerabilities in the Microsoft .NET Framework 2.0 SP1<br />

Common Language Runtime Could Allow Remote Code Execution<br />

(974378)<br />

MS09-061: Vulnerabilities in the Microsoft .NET Framework 2.0 SP2<br />

Common Language Runtime Could Allow Remote Code Execution<br />

(974378)<br />

MS09-061: Vulnerabilities in the Microsoft .NET Framework 3.5.1<br />

Common Language Runtime Could Allow Remote Code Execution<br />

(974378)<br />

5230 CUPS < 1.4.2 XSS<br />

5235 IBM WebSphere Application Server < 7.0.0.7 Multiple Vulnerabilities<br />

5236 RhinoSoft Serv-U Web Client HTTP Request Remote Buffer Overflow<br />

5239 McAfee Common Management Agent Remote Denial of Service<br />

5242 PHP 5.3.x < 5.3.1 Multiple Vulnerabilities<br />

5252 HTTP Server Basic Authorization Detection<br />

5281 PHP 5.2.x < 5.2.12 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

41057<br />

41644<br />

N/A<br />

42052<br />

N/A<br />

41608<br />

42117<br />

42117<br />

42117<br />

42117<br />

42117<br />

42468<br />

42821<br />

42934<br />

N/A<br />

42862<br />

N/A<br />

43351<br />

Family Web Servers 223


5283<br />

5284<br />

Adobe Flash Media Server < 3.0.5 / 3.5.3 Multiple Vulnerabilities<br />

(APSB09-018) (RTMP over HTTP)<br />

Adobe Flash Media Server < 3.5.3 Multiple Vulnerabilities<br />

(APSB09-018) (RTMP)<br />

5327 Apache Tomcat < 5.5.29 / 6.0.24<br />

5332 Squid 3.0STABLE23 / 3.1.0.16 Remote DoS<br />

5340 Squid < 3.0STABLE24 HTCP Request Denial of Service<br />

5346 PHP < 5.3.2 / 5.2.13 Multiple Vulnerabilities<br />

5356 Apache < 2.2.15 Multiple Vulnerabilities<br />

5358 OpenSSL < 0.9.8m Multiple Vulnerabilities<br />

5487 OpenSSL < 0.9.8n Multiple Vulnerabilities<br />

5512 CUPS < 1.4.3 Multiple Vulnerabilities<br />

5521 JBoss EAP < 4.2.0.CP09 / 4.3.0.CP08 Multiple Vulnerabilities<br />

5531 OrangeHRM < 2.5.5 Multiple Vulnerabilities<br />

5532 Drupal Context module < 6.x-2.0-rc4 HTML Injection<br />

5536 Drupal AutoAssign Role Module < 6.x-1.2 Authentication Bypass<br />

5537 Drupal Services Module < 6.x-2.1 Authentication Bypass<br />

5555 Acme thttpd Version Detection<br />

5559 OpenSSL < 0.9.8o / 1.0.0a Multiple Vulnerabilities<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

5562 nginx 8.3 Filename Alias Request Access Rules / Authentication Bypass Web<br />

Servers<br />

5563 OpenSSL Version Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Web<br />

Servers<br />

5565 PHP Version Detection Web N/A<br />

43390<br />

43390<br />

44314<br />

44384<br />

45591<br />

44921<br />

45004<br />

45039<br />

45359<br />

45554<br />

53337<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

46801<br />

Family Web Servers 224<br />

N/A<br />

N/A


5574 CUPS < 1.4.4 Multiple Vulnerabilities<br />

5583 EvoCam < 3.6.8 GET Request Buffer Overflow<br />

5586 Web Server Detection<br />

5615 Apache 2.2 < 2.2.16 Multiple Vulnerabilities<br />

5616 PHP < 5.3.3 / 5.2.14 Multiple Vulnerabilities<br />

5623 VxWorks Detection<br />

5624<br />

Adobe Flash Media server < 3.0.6 / 3.5.4 Multiple Vulnerabilities<br />

(APSB10-19)<br />

5649 Linksys WAP Default Credentials Detection<br />

5662<br />

Squid < 3.1.8 / 3.2.0.2 NULL Pointer Dereference Denial of Service<br />

Vulnerability<br />

5666 Squid 3.1.6 DNS Replay Denial of Service<br />

5667 HP System Management Homepage < 6.2 Multiple Vulnerabilities<br />

5674 Web Server Parameters (POST)<br />

5675 Web Server Parameters (GET)<br />

5704<br />

Adobe Flash Media server < 3.0.7 / 3.5.5 / 4.0.1 Multiple Vulnerabilities<br />

(APSB10-27)<br />

5708 Ricoh Printer Detection<br />

5720 OpenSSL < 0.9.8q / 1.0.0c Multiple Vulnerabilities<br />

5732 PHP 5.3 < 5.3.4 Multiple Vulnerabilities<br />

5733 PHP 5.2.x < 5.2.15 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

5740 PHP 5.2 < 5.2.17 / 5.3 < 5.3.5 String To Double Conversion DoS<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

47683<br />

47682<br />

N/A<br />

48205<br />

48245<br />

N/A<br />

48298<br />

49646<br />

49693<br />

48433<br />

49272<br />

N/A<br />

N/A<br />

50562<br />

N/A<br />

51892<br />

51140<br />

51139<br />

51439<br />

Family Web Servers 225


5782 OpenSSL < 0.9.8r / 1.0.0d OCSP Stapling Denial of Service<br />

5786 Apache Tomcat 5.5.x < 5.5.30 Multiple Vulnerabilities<br />

5787 Apache Tomcat 5.5.x < 5.5.32 Cross-site Scripting Vulnerability<br />

5788 Apache Tomcat 6.0.x < 6.0.28 Multiple Vulnerabilities<br />

5789 Apache Tomcat 6.0.x < 6.0.30 Multiple Vulnerabilities<br />

5790 Apache Tomcat 6.0.x < 6.0.32 Denial of Service Vulnerability<br />

5791 Apache Tomcat 7.0.x < 7.0.2 Denial of Service Vulnerability<br />

5792 Apache Tomcat 7.0.x < 7.0.4 File Permission Bypass Vulnerability<br />

5793 Apache Tomcat 7.0.x < 7.0.5 Cross-Site Scripting Vulnerability<br />

5794 Apache Tomcat 7.0.x < 7.0.6 Cross-Site Scripting Vulnerability<br />

5795 Apache Tomcat 7.0.x < 7.0.8 Denial of Service Vulnerability<br />

5799 Web Server HttpOnly Cookies Not In Use<br />

5816 Apache Tomcat 7.0.x < 7.0.11 <strong>Security</strong> Bypass Vulnerability<br />

5824 PHP 5.3 < 5.3.6 String To Double Conversion DoS<br />

5882 Apache Tomcat 7.0.x < 7.0.12 Multiple Vulnerabilities<br />

5924<br />

5932<br />

Adobe Flash Media server < 3.5.6 / 4.0.2 Multiple Vulnerabilities<br />

(APSB11-11)<br />

IBM Tivoli Management Framework Endpoint '/addr' Remote Buffer<br />

Overflow<br />

5956 Symantec Enterprise AV Server detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

5996 Apache Tomcat 7.0.x < 7.0.19 Multiple Vulnerabilities<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

51919<br />

47749<br />

51957<br />

48255<br />

51975<br />

51987<br />

N/A<br />

51958<br />

51526<br />

51976<br />

51987<br />

N/A<br />

52634<br />

52717<br />

53323<br />

53895<br />

54924<br />

N/A<br />

55759<br />

6002 Adobe Flash Media server < 3.5.7 / 4.0.3 Multiple Vulnerabilities Web 55811<br />

Family Web Servers 226


(APSB11-20) Servers<br />

6003 Adobe Flash Media Server Unsupported Version Detection<br />

6007 Apache Tomcat 7.0.x < 7.0.20 'jsvc' Information Disclosure<br />

6015 PHP 5.3 < 5.3.7 Multiple Vulnerabilities<br />

6017 PHP 5.3.7 crypt() MD5 Incorrect Return Value<br />

6018 Apache Tomcat 6.0.x < 6.0.33 Multiple Vulnerabilities<br />

6021 Apache 2.2 < 2.2.20 Multiple Vulnerabilities<br />

6022 OpenSSL 1.x < 1.0.0e Multiple Vulnerabilities<br />

6058 TimThumb Application Detection<br />

6059 TimThumb Arbitrary Code Injection<br />

6060 TimThumb Version Detection<br />

6062 Apache 2.2 < 2.2.21 mod_proxy_ajp DoS<br />

6129 OpenSSL 0.9.8 < 0.9.8s / 1.x < 1.0.0f Multiple Vulnerabilities<br />

6263 PHP < 5.3.9 Multiple Vulnerabilities<br />

6288 OpenSSL 0.9.8s / 1.0.0f DTLS Denial of Service<br />

6289 Polycom Audio/Video Server Detection<br />

6290 DCS Video Server Detection<br />

6292 Netwave Video Server Detection<br />

6302 Apache 2.2 < 2.2.22 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

6304 PHP 5.3.9 php_register_variable_ex() Code Execution<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

55814<br />

55859<br />

57753<br />

55969<br />

56008<br />

55976<br />

56162<br />

N/A<br />

N/A<br />

N/A<br />

56216<br />

57460<br />

57537<br />

57712<br />

N/A<br />

N/A<br />

N/A<br />

57791<br />

58039<br />

Family Web Servers 227


6331 Apache Tomcat 5.5.x < 5.5.35 Hash Collision Denial of Service<br />

6332 Apache Tomcat 6.0.x < 6.0.35 Multiple Vulnerabilities<br />

6333 Apache Tomcat 7.0.x < 7.0.22 Multiple Vulnerabilities<br />

6334 Apache Tomcat 7.0.x < 7.0.23 Hash Collision Denial of Service<br />

6400 OpenSSL 0.9.8 < 0.9.8u / 1.0.0 < 1.0.0h Multiple Vulnerabilities<br />

6401 Apache Traffic Server < 3.0.4 / 3.1.3 Buffer Overflow Vulnerability<br />

6456 nginx < 1.0.10 DNS Resolver Remote Heap Buffer Overflow<br />

6457 nginx < 1.0.14 / 1.1.x < 1.1.17 Information-Disclosure<br />

6458 nginx < 1.0.15 / 1.1.x < 1.1.19 Buffer-Overflow Vulnerability<br />

6478<br />

IBM Tivoli Directory Server Web Admin tool 6.1.0.x < 6.1.0.48 / 6.2.0.x<br />

< 6.2.0.22 / 6.3.0.x < 6.3.0.11 Cross-Site Scripting Vulnerability<br />

6479 HTTP Server Insecure Authentication (Basic)<br />

6494 PHP 5.3.x < 5.3.13 CGI Query String Code Execution<br />

6495 PHP 5.3.x < 5.4.3 Multiple Vulnerabilities<br />

6529<br />

nginx < 1.2.x / 1.3.x < 1.2.1 / 1.3.1 Vulnerabilities with Windows<br />

directory aliases<br />

6530 PHP 5.4.x < 5.4.5 _php_sream_scandir Overflow<br />

6550 Apache 2.4 < 2.4.3 Multiple Vulnerabilities<br />

6556 PHP 5.3.x < 5.3.15 Multiple Vulnerabilities<br />

6576 Apache 2.2 < 2.2.23 Multiple Vulnerabilities<br />

6607 BigFix Server Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

57540<br />

57080<br />

57082<br />

57541<br />

58565<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

59088<br />

58988<br />

61394<br />

60086<br />

61644<br />

60085<br />

62101<br />

6623 Apache Tomcat 7.0.x < 7.0.28 Header Parsing Remote Denial of Service Web 62985<br />

Family Web Servers 228<br />

N/A


6624<br />

Apache Tomcat 7.0.x < 7.0.30 DIGEST Authentication Multiple <strong>Security</strong><br />

Weaknesses<br />

6644 Apache Tomcat 7.0.x < 7.0.32 CSRF Filter Bypass<br />

6657 Apache Tomcat 6.0.x < 6.0.36 Multiple Vulnerabilities<br />

6661 Red Hat Satellite Server Communication<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

6662 Red Hat Satellite Server Communication Channel Detection - Server-Side Web<br />

Servers<br />

6671<br />

6672<br />

PHP 5.3.x < 5.3.21 cuRL X.509 Certificate Domain Name Matching<br />

MiTM Weakness<br />

PHP 5.4.x < 5.4.11 cURL X.509 Certificate Domain Name Matching<br />

MiTM Weakness<br />

6684 Barracuda Spam Firewall version detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Web<br />

Servers<br />

Web<br />

Servers<br />

Web<br />

Servers<br />

62988<br />

63200<br />

62987<br />

N/A<br />

N/A<br />

63621<br />

63622<br />

Family Web Servers 229<br />

N/A


Family Abuse<br />

<strong>PVS</strong> ID PLUGIN NAME FAMILY NESSUS ID<br />

Family Abuse 230


Family Policy<br />

<strong>PVS</strong><br />

ID<br />

PLUGIN NAME FAMILY NESSUS<br />

ID<br />

1158 eEye Retina Scanner Detection Policy N/A<br />

1159 Nessus Scanner Detection Policy N/A<br />

1186 Policy - Time of Defiance Gaming Client Detection Policy N/A<br />

1187<br />

Policy - BattleField 1942 <strong>Network</strong> Gaming Server<br />

Detection<br />

Policy N/A<br />

1189 Policy - Command and Conquer Gaming Server Detection Policy N/A<br />

1190 Policy - Quake Gaming Server Detection Policy N/A<br />

1191 Policy - America's Army Game Client Detection Policy N/A<br />

1192 Policy - Unreal Gaming Server Detection Policy N/A<br />

1193 Policy - Unreal Tournament Gaming Client Detection Policy N/A<br />

1194 Policy - Civilization III Gaming Server Detection Policy N/A<br />

1197 Policy - Halo LAN Gaming Client Detection Policy N/A<br />

1201 Policy - DirectX Gaming Server Detection Policy N/A<br />

1203 Policy - HALO Internet Gaming Client Detection Policy N/A<br />

1204 Policy - BattleField 1942 Gaming Client Detection Policy N/A<br />

1880 KaZaa or Morpheus Detection Policy N/A<br />

1881 MLdonkey Detection Policy 11125<br />

2441 Paros Web Proxy Detection Policy N/A<br />

2442 Visionael Scanner Detection Policy N/A<br />

2469 Retina REM Detection Policy N/A<br />

2501 Policy - Xlink Online Gaming Client Detection (TCP) Policy N/A<br />

2502 Policy - Xlink Online Gaming Server Detection Policy N/A<br />

2503 Policy - Xlink Online Gaming Client Detection (UDP) Policy N/A<br />

2543 Tor Tunnel Detection Policy N/A<br />

2718 Looking Glass <strong>Network</strong> Tool Detection Policy N/A<br />

2841 webcamXP Camera Detection Policy N/A<br />

3297 HTTPrint Scanning Software Detection Policy N/A<br />

3298 Acunetix Web Vulnerability Scanner Detection Policy N/A<br />

3342 Gmail File System Detection Policy N/A<br />

3399 Nmap Scanner Detection Policy N/A<br />

Family Policy 231


3400 Nmap Scanner Detection Policy N/A<br />

3401 Nmap Scanner Detection Policy N/A<br />

3402 Nmap Scanner Detection Policy N/A<br />

3562 Simple Scanning Tool (SAT) Scanner Detection Policy N/A<br />

3643 'The Bat' Mass Mailer Detection Policy N/A<br />

3644 Dynamic DNS Dynamic Update Client (DUC) Detection Policy N/A<br />

3660 GFI Languard Scanner Detection Policy N/A<br />

3683 MetaSploit Detection Policy N/A<br />

3685 MetaSploit Shell Detection Policy N/A<br />

3686 WebInspect Detection Policy N/A<br />

3761 SiVus VOIP Vulnerability Scanner Detection Policy N/A<br />

3765 Sipsak VOIP Vulnerability Scanner Detection Policy N/A<br />

3790 LogMeIn Listening Server Detection Policy N/A<br />

3791 LogMeIn Listening Server Detection Policy N/A<br />

3805 MetaSploit Server Detection Policy N/A<br />

3806 MetaSploit Server Detection Policy N/A<br />

3807 Brutus Password Scanning Tool Detection Policy N/A<br />

3813 Tivoli <strong>Network</strong> Services Auditor (NSA) Scanner Detection Policy N/A<br />

3895<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Stompy (the session stomper) Vulnerability Scanner<br />

Detection<br />

Policy N/A<br />

3909 Sensepost Wikto Detection Policy N/A<br />

3914 SQLiX SQL Injection Tool Detection Policy N/A<br />

3926 Xbox Console Detection Policy N/A<br />

3930 Qualys Scanner Detection Policy N/A<br />

3956 SIPScan VOIP Vulnerability Scanner Detection Policy N/A<br />

3957 SIPScan VOIP Vulnerability Scanner Detection Policy N/A<br />

4085 BearShare P2P Client Version Detection Policy N/A<br />

4086 gtk-gnutella P2P Client Version Detection Policy N/A<br />

4138 IBM AppScan Detection Policy N/A<br />

4159 AIMExpress Client Detection Policy N/A<br />

4160 proxy.org Client Detection Policy N/A<br />

4194 Netopia Timbuktu Detection Policy N/A<br />

4212 Tor Tunnel 'End Point' Server Detection Policy N/A<br />

Family Policy 232


Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

4302 Maltego Tool Detection Policy N/A<br />

4426 KiSS PC-Link Server Detection (TCP) Policy 31464<br />

4427 KiSS PC-Link Server Detection (UDP) Policy 31465<br />

4428 KiSS PC-Link Client Detection Policy N/A<br />

4430 VLC Media Player Detection Policy N/A<br />

4443 Orb Client Detection Policy N/A<br />

4524 iGuard <strong>Security</strong> Device Version Detection Policy N/A<br />

4525 ipMonitor Device Version Detection Policy N/A<br />

4526 DLINK Audio/Video Camera Detection Policy N/A<br />

4527 Dell Printer Administrative Web Console Detection Policy N/A<br />

4554 Owner-Free File System Client Detection Policy 33228<br />

4557 DC++ Client Detection Policy N/A<br />

4558 Kismet Server Information Disclosure Policy 33257<br />

4566 RatProxy Detection Policy N/A<br />

4622 Grendel Web Application Scanner Detection Policy N/A<br />

4674 Flash '.swf' File Detection Policy N/A<br />

4675 SOAP '.wsdl' File Detection Policy N/A<br />

4676 SOAP '.disco' File Detection Policy N/A<br />

4677 User Credentials Stored in Cookie Policy N/A<br />

4808 Hamachi VPN Detection Policy N/A<br />

4809 Hamachi VPN Version Detection Policy N/A<br />

4811 HDHomerun Server Detection Policy N/A<br />

4969 DNS Tunneling Client Detection (HTTP) Policy N/A<br />

4970 DNS Tunneling Client Detection (HTTP) Policy N/A<br />

4971 DNS Tunneling Server Detection (HTTP) Policy N/A<br />

4972 DNS Tunneling Server Detection (HTTP) Policy N/A<br />

4975 DNS Tunneling Client Detection (SMTP) Policy N/A<br />

4976 DNS Tunneling Client Detection (SMTP) Policy N/A<br />

5081 Microsoft .NET Hidden 'ViewState' Detection Policy N/A<br />

5205 Policy - Dopewars Gaming Server Detection Policy N/A<br />

5277 Synapse Client Detection Policy N/A<br />

5278 Web Server - JavaScript Hosted on 3rd Party Server Policy N/A<br />

Family Policy 233


Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

5280 whatismyip.com Client Detection Policy N/A<br />

5507 LogMeIn Listening Server Detection Policy N/A<br />

5723 JavaScript eval() Usage on Web Server Policy N/A<br />

5724 JavaScript Usage on Web Server Detection Policy N/A<br />

5800 Web Server CSS Hosted on 3rd-party Server Policy N/A<br />

5801 Web Site Cross-Domain Policy File Detection Policy 32318<br />

5804 Email Attachment Detection (client) Policy N/A<br />

5861 Web Server Pornographic Material Detected Policy N/A<br />

5862 Web Server Pornographic Material Detected Policy N/A<br />

5863 Web Server Pornographic Material Detected Policy N/A<br />

5864 Web Server Pornographic Material Detected Policy N/A<br />

5865 Web Server Pornographic Material Detected Policy N/A<br />

5866 Web Server Pornographic Material Detected Policy N/A<br />

5867 Web Server Pornographic Material Detected Policy N/A<br />

5868 Web Server Pornographic Material Detected Policy N/A<br />

5869 Web Server Pornographic Material Detected Policy N/A<br />

5870 Web Server Pornographic Material Detected Policy N/A<br />

5871 Web Server Pornographic Material Detected Policy N/A<br />

5872 Web Server Pornographic Material Detected Policy N/A<br />

5873 Web Server Pornographic Material Detected Policy N/A<br />

5874 Web Server Pornographic Material Detected Policy N/A<br />

5876 Microsoft .NET Verbose Error Reporting Detection Policy N/A<br />

5877 Web Server iFrame Source Hosted on 3rd-party Server Policy N/A<br />

5940 Havij SQL Injection Tool Detection Policy N/A<br />

5961 Xbox Live Login Detection Policy N/A<br />

5978 Port 80 Non-HTTP Traffic Detection Policy N/A<br />

5979 TeamViewer Detection Policy N/A<br />

6055 GoToMyPC Detection Policy N/A<br />

6102 OpenVAS Server Detection Policy N/A<br />

6126 Policy - .xxx Domain Access Attempt Policy N/A<br />

6235 Evony Game Detected Policy N/A<br />

6236 Desert Operations Game Detected Policy N/A<br />

Family Policy 234


6237 Empire Universe 2 Game Detected Policy N/A<br />

6238 Gilfor's Tale Game Detected Policy N/A<br />

6239 MechRage Game Detected Policy N/A<br />

6240 Romadoria Game Detected Policy N/A<br />

6241 Space Pioneers 2 Game Detected Policy N/A<br />

6242 eBay Auction Detected Policy N/A<br />

6243 Orkut Social Application Detected Policy N/A<br />

6319 Facebook/Twitter Pinterest Activity Policy N/A<br />

6320 Facebook/Twitter Pinterest Activity Policy N/A<br />

6321 Facebook/Twitter Pinterest Activity Policy N/A<br />

6343 Apple's iCloud Service Access Detection Policy N/A<br />

6358 Facebook Game - Zynga's Cafe World Detected Policy N/A<br />

6359 Facebook Game - Zynga's Castleville Detected Policy N/A<br />

6360 Facebook Game - Zynga's CityVille Detected Policy N/A<br />

6361 Facebook Game - Zynga's Empires & Allies Detected Policy N/A<br />

6362 Facebook Game - Zynga's FarmVille Detected Policy N/A<br />

6363 Facebook Game - Zynga's FishVille Detected Policy N/A<br />

6364 Facebook Game - Zynga's Hidden Chronicles Detected Policy N/A<br />

6365<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Facebook Game - Zynga's Indiana Jones Adventure World<br />

Detected<br />

Policy N/A<br />

6366 Facebook Game - Zynga's Mafia Wars 2 Detected Policy N/A<br />

6367 Facebook Game - Zynga's Mafia Wars Detected Policy N/A<br />

6368 Facebook Game - Zynga's PetVille Detected Policy N/A<br />

6369 Facebook Game - Zynga's Pioneer Trail Detected Policy N/A<br />

6370 Facebook Game - Zynga's Poker Detected Policy N/A<br />

6371 Facebook Application - Zynga's RewardVille Detected Policy N/A<br />

6372 Facebook Game - Zynga's Treasure Isle Detected Policy N/A<br />

6373 Facebook Game - Zynga's Vampire Wars Detected Policy N/A<br />

6374 Facebook Game - Zynga's Words With Friends Detected Policy N/A<br />

6375 Facebook Game - Zynga's YoVille Detected Policy N/A<br />

6376 Facebook Game - Wooga Bubble Island Detected Policy N/A<br />

6377 Facebook Game - Wooga Diamond Dash Detected Policy N/A<br />

6378 Facebook Game - Wooga Happy Hospital Detected Policy N/A<br />

Family Policy 235


6379 Facebook Game - Wooga Magic Land Detected Policy N/A<br />

6380 Facebook Game - Wooga Monster World Detected Policy N/A<br />

6381 Facebook Game - Angry Birds Detected Policy N/A<br />

6382 Facebook Game - Backyard Monsters Detected Policy N/A<br />

6383 Facebook Game - Bejeweled Blitz Detected Policy N/A<br />

6384 Facebook Game - BINGO Blitz Detected Policy N/A<br />

6385 Facebook Game - Coco Girl Detected Policy N/A<br />

6386 Facebook Game - CSI Crime City Detected Policy N/A<br />

6387 Facebook Game - Shadow Fight Detected Policy N/A<br />

6388<br />

Facebook Game - Social Empires, Land of Dragons &<br />

Castles Detected<br />

Policy N/A<br />

6389 Facebook Game - Tetris Battle Detected Policy N/A<br />

6390 Facebook Game - The Sims Social Detected Policy N/A<br />

6391<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Facebook Game - Top Eleven, Be a Football Manager<br />

Detected<br />

Policy N/A<br />

6396 Facebook Link Detection Policy N/A<br />

6397 Facebook Application Access Policy N/A<br />

6404 ashleymadison.com Access Detection Policy N/A<br />

6405 ashleymadison.com Access Detection Policy N/A<br />

6406 chemistry.com Access Detection Policy N/A<br />

6407 chemistry.com Access Detection Policy N/A<br />

6408 craigslist.org Personals Section Access Detected Policy N/A<br />

6409 craigslist.org Personals Access Detection Policy N/A<br />

6410 lavalife.com Access Detection Policy N/A<br />

6411 lavalife.com Access Detection Policy N/A<br />

6412 eharmony.com Access Detection Policy N/A<br />

6413 eharmony.com Access Detection Policy N/A<br />

6414 eharmony.com Access Detection Policy N/A<br />

6415 Facebook Game - 21 Questions Detected Policy N/A<br />

6416 Facebook Game - Barn Buddy Detected Policy N/A<br />

6417 Facebook Game - Bayou Blast Detected Policy N/A<br />

6418 Facebook Game - Best Casino Detected Policy N/A<br />

6419 Facebook Game - Crime City Detected Policy N/A<br />

Family Policy 236


6420 Facebook Game - Family Feud Detected Policy N/A<br />

6421 Facebook Game - Farkle Detected Policy N/A<br />

6422 Facebook Game - Fruit Ninja Frenzy Detected Policy N/A<br />

6423 Facebook Game - Happy Aquarium Detected Policy N/A<br />

6424 Facebook Game - Happy Pets Detected Policy N/A<br />

6425 Facebook Game - Icy Tower Detected Policy N/A<br />

6426 Facebook Game - JackpotJoy Slot Machines Detected Policy N/A<br />

6427 Facebook Game - Mesmo Games Detected Policy N/A<br />

6428 Facebook Game - Mindjolt Detected Policy N/A<br />

6429 Facebook Game - Monster Galaxy Detected Policy N/A<br />

6430 Facebook Game - My Shops Detected Policy N/A<br />

6431 Facebook Game - Okey Detected Policy N/A<br />

6432 Facebook Game - Restaurant City Detected Policy N/A<br />

6433 Facebook Game - Scrabble Detected Policy N/A<br />

6434 Facebook Game - The Smurfs & Co Detected Policy N/A<br />

6435 Facebook Game - Stardoll Detected Policy N/A<br />

6436 Facebook Game - Sultan Bubble Detected Policy N/A<br />

6437 Facebook Game - Turkiye Texas Poker Detected Policy N/A<br />

6438 Facebook Game - TubeHero Detected Policy N/A<br />

6439<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Facebook Game - Poker Texas Hold'em Boyaa Viet Nam<br />

Detected<br />

Policy N/A<br />

6440 Facebook Game - Miscrits of Volcano Island Detected Policy N/A<br />

6441 Facebook Game - War Commander Detected Policy N/A<br />

6442 Facebook Game - Zynga Slingo Detected Policy N/A<br />

6451 TeamViewer Detection Policy N/A<br />

6452 TeamViewer Detection Policy N/A<br />

6459 TeamViewer Detection Policy N/A<br />

6461 Facebook Game - Wooga Game Detection (Generic) Policy N/A<br />

6476 Policy - Usenet .nzb File Detection Policy N/A<br />

6477 Policy - Usenet .nzb Client File Detection Policy N/A<br />

6493 Game - Smurf's Village Detected Policy N/A<br />

6651 Instagram Upload Activity Detected Policy N/A<br />

6682 Email Attachment Detection (client) Policy N/A<br />

Family Policy 237


Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Policy 238


Family Data Leakage<br />

<strong>PVS</strong><br />

ID<br />

PLUGIN NAME FAMILY<br />

3774 Encryption Private Key Detection (Generic)<br />

3775 Encryption Private Key Detection (Generic)<br />

3776 Encryption Private Key Detection (PuTTY)<br />

3777 Encryption Private Key Detection (PuTTY)<br />

3778 Encryption Private Key Detection (Generic)<br />

3779 Encryption Private Key Detection (Generic)<br />

3780 Encryption Private Key Detection (RSA)<br />

3781 Encryption Private Key Detection (RSA)<br />

3782 Encryption Private Key Detection (DSA)<br />

3783 Encryption Private Key Detection (DSA)<br />

3784 Encryption Private Key Detection (PGP)<br />

3785 Encryption Private Key Detection (PGP)<br />

3822 Microsoft Office .xls File Detection<br />

3823 Microsoft Office .doc File Detection<br />

3824 Microsoft Office .ppt File Detection<br />

3825 Microsoft Office .csv File Detection<br />

3826 Microsoft Office .rtf File Detection<br />

3870 Detection of .xls File Email Attachment<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

NESSUS<br />

ID<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

11419<br />

11419<br />

11419<br />

11419<br />

11419<br />

Family Data Leakage 239<br />

N/A


3871 Detection of .zip File Email Attachment<br />

3940 .pst File Email Attachment Detection<br />

3941 .pst Office File Detection<br />

3943 .ost File Email Attachment Detection<br />

3944 .ost Offie File Detection<br />

3945 .uni Email Attachment Detection<br />

3946 .uni Office Files Detection<br />

3963 .pdf Document File Detection<br />

4003 FTP Server .xls Office Files Detection<br />

4004 FTP Server .doc Office Files Detection<br />

4005 FTP Server .ppt Office Files Detection<br />

4006 FTP Server .csv Office Files Detection<br />

4007 FTP Server .rtf Office Files Detection<br />

4008 FTP Server .mp3 / .mp4 Files Detection<br />

4009 FTP Server .wav Files Detection<br />

4010 FTP Server .ogg Files Detection<br />

4011 FTP Server .wma Files Detection<br />

4012 FTP Server .avi Files Detection<br />

4013 FTP Server .mpg Files Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

4014 FTP Server .divx Files Detection Data N/A<br />

Family Data Leakage 240<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


4015 FTP Server .pst Office Files Detection<br />

4016 FTP Server .ost Office Files Detection<br />

4017 FTP Server .uni Files Detection<br />

4018 FTP Server .pdf Files Detection<br />

4019 .xls File Upload Detection<br />

4020 .doc File Upload Detection<br />

4021 .ppt File Upload Detection<br />

4022 .csv File Upload Detection<br />

4023 .rtf File Upload Detection<br />

4024 .mp3 File Upload Detection<br />

4025 .wav File Upload Detection<br />

4026 .ogg File Upload Detection<br />

4027 .wma File Upload Detection<br />

4028 .avi File Upload Detection<br />

4029 .mpg File Upload Detection<br />

4030 .divx File Upload Detection<br />

4031 .pst File Upload Detection<br />

4032 .ost File Upload Detection<br />

4033 .uni File Upload Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Family Data Leakage 241<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


4034 .pdf File Upload Detection<br />

4037 FTP Server Zipped .xls File Detection<br />

4038 FTP Server Zipped .doc File Detection<br />

4039 FTP Server Zipped .ppt File Detection<br />

4040 FTP Server Zipped .csv File Detection<br />

4041 FTP Server Zipped .rtf File Detection<br />

4042 FTP Server Zipped .mp3 / .mp4 File Detection<br />

4043 FTP Server Zipped .wav File Detection<br />

4044 FTP Server Zipped .ogg File Detection<br />

4045 FTP Server Zipped .wma File Detection<br />

4046 FTP Server Zipped .avi File Detection<br />

4047 FTP Server Zipped .mpg File Detection<br />

4048 FTP Server Zipped .divx File Detection<br />

4049 FTP Server Zipped .pst File Detection<br />

4050 FTP Server Zipped .ost File Detection<br />

4051 FTP Server Zipped .uni File Detection<br />

4052 FTP Server Zipped .pdf File Detection<br />

4053 FTP Server Zipped xls File Uploaded<br />

4054 FTP Server Zipped .doc File Uploaded<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

4055 FTP Server Zipped .ppt File Uploaded Data N/A<br />

Family Data Leakage 242<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


4056 FTP Server Zipped .csv File Uploaded<br />

4057 FTP Server Zipped .rtf File Uploaded<br />

4058 FTP Server Zipped .mp3 / .mp4 File Uploaded<br />

4059 FTP Server Zipped .wav File Uploaded<br />

4060 FTP Server Zipped .ogg File Uploaded<br />

4061 FTP Server Zipped .wma File Uploaded<br />

4062 FTP Server Zipped .avi File Uploaded<br />

4063 FTP Server Zipped .mpg File Uploaded<br />

4064 FTP Server Zipped .divx File Uploaded<br />

4065 FTP Server Zipped .pst File Uploaded<br />

4066 FTP Server Zipped .ost File Uploaded<br />

4067 FTP Server Zipped .uni File Uploaded<br />

4068 FTP Server Zipped .pdf File Uploaded<br />

4661 Java '.class' File Detection<br />

4662 '.cnf' File Detection<br />

4663 Possible Social <strong>Security</strong> Number in Cookie<br />

4664 '.log' File Detection<br />

4665 '.conf' File Detection<br />

4671 Possible Social <strong>Security</strong> Number in Cookie<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Family Data Leakage 243<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


4672 Possible User ID and Password Sent Within a Web Form (POST)<br />

4673 Possible User ID and Password Sent Within a Web Form (GET)<br />

4711 '.dll' File Detection<br />

4781 Web Server Allows Download of .ini Files<br />

4947 Microsoft Office .docx File Detection<br />

4948 Microsoft Office .xlsx Files Detection<br />

4949 Microsoft Office .pptx Files Detection<br />

4960 WebSphere '.ear' File Detection<br />

4961 WebSphere '.war' File Detection<br />

4968 Mac .dmg File Detection<br />

4992 FTP Server .divx file Detection<br />

5055 FTP Server File Detection<br />

5056 FTP Client File Download Detection<br />

5214<br />

XML Request Possible userID / password Cleartext Remote<br />

Disclosure<br />

5286 Web Server - BitTorrent .torrent File Detection<br />

5686 HTTP File Upload Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

5820 Social <strong>Security</strong> Number Cleartext Transmission (Client)<br />

5821 Social <strong>Security</strong> Number Cleartext Transmission (Client)<br />

5822 Social <strong>Security</strong> Number Cleartext Transmission (Client)<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

5828 Credit Card Number Cleartext Transmission (Client)Social <strong>Security</strong> Data N/A<br />

Family Data Leakage 244<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


Number Cleartext Transmission (Client) Leakage<br />

5829 Credit Card Number Cleartext Transmission (Client)<br />

5830 Credit Card Number Cleartext Transmission (Client)<br />

5831 Credit Card Number Cleartext Transmission (Client)<br />

5832 Credit Card Number Cleartext Transmission (Client)<br />

5833 Credit Card Number Cleartext Transmission (Client)<br />

5847 Generic Credit Card Signature Detection<br />

5848 Generic Credit Card Signature Detection<br />

5849 Generic Credit Card Signature Detection<br />

5850 Generic Credit Card Signature Detection<br />

5851 Generic Credit Card Signature Detection<br />

5852 Generic Credit Card Signature Detection<br />

5853 Generic Credit Card Signature Detection<br />

5854 Generic Credit Card Signature Detection<br />

5855 Generic Credit Card Signature Detection<br />

5856 Generic Credit Card Signature Detection<br />

5857 Generic Credit Card Signature Detection<br />

5858 Generic Credit Card Signature Detection<br />

6033 '.dll' File Download Detection<br />

6034 '.dll' File Download Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Family Data Leakage 245<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


6035 '.dll' File Download Detection<br />

6036 '.dll' File Download Detection<br />

6630 Confidential data on server<br />

6631 Confidential data on server<br />

6632 Confidential data on server<br />

6633 Confidential data on server<br />

6634 Confidential data on server<br />

6635 Confidential data on server<br />

6636 Confidential data on server<br />

6637 Confidential data on server<br />

6638 Confidential data on server<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Data<br />

Leakage<br />

Family Data Leakage 246<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


Family SCADA<br />

<strong>PVS</strong><br />

ID<br />

PLUGIN NAME FAMILY NESSUS<br />

ID<br />

3552 Distributed <strong>Network</strong> Protocol v3 Client Detection (SCADA) SCADA N/A<br />

3553 Distributed <strong>Network</strong> Protocol v3 Server Detection SCADA N/A<br />

3554 COTP Server Detection (SCADA) SCADA N/A<br />

3555 COTP Client Detection (SCADA) SCADA N/A<br />

3556 MODBUS Server Detection (SCADA) SCADA N/A<br />

3557 MODBUS Client Detection (SCADA) SCADA N/A<br />

3849 MODBUS Server Diagnostic Mode (SCADA) SCADA N/A<br />

3850 Modicon PLC Embedded HTTP Server Detection (SCADA) SCADA N/A<br />

3851 Modicon PLC Default FTP Password (SCADA) SCADA N/A<br />

3852 Modicon Modbus/TCP Programming Function Code Access (SCADA) SCADA N/A<br />

3853 Modicon PLC HTTP Server Default Username/Password (SCADA) SCADA N/A<br />

3854 Modicon PLC Telnet Server Detection (SCADA) SCADA N/A<br />

3855 Modicon PLC CPU Type Default Credentials (SCADA) SCADA N/A<br />

6247 Distributed <strong>Network</strong> Protocol v3 'Disable Unsolicited' Alert (SCADA) SCADA N/A<br />

6248 Distributed <strong>Network</strong> Protocol v3 'Cold Restart' Alert (SCADA) SCADA N/A<br />

6249<br />

Distributed <strong>Network</strong> Protocol v3 'Unauthorized Read Request' Alert<br />

(SCADA)<br />

SCADA N/A<br />

6250 Distributed <strong>Network</strong> Protocol v3 'Stop Application' Alert (SCADA) SCADA N/A<br />

6251 Distributed <strong>Network</strong> Protocol v3 'Warm Restart' Alert (SCADA) SCADA N/A<br />

6252 Distributed <strong>Network</strong> Protocol v3 'Broadcast Request' Alert (SCADA) SCADA N/A<br />

6253 ICCP Invalid Destination Address (SCADA) SCADA N/A<br />

6254 ICCP Invalid Client Disconnect (SCADA) SCADA N/A<br />

6255 ICCP Invalid OSI-SSEL (SCADA) SCADA N/A<br />

6256 ICCP Invalid OSI-PSEL (SCADA) SCADA N/A<br />

6257 MODBUS Client 'Force Listen Only Mode' Request (SCADA) SCADA N/A<br />

6258 MODBUS Client 'Restart Communications' Request (SCADA) SCADA N/A<br />

6259<br />

MODBUS Client 'Clear Counters and Diagnostic Registers' Request<br />

(SCADA)<br />

SCADA N/A<br />

6260 MODBUS Client 'Read Device Identification' Request (SCADA) SCADA N/A<br />

6261 MODBUS Client 'Report Server Information' Request (SCADA) SCADA N/A<br />

Family SCADA 247


6265<br />

6266<br />

6267<br />

6268<br />

6269<br />

Schweitzer Engineering Laboratories (SEL) Telnet Account Detection<br />

(SCADA)<br />

Schweitzer Engineering Laboratories (SEL) Management Server<br />

Detection (SCADA)<br />

Schweitzer Engineering Laboratories (SEL) Default telnet Account<br />

Detection (SCADA)<br />

Schweitzer Engineering Laboratories (SEL) Default telnet<br />

Account/Password Detection (SCADA)<br />

Schweitzer Engineering Laboratories (SEL) Default telnet Account<br />

Detection (SCADA)<br />

SCADA N/A<br />

SCADA N/A<br />

SCADA N/A<br />

SCADA N/A<br />

SCADA N/A<br />

6270 GE D20 TFTP Client Access Detection (SCADA) SCADA N/A<br />

6271 GE D20 TFTP Client Access Detection (SCADA) SCADA N/A<br />

6272 GE D20 Server TFTP File Transfer Detection (SCADA) SCADA N/A<br />

6273 GE D20 Server TFTP File Transfer Detection (SCADA) SCADA N/A<br />

6274 Modicon FTP Client Detection (SCADA) SCADA N/A<br />

6275 Modicon FTP Server Detection (SCADA) SCADA N/A<br />

6276 Modicon FTP Default Account/Password Usage (SCADA) SCADA N/A<br />

6277 Modicon FTP Default Account/Password Usage (SCADA) SCADA N/A<br />

6278 Modicon telnet Default Account Detection (SCADA) SCADA N/A<br />

6279 Modicon telnet Default Account/Password Detection (SCADA) SCADA N/A<br />

6280 Modicon telnet Default Account/Password Detection (SCADA) SCADA N/A<br />

6281 GE PLC telnet Server Detection (SCADA) SCADA N/A<br />

6282 GE PLC telnet Server Default Account/Password (SCADA) SCADA N/A<br />

6283 GE PLC telnet Server Default Account/Password (SCADA) SCADA N/A<br />

6284 Rockwell Automation PLC HTTP Server Detection (SCADA) SCADA N/A<br />

6285<br />

6286<br />

Rockwell Automation PLC HTTP Server Administrator Access<br />

Detection (SCADA)<br />

Rockwell Automation PLC - Micrologix Controller Version Detection<br />

(SCADA)<br />

SCADA N/A<br />

SCADA N/A<br />

6287 Modicon PLC HTTP Default Account/Password Detection (SCADA) SCADA N/A<br />

6293<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Schweitzer Engineering Laboratories (SEL) Management Server<br />

Detection Default Level 1 Credentials (SCADA)<br />

SCADA N/A<br />

6301 RealWin Management Server Detection (SCADA) SCADA N/A<br />

6305 RealWin Management Server HMI Service Detection (SCADA) SCADA N/A<br />

6313 ClearSCADA Management Server Detection (SCADA) SCADA N/A<br />

Family SCADA 248


6314 ClearSCADA Management Server Detection (SCADA) SCADA N/A<br />

6316 InduSoft WebStudio Server detection (SCADA) SCADA N/A<br />

6317 InduSoft WebStudio Server detection Version 6 (SCADA) SCADA N/A<br />

6318 InduSoft WebStudio Server detection Version (SCADA) SCADA N/A<br />

6323 7T-IGSS Server Login Attempt Detected (SCADA) SCADA N/A<br />

6330 7T-IGSS Server Detected (SCADA) SCADA N/A<br />

6444 RealWin Management Server Detection (SCADA) SCADA N/A<br />

6445 ClearSCADA Management Server Detection (SCADA) SCADA N/A<br />

6446 Wonderware Management Server Detection (SCADA) SCADA N/A<br />

6447 RealWin Management Server Detection (SCADA) SCADA N/A<br />

6448 RealWin Management Server Detection (SCADA) SCADA N/A<br />

6449 RealWin Management Server Detection (SCADA) SCADA N/A<br />

6450<br />

6453<br />

6454<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

7T Interactive Graphical SCADA System (IGSS) Server Detection<br />

(SCADA)<br />

7T Interactive Graphical SCADA System (IGSS) Server Detection<br />

(SCADA)<br />

7T Interactive Graphical SCADA System (IGSS) Server Detection<br />

(SCADA)<br />

SCADA N/A<br />

SCADA N/A<br />

SCADA N/A<br />

6462 Rockwell Automation Service Detection SCADA N/A<br />

6463 Rockwell Automation Service Detection SCADA N/A<br />

6464 Rockwell Automation Service Detection SCADA N/A<br />

6465 Rockwell Automation Service Detection SCADA N/A<br />

6466 Rockwell Automation Service Detection SCADA N/A<br />

6467 Rockwell Automation Service Detection SCADA N/A<br />

6468 Rockwell Automation Service Detection SCADA N/A<br />

6469 Rockwell Automation Service Detection SCADA N/A<br />

6470 Rockwell Automation Service Detection SCADA N/A<br />

6471 Rockwell Automation Service Detection SCADA N/A<br />

6472 Rockwell Automation Service Detection SCADA N/A<br />

6473 Rockwell Automation Service Detection SCADA N/A<br />

6537 Tridium SCADA Server Detection SCADA N/A<br />

6542 enteliTOUCH SCADA Server Detection SCADA N/A<br />

6543 Electro Industries GaugeTech SCADA Server Detection SCADA N/A<br />

Family SCADA 249


6597 IEC 60870-5-104 server detection SCADA N/A<br />

6689 Siemens SIMATIC RF-MANAGER Detection (SCADA) SCADA 64682<br />

6697<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Ecava IntegraXor < 4.00.4283 ActiveX Remote Buffer Overflow<br />

(SCADA)<br />

SCADA 64630<br />

6698 Ecava IntegraXor Server Login Attempt (SCADA) SCADA N/A<br />

Family SCADA 250


Family Mobile Devices<br />

<strong>PVS</strong><br />

ID<br />

PLUGIN NAME FAMILY<br />

3494 Tablet PC Detection<br />

3495 Cellular Phone Browser Detection<br />

4134 Apple iPhone/iPad Detection<br />

4425 Apple iPhone < 1.1.4 Detection<br />

4545 BlackBerry Version Detection<br />

4654 Apple iPod Device Detection<br />

5074 Apple iPhone 3.x Detection<br />

5075 Palm Pre Mobile Phone Detection<br />

5110 Apple iPhone < 3.0.1 Overflow<br />

5160 Apple iPhone < 3.1 Multiple Vulnerabilities<br />

5189 BlackBerry Dialog Box Certificate Mismatch<br />

5287 Android Mobile Device Detection<br />

5337 Apple iPhone OS < 3.1.3 Multiple Vulnerabilities<br />

5578 Apple iPhone/iPad OS < 4.0 Multiple Vulnerabilities<br />

5715 Apple iPhone/iPad iOS < 4.2 Multiple Vulnerabilities<br />

5737 Android < 2.3 Multiple Vulnerabilities<br />

5814 Apple iPhone/iPad OS < 4.3 Multiple Vulnerabilities<br />

5888 Apple iPhone/iPad OS < 4.3.2 Multiple Vulnerabilities<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

NESSUS<br />

ID<br />

Family Mobile Devices 251<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


5889 Apple iPhone/iPad OS 4.2.5 / 4.2.6 Multiple Vulnerabilities<br />

5986<br />

5993<br />

Apple iPhone/iPad iOS < 4.3.4 and iOS 4.2.5 through 4.2.9<br />

Multiple Vulnerabilities<br />

Apple iOS < 4.2.10 / 4.3.5 Data <strong>Security</strong> Certificate Verification<br />

Vulnerability<br />

5997 Android OS 2.3.4 / 3.1 Sandbox Bypass Vulnerability<br />

5999 Apple FaceTime Detection<br />

6041 Apple iOS 3.0 through 4.3.5 Multiple Vulnerabilities<br />

6066 Android Market Detection<br />

6067 Android version Detection<br />

6068 BlackBerry Version Detection<br />

6069 DELL Mobile Device Version Detection<br />

6070 HP Tablet Mobile Device Version Detection<br />

6071 HP Tablet Mobile Device Version Detection<br />

6072 HTC Mobile Device Version Detection<br />

6073 HTC Mobile Device Version Detection<br />

6074 HTC Mobile Device Version Detection<br />

6075 Kindle Mobile Device Version Detection<br />

6076 LG Mobile Device Version Detection<br />

6077 Nokia Mobile Device Version Detection<br />

6078 Nook Mobile Device Version Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

6079 Samsung Mobile Device Version Detection Mobile N/A<br />

Family Mobile Devices 252<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


6080 Samsung Mobile Device Version Detection<br />

6081 Samsung Mobile Device Version Detection<br />

6082 Samsung Mobile Device Version Detection<br />

6083 Samsung Mobile Device Version Detection<br />

6084 PalmOS Mobile Device Version Detection<br />

6085 Symbian Mobile Device Version Detection<br />

6086 Motorola Mobile Device Version Detection<br />

6114 Kindle Mobile Device Detection<br />

6297 Android 2.3 < 2.3.6 Information Disclosure<br />

6395 Apple Jailbroken Device Detected<br />

6517 ActiveSync detection<br />

6531 Android Mobile Device App Download Detection<br />

8002 iPhone App Install Detected<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Mobile<br />

Devices<br />

Family Mobile Devices 253<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


Family Internet Services<br />

<strong>PVS</strong><br />

ID<br />

PLUGIN NAME FAMILY<br />

2488 Google API "Google Hacking" Detection<br />

3217 Google Talk Detection<br />

3414 ReadNotify Email Tracker Application Detection<br />

3939 MySpaceIM Chat Detection<br />

4156 YouSendIt Client Detection<br />

4157 SendThisFile Client Detection<br />

4158 DropSend Client Detection<br />

4161 Box.net File Sharing Detection<br />

4164 MediaMax File Sharing Detection<br />

4467 MarketFirst Software Detection<br />

4814 Twitter Client Usage Detection<br />

4936 Dropbox Software Detection<br />

5200 Pandora Version Detection<br />

5271 Myspace Usage Detection<br />

5272 Facebook Usage Detection<br />

5273 YouTube Usage Detection<br />

5274 classmates.com Usage Detection<br />

5275 Gmail Usage Detection<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

NESSUS<br />

ID<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

35717<br />

Family Internet Services 254<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


5276 XM Radio Usage Detection<br />

5279 Yahoo! Web Mail Usage Detection<br />

5679 iDisk User Enumeration<br />

5695 YouSendIt Client Detection<br />

5817 Facebook Chat Client Detection<br />

5819 Facebook Chat Client Username Detection<br />

5875 Wikipedia Page 'edit' Detection<br />

5884 Facebook Status Update Detection<br />

5885 Facebook Status Update Detection<br />

5887 Facebook Profile Edit Detection<br />

5944 Hulu Username Detection<br />

5945 Hulu Start Video Session Detection<br />

5948 Box.net Client Detection<br />

5949 Box.net File Share Detection<br />

5950 Box.net File Share Detection<br />

5951 Box.net File Share Detection<br />

5953 Hulu Start Video Session Detection<br />

5955 LinkedIn Status Update Detection<br />

5957 LinkedIn Profile Update Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

5958 LinkedIn Message Inbox Access Detection Internet N/A<br />

Family Internet Services 255<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


5959 LinkedIn Message Creation Detection<br />

5960 LinkedIn User Name Detection<br />

5962 XM Radio Usage Detection<br />

5963 Hotmail UserID Detection<br />

6040 NetFlix User Detection<br />

6042 NetFlix User Detection<br />

6047 Tumblr Blog Edit Detection<br />

6048 Tumblr Photo Upload Detection<br />

6049 iHeartRadio Stream Detection<br />

6061 World of Warcraft/Battle.net Detection<br />

6090 Google Music Client Detection<br />

6091 Google Music Client Upload Detection<br />

6092 Google Music Client Session Initiated<br />

6100 Sony Blu-Ray Player Detection<br />

6112 Shavlik Software Management Detection<br />

6124 BingToolbar Installed<br />

6128 Spotify Installed<br />

6339 Evernote Client Detection<br />

6342 iHeartRadio Stream Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Family Internet Services 256<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


6484 Dropbox Software Detection<br />

6485 iTunes AppleTV client Detection<br />

6513 Evernote Client Detection<br />

6524 ESPN ScoreCenterXL Detection iOS<br />

6525 ESPN ScoreCenterXL Video Stream Detection iOS<br />

6526<br />

NBCOlympics application detection for Apple iPad -<br />

(accessed)<br />

6527 NBCOlympics application detection for Apple iPad.<br />

6532<br />

Detection of uploading a file to scribd.com - (HTML<br />

method)<br />

6533 Detection of uploading a file to scribd.com - (Flash Method)<br />

6535 Spotify app music streaming detection<br />

6538<br />

Last.fm application music streaming on an Android mobile<br />

device<br />

6539 Last.fm application music streaming on an iOS device<br />

6540<br />

6541<br />

Pandora Internet radio streaming on an Android mobile<br />

device<br />

Pandora Internet radio streaming on an Apple iOS mobile<br />

device<br />

6546 NetFlix on-demand media streaming to the Apple iPad<br />

6547 NetFlix on-demand media streaming to a Windows Desktop<br />

6552 Hulu plus search detection on the Apple iPad<br />

6553 Hulu on-demand media streaming to the Apple iPad<br />

6557 Opendrive Login Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

6558 Opendrive File Upload Detection Internet N/A<br />

35717<br />

Family Internet Services 257<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


6564 Ustream mobile Android app detection<br />

6565 Ustream mobile Android app streaming detection<br />

6567 Spiceworks Client Version Detection<br />

6569 Foursquare app on an Android mobile device<br />

6570 Carbonite 'Cloud' Backup Service Detection<br />

6571 Carbonite 'Cloud' Backup Service Detection<br />

6572 MS Skydrive 'Cloud' Backup Service Detection<br />

6573 Sprint TV app on Android mobile devices<br />

6577 JustCloud 'Cloud' Backup Service Detection<br />

6578 JustCloud 'Cloud' Backup Service Detection<br />

6580 Wunderlist 'Cloud' sync Detection<br />

6581 Wunderlist 'Cloud' Service Detection<br />

6585 Salesforce Application Detection<br />

6586 Sugarsync 'Cloud' Backup Service Detection<br />

6587 Sugarsync 'Cloud' Backup Service Detection<br />

6588 SSL Client Hello Detection<br />

6590 Accessing iTunes Store on an Apple iOS device<br />

6591 Browsing Cydia software packages<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

6593 Foursquare app on an Apple iOS mobile device<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Family Internet Services 258<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


6594<br />

6595<br />

Slacker application music streaming on an Android mobile<br />

device<br />

Slacker application music streaming on an Apple iOS<br />

mobile device<br />

6596 Slacker application music streaming leaking information<br />

6619 Microsoft Office365 Access<br />

6676 Windows 8 App Store Access<br />

6677 Windows 8 App Store Download Detected<br />

6678 Windows 8 Tile Services Detection<br />

ISC BIND Version 8 Detection<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

Internet<br />

Services<br />

<strong>PVS</strong> ID: 1000 FAMILY: DNS Servers RISK: INFO NESSUS ID:10028<br />

Description: The remote host is running BIND : %L<br />

Solution: N/A<br />

CVE Not available<br />

ISC BIND rdataset Parameter Malformed DNS Packet DoS<br />

<strong>PVS</strong> ID: 1001 FAMILY: DNS Servers RISK: HIGH NESSUS ID:11051<br />

Description: Synopsis :\n\nThe remote server is vulnerable to a Denial of Service (DoS) attack\n\nThe<br />

remote BIND 9 server is vulnerable to a denial of service attack.<br />

Solution: Upgrade to BIND 9.2.1<br />

CVE-2002-0400<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

ISC BIND Multiple DNS Resolver Functions Remote Overflow<br />

<strong>PVS</strong> ID: 1002 FAMILY: DNS Servers RISK: HIGH NESSUS ID:11318<br />

Family Internet Services 259<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A<br />

N/A


Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote BIND 9<br />

server is vulnerable to a buffer overflow which may be exploited by an attacker to gain a<br />

shell on this host, or disable this service entirely.<br />

Solution: Upgrade to Bind 9.2.2<br />

CVE-2002-0684<br />

ISC BIND Version 9 Detection<br />

<strong>PVS</strong> ID: 1003 FAMILY: DNS Servers RISK: INFO NESSUS ID:10728<br />

Description: Synopsis :\n\nThe remote host allows remote users to query it's version number\n\nIt is<br />

possible to determine that the remote BIND server is running BIND 9.x, even if its version<br />

number has been hidden, by querying it for the AUTHORS map.<br />

Solution: It is recommended you change the source code to prevent attackers from fingerprinting<br />

your server.<br />

CVE Not available<br />

ISC BIND < 8.2.3 Multiple Remote Vulnerabilities<br />

<strong>PVS</strong> ID: 1004 FAMILY: DNS Servers RISK: HIGH NESSUS ID:10605<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote BIND<br />

server is vulnerable to various buffer overflows which may allow an attacker to gain a root<br />

shell on this host<br />

Solution: Upgrade to bind 8.2.3 or newer<br />

CVE-2001-0013<br />

ISC BIND < 4.9.2 Multiple Remote Vulnerabilities<br />

<strong>PVS</strong> ID: 1005 FAMILY: DNS Servers RISK: HIGH NESSUS ID:10605<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote BIND<br />

server is vulnerable to various buffer overflows which may allow an attacker to gain a root<br />

shell on this host<br />

Solution: Upgrade to bind 4.9.2 or newer<br />

CVE-2001-0013<br />

ISC BIND < 8.3.4 Multiple Remote Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1006 FAMILY: DNS Servers RISK: HIGH NESSUS ID:10886<br />

Family Internet Services 260


Description: Synopsis :\n\nThe remote host is vulnerable to multiple remote overflows\n\nThe remote<br />

BIND server is vulnerable to three different vulnerabilitities : \n1) The remote BIND<br />

server, based on its version number, if running recursive DNS functionality, is vulnerable<br />

to a buffer overflow.\n2) The remote BIND server is vulnerable to a denial of service<br />

(crash) via SIG RR elements with invalid expiry times.\n3) The remote BIND server is<br />

vulnerable to a denial of service.\nWhen a DNS lookup is requested on a non-existant<br />

sub-domain of a valid domain and an OPT resource record with a large UDP payload is<br />

attached, the server may fail.<br />

Solution: Upgrade to BIND 8.3.4 or newer<br />

CVE-2002-1220<br />

ISC BIND < 4.9.7 Inverse-Query Remote Overflow<br />

<strong>PVS</strong> ID: 1007 FAMILY: DNS Servers RISK: HIGH NESSUS ID:10728<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote BIND<br />

server, according to its version number, is vulnerable to an inverse query overflow. An<br />

attacker may use this flaw to gain a root shell on this host.<br />

Solution: Upgrade to BIND 4.9.7 or newer<br />

CVE-1999-0009<br />

ISC BIND < 4.9.5 Multiple DNS Resolver Functions Remote Overflow<br />

<strong>PVS</strong> ID: 1008 FAMILY: DNS Servers RISK: HIGH NESSUS ID:11510<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote BIND<br />

server, according to its version number, is vulnerable to a remote buffer overflow within its<br />

resolver code. An attacker may be able to execute arbitrary code by having the remote DNS<br />

server make a request and send back a malicious DNS response with an invalid length field.<br />

Solution: Upgrade to BIND 4.9.5 or newer<br />

CVE-2002-0684<br />

ISC BIND < 8.2.7 Multiple Remote Vulnerabilities<br />

<strong>PVS</strong> ID: 1009 FAMILY: DNS Servers RISK: HIGH NESSUS ID:11152<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote BIND<br />

server is vulnerable to the SIG cached RR overflow vulnerability. An attacker may use this<br />

flaw to gain a shell on this system.<br />

Solution: Upgrade to bind 8.2.7<br />

CVE-2002-1221<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 261


ISC BIND < 8.3.4 Multiple Remote Vulnerabilities<br />

<strong>PVS</strong> ID: 1010 FAMILY: DNS Servers RISK: HIGH NESSUS ID:11152<br />

Description: Synopsis :\n\nTHe remote host is vulnerable to a buffer overflow\n\nThe remote BIND<br />

server is vulnerable to the SIG cached RR overflow vulnerability. An attacker may use this<br />

flaw to gain a shell on this system.<br />

Solution: Upgrade to bind 8.3.4<br />

CVE-2002-1221<br />

ISC BIND < 4.9.11 Multiple Remote Vulnerabilities<br />

<strong>PVS</strong> ID: 1011 FAMILY: DNS Servers RISK: HIGH NESSUS ID:11152<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote BIND<br />

server is vulnerable to the SIG cached RR overflow vulnerability. An attacker may use this<br />

flaw to gain a shell on this system.<br />

Solution: Upgrade to bind 4.9.11<br />

CVE-2002-1219<br />

ISC BIND < 8.2.2-P5 Multiple Remote Vulnerabilities<br />

<strong>PVS</strong> ID: 1012 FAMILY: DNS Servers RISK: HIGH NESSUS ID:10029<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote BIND<br />

server is vulnerable to several attacks that can allow an attacker to gain root on this system.<br />

Solution: Upgrade to BIND 8.2.2-P5<br />

CVE-1999-0849<br />

ISC BIND Compressed ZXFR Name Service Query DoS<br />

<strong>PVS</strong> ID: 1013 FAMILY: DNS Servers RISK: HIGH NESSUS ID:10549<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack\n\nThe<br />

remote BIND server is vulnerable to the ZXFR bug that allows an attacker to disable it<br />

remotely.<br />

Solution: Upgrade to BIND 8.2.2-P7<br />

CVE-2000-0887<br />

ISC BIND Version 4 Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1014 FAMILY: DNS Servers RISK: INFO NESSUS ID:10028<br />

Family Internet Services 262


Description: The remote host is running BIND : %L<br />

Solution: N/A<br />

CVE Not available<br />

ISC BIND < 8.1.2 Inverse-Query Remote Overflow<br />

<strong>PVS</strong> ID: 1015 FAMILY: DNS Servers RISK: HIGH NESSUS ID:10728<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote BIND<br />

server, according to its version number, is vulnerable to an inverse query overflow. An<br />

attacker may use this flaw to gain a root shell on this host.<br />

Solution: Upgrade to BIND 8.1.2 or newer<br />

DNS Server Detection<br />

CVE-1999-0009<br />

<strong>PVS</strong> ID: 1016 FAMILY: DNS Servers RISK: LOW NESSUS ID:11002<br />

Description: An authoritative DNS server is running on this port.<br />

Solution: If you do not use it, disable it.<br />

CVE Not available<br />

DNS Server Zone Transfer Allowed<br />

<strong>PVS</strong> ID: 1017 FAMILY: DNS Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10595<br />

Description: Synopsis :\n\nThe remote DNS server allows zone transfers\n\nA succesful zone transfer<br />

was just observed. An attacker may use the zone information to discover sensitive<br />

information about hosts on your network.<br />

Solution: Verify that you only allow zone transfers to authorized hosts.<br />

CVE-1999-0532<br />

RPC Status (rpc.statd) Service In Use<br />

<strong>PVS</strong> ID: 1018 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC status service (rpc.statd).<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 263


RPC rstatd Service In Use<br />

<strong>PVS</strong> ID: 1019 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC rstatd (rstat, rup, perfmeter, rstat_svc) service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC rusers Service In Use<br />

<strong>PVS</strong> ID: 1020 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC rusers service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC NFS Service In Use<br />

<strong>PVS</strong> ID: 1021 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC NFS (nfsprog) service. Ensure any shared filesystems<br />

are properly configured and require authenticated to access.<br />

Solution: N/A<br />

CVE Not available<br />

RPC NIS ypserv Service In Use<br />

<strong>PVS</strong> ID: 1022 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC NIS Yellow Pages service (ypserv, ypprog).<br />

Solution: N/A<br />

CVE Not available<br />

RPC mountd Service In Use<br />

<strong>PVS</strong> ID: 1023 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC mountd (mount, showmount) service.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 264


RPC NIS ypbind Service In Use<br />

<strong>PVS</strong> ID: 1024 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC NIS Yellow Pages ypbind service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC walld Service In Use<br />

<strong>PVS</strong> ID: 1025 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC walld (rwall, shutdown) service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC NIS yppasswd Service In Use<br />

<strong>PVS</strong> ID: 1026 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC NIS Yellow Pages yppasswd service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC etherstatd Service In Use<br />

<strong>PVS</strong> ID: 1027 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC etherstatd service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC rquotad Service In Use<br />

<strong>PVS</strong> ID: 1028 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC rquotad (rquotaprog, quota, rquota) service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC sprayd Service In Use<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 265


<strong>PVS</strong> ID: 1029 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC sprayd service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC 3270_mapper Service In Use<br />

<strong>PVS</strong> ID: 1030 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC 3270_mapper service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC rje_mapper Service In Use<br />

<strong>PVS</strong> ID: 1031 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC rje_mapper service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC selection_svc Service In Use<br />

<strong>PVS</strong> ID: 1032 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC selection_svc (selnsvc) service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC database_svc Service In Use<br />

<strong>PVS</strong> ID: 1033 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC database_svc service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC rexd Service In Use<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1034 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 266


Description: The remote host is running the RPC rexd service.<br />

Solution: N/A<br />

RPC alis Service In Use<br />

CVE Not available<br />

<strong>PVS</strong> ID: 1035 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC alis service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC sched Service In Use<br />

<strong>PVS</strong> ID: 1036 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC sched service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC llockmgr Service In Use<br />

<strong>PVS</strong> ID: 1037 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC llockmgr service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC nlockmgr Service In Use<br />

<strong>PVS</strong> ID: 1038 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC nlockmgr service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC x25.inr Service In Use<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1039 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 267


Description: The remote host is running the RPC x25.inr service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC statmon Service In Use<br />

<strong>PVS</strong> ID: 1040 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC statmon service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC bootparam Service In Use<br />

<strong>PVS</strong> ID: 1041 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC bootparam service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC NIS ypupdated Service In Use<br />

<strong>PVS</strong> ID: 1042 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC NIS Yellow Pages ypupdated service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC keyserv Service In Use<br />

<strong>PVS</strong> ID: 1043 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC keyserv service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC sunlink_mapper Service In Use<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1044 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 268


Description: The remote host is running the RPC sunlink_mapper service.<br />

Solution: N/A<br />

RPC tfsd Service In Use<br />

CVE Not available<br />

<strong>PVS</strong> ID: 1045 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC tfsd service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC nsed Service In Use<br />

<strong>PVS</strong> ID: 1046 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC nsed service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC nsemntd Service In Use<br />

<strong>PVS</strong> ID: 1047 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC nsemntd service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC showfhd Service In Use<br />

<strong>PVS</strong> ID: 1048 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC showfhd service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC ioadmd Service In Use<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1049 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 269


Description: The remote host is running the RPC ioadmd (rpc.ioadmd) service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC NETlicense Service In Use<br />

<strong>PVS</strong> ID: 1050 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC NETlicense service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC sunisamd Service In Use<br />

<strong>PVS</strong> ID: 1051 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC sunisamd service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC debug_svc Service In Use<br />

<strong>PVS</strong> ID: 1052 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC debug_svc service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC NIS ypxfrd Service In Use<br />

<strong>PVS</strong> ID: 1053 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC NIS Yellow Pages map transfer server (rpc.ypxfrd)<br />

service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC bugtraqd Service In Use<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1054 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 270


Description: The remote host is running the RPC bugtraqd service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC kerbd Service In Use<br />

<strong>PVS</strong> ID: 1055 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC kerbd service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC SunNet Manager event Service In Use<br />

<strong>PVS</strong> ID: 1056 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC event (na.event - SunNet Manager) service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC SunNet Manager logger Service In Use<br />

<strong>PVS</strong> ID: 1057 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC logger (na.logger - SunNet Manager) service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC SunNet sync Service In Use<br />

<strong>PVS</strong> ID: 1058 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC SunNet sync (na.sync) service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC hostperf Service In Use<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1059 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 271


Description: The remote host is running the RPC hostperf (na.hostperf) service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC SunNet Manager activity Service In Use<br />

<strong>PVS</strong> ID: 1060 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC activity (na.activity - SunNet Manager) service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC hostmem Service In Use<br />

<strong>PVS</strong> ID: 1061 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC hostmem (na.hostmem) service<br />

Solution: N/A<br />

CVE Not available<br />

RPC sample Service In Use<br />

<strong>PVS</strong> ID: 1062 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC sample (na.sample) service.<br />

Solution: N/A<br />

RPC x25 Service In Use<br />

CVE Not available<br />

<strong>PVS</strong> ID: 1063 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC sample (na.x25) service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC ping Service In Use<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1064 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 272


Description: The remote host is running the RPC ping (na.ping) service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC NFS (na.rpcnfs) Service In Use<br />

<strong>PVS</strong> ID: 1065 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC NFS (na.rpcnfs) service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC hostif Service In Use<br />

<strong>PVS</strong> ID: 1066 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC hostif (na.hostif) service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC etherif Service In Use<br />

<strong>PVS</strong> ID: 1067 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC etherif (na.etherif) service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC iproutes Service In Use<br />

<strong>PVS</strong> ID: 1068 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC iproutes (na.iproutes) service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC layers Service In Use<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1069 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 273


Description: The remote host is running the RPC layers (na.layers) service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC snmp Service In Use<br />

<strong>PVS</strong> ID: 1070 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC snmp (na.snmp, snmp-cmc, snmp-synoptics,<br />

snmp-unisys, snmp-utk) service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC traffic Service In Use<br />

<strong>PVS</strong> ID: 1071 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC traffic (na.traffic) service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC nfs_acl Service In Use<br />

<strong>PVS</strong> ID: 1072 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC nfs_acl service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC sadmind Service In Use<br />

<strong>PVS</strong> ID: 1073 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC sadmind service.<br />

Solution: N/A<br />

RPC nisd Service In Use<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1074 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 274


Description: The remote host is running the RPC nisd (rpc.nisd) service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC NIS nispasswd Service In Use<br />

<strong>PVS</strong> ID: 1075 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC NIS nispasswd (rpc.nispasswd) service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC ufsd Service In Use<br />

<strong>PVS</strong> ID: 1076 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC ufsd service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC pcnfsd Service In Use<br />

<strong>PVS</strong> ID: 1077 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC pcnfsd service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC amd Service In Use<br />

<strong>PVS</strong> ID: 1078 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC amd (amq) service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC sgi_fam Service In Use<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1079 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 275


Description: The remote host is running the RPC sgi_fam (fam) service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC bwnfsd Service In use<br />

<strong>PVS</strong> ID: 1080 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC bwnfsd service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC fypxfrd Service In Use<br />

<strong>PVS</strong> ID: 1081 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC fypxfrd (freebsd-ypxfrd) service.<br />

Solution: N/A<br />

CVE Not available<br />

RPC portmapper Service In Use<br />

<strong>PVS</strong> ID: 1082 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RPC portmapper (portmap, sunrpc, rpcbind) service.<br />

Solution: N/A<br />

CVE Not available<br />

Superflous NFS Daemon Detection<br />

<strong>PVS</strong> ID: 1083 FAMILY: RPC RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running an unused NFS daemon.<br />

Solution: Disable this service.<br />

CVE Not available<br />

RPC status Service In Use<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1084 FAMILY: RPC RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 276


Description: The remote host is running the RPC status service.<br />

Solution: N/A<br />

CVE Not available<br />

Cyrus IMAP Server login Command Remote Overflow<br />

<strong>PVS</strong> ID: 1085 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:11196<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nAccording to its<br />

banner, the remote Cyrus IMAP server is vulnerable to a pre-login buffer overrun. An<br />

attacker without a valid login could exploit this, and would be able to execute arbitrary<br />

commands as the owner of the Cyrus process. This would allow full access to all users'<br />

mailboxes. More information : http://online.securityfocus.com/archive/1/301864<br />

Solution: If possible, upgrade to an unaffected version. However, at the time of writing no official fix<br />

was available. There is a source patch against 2.1.10 in the Bugtraq report.<br />

IMAP Server Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 1086 FAMILY: IMAP Servers RISK: INFO NESSUS ID:11414<br />

Description: An IMAP server is running on this port. According to the banner, it is :\n %L<br />

Solution: N/A<br />

CVE Not available<br />

UoW imapd (UW-IMAP) Multiple Command Remote Overflows<br />

<strong>PVS</strong> ID: 1087 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:10625<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThere is a buffer<br />

overflow in the remote IMAP4 server which allows an authenticated user to obtain a<br />

remote shell.<br />

Solution: upgrade your imap server or use another one<br />

CVE-2000-0284<br />

UoW imapd (UW-IMAP) BODY Request Remote Overflow<br />

<strong>PVS</strong> ID: 1088 FAMILY: IMAP Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10966<br />

Family Internet Services 277


Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThere is a buffer<br />

overflow in the remote imap server which allows an authenticated user to obtain a remote<br />

shell. By supplying an overly long tag the the BODY command, an attacker may gain a<br />

shell on this host.<br />

Solution: Upgrade to imap-2001a<br />

CVE-2002-0379<br />

Atrium MERCUR Mailserver Local Traversal Arbitrary File Access<br />

<strong>PVS</strong> ID: 1089 FAMILY: IMAP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10382<br />

Description: Synopsis :\n\nThe remote system is vulnerable to an information disclosure flaw\n\nThe<br />

remote imap server is Mercur Mailserver 3.20. There is a flaw in this server (present up to<br />

version 3.20.02) which allows any authenticated user to read any file on the system. This<br />

includes other users mailboxes, or any system file. Warning : this flaw has not been<br />

actually checked but was deduced from the server banner<br />

Solution: There was no solution ready when this vulnerability was written; Please contact the vendor<br />

for updates that address this vulnerability.<br />

CVE-2000-0318<br />

Ipswitch IMail 5.0 Multiple Remote Overflows<br />

<strong>PVS</strong> ID: 1090 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:10123<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nA buffer overflow in<br />

the remote IMAP server allows an intruder to execute arbitrary code on this host.<br />

Solution: Upgrade your IMAP server to the newest version.<br />

CVE-1999-1557<br />

Yak! FTP Server Default Credentials<br />

<strong>PVS</strong> ID: 1091 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote FTP Server is running with known default credentials\n\nYak<br />

uses the FTP protocol to transfer files. Yak UserID and/or password may be a static value.<br />

Versions prior to 2.1.0 have known default credentials. An attacker can use this flaw to<br />

send arbitrary data to client machines.<br />

Solution: Change the password for the default 'Yak' account.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 278


Netscape Messaging Server IMAP LIST Command Remote Overflow<br />

<strong>PVS</strong> ID: 1092 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:10580<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThere may be a buffer<br />

overflow in the remote imap server which allows an authenticated user to obtain a remote<br />

shell.<br />

Solution: Upgrade to the latest version.<br />

CVE-2000-0961<br />

UoW imapd (UW-IMAP) Multiple Command Remote Overflows<br />

<strong>PVS</strong> ID: 1093 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:10374<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThere is a buffer<br />

overflow in the remote imap server which allows an authenticated user to obtain a remote<br />

shell.<br />

Solution: Upgrade imap-2000 or higher.<br />

CVE-2000-0284<br />

MDaemon IMAP Service CREATE Command Mailbox Name Handling Overflow<br />

<strong>PVS</strong> ID: 1094 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:11577<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nIt is possible to crash<br />

the remote MDaemon server by supplying an oversized argument to the CREATE imap<br />

command. An attacker may use this flaw to prevent other users from fetching their email. It<br />

will also crash other MDaemon services (SMTP, POP), thus preventing this server from<br />

receiving any email as well, or even to execute arbitrary code on this host with the<br />

privileges of the mdaemon IMAP daemon.<br />

Solution: Upgrade to MDaemon 6.7.10 or later.<br />

CVE-2003-1470<br />

Mozilla IMAP Client literal_size Remote Overflow<br />

<strong>PVS</strong> ID: 1095 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote e-mail<br />

client is Mozilla 1.3 or 1.4a which is vulnerable to a boundary condition error whereby a<br />

malicious IMAP server may be able to crash or execute code on the client.<br />

Solution: Upgrade to either 1.3.1 or 1.4a.<br />

CVE-2003-0298<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 279


Microsoft Outlook Express IMAP Client literal_size Remote Overflow<br />

<strong>PVS</strong> ID: 1096 FAMILY: IMAP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote<br />

e-mail client is Microsoft Outlook Express 6.00.2800.1106 which is vulnerable to<br />

a boundary condition error whereby a malicious IMAP server may be able to crash<br />

or execute code on the client.<br />

Solution: Install latest OE service pack.<br />

CVE-2003-0301<br />

QUALCOMM Eudora IMAP Client literal_size Remote Overflow<br />

<strong>PVS</strong> ID: 1097 FAMILY: IMAP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote e-mail<br />

client is Eudora 5.2.1 which is vulnerable to a boundary condition error whereby a<br />

malicious IMAP server may be able to crash or execute code on the client.<br />

Solution: Contact vendor or upgrade to latest version.<br />

CVE-2003-0302<br />

Sylpheed IMAP Client literal_size Remote Overflow<br />

<strong>PVS</strong> ID: 1098 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote e-mail<br />

client is Sylpheed 0.8.11 which is vulnerable to a boundary condition error whereby a<br />

malicious IMAP server may be able to crash or execute code on the client.<br />

Solution: Upgrade to latest version.<br />

CVE-2003-0300<br />

Pine c-client IMAP Client literal_size Remote Overflow<br />

<strong>PVS</strong> ID: 1099 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote e-mail<br />

client is Pine 4.53 which is vulnerable to a boundary condition error whereby a malicious<br />

IMAP server may be able to crash or execute code on the client.<br />

Solution: Upgrade to latest version of Pine.<br />

CVE-2003-0297<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 280


E-mail Client Detection<br />

<strong>PVS</strong> ID: 1100 FAMILY: SMTP Clients RISK: NONE NESSUS ID:Not Available<br />

Description: The remote host is running the following e-mail client: %L<br />

Solution: N/A<br />

CVE Not available<br />

UoW imapd (UW-IMAP) AUTHENTICATE Command Remote Overflow<br />

<strong>PVS</strong> ID: 1101 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:10292<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote UW-IMAP<br />

server has a buffer overflow bug when it processes the argument of the AUTHENTICATE<br />

command. An attacker may exploit this flaw to gain a root shell on this host<br />

Solution: Upgrade uw-imap to its latest version.<br />

CVE-1999-0005<br />

WinRoute Proxy Detection<br />

<strong>PVS</strong> ID: 1102 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote proxy may pass local user credentials to a malicious external<br />

website\n\nThe remote client is utilizing a WinRoute Proxy. Some versions of this proxy<br />

have a bug wherein client Proxy authorization is forwarded to remote web servers. As a<br />

result, a malicious web server can retrieve the user's Proxy UserID and password. Versions<br />

of Winroute up to 5.1.4 are affected by this vulnerability.<br />

Solution: Upgrade to 5.1.4 or later.<br />

CVE Not available<br />

Weak SSL Ciphers Supported<br />

<strong>PVS</strong> ID: 1103 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10863<br />

Description: Synopsis :\n\nThe remote SSL server is configured to use weak encryption\n\nThe SSL<br />

server allows clients to connect using weak (export grade) Ciphers. As these ciphers are<br />

more easily cracked or hijacked, there is the potential of a remote session being taken over<br />

or observed. There is a risk of potential loss of confidential data.<br />

Solution: Disable weak ciphers on the TLS/SSL server.<br />

CVE Not available<br />

Weak SSL Ciphers Supported<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 281


<strong>PVS</strong> ID: 1104 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10863<br />

Description: Synopsis :\n\nThe remote SSL Server is configured to use weak encryption\n\nThe SSL<br />

server allows clients to connect using weak (export grade) Ciphers. As these ciphers are<br />

more easily cracked or hijacked, there is the potential of a remote session being taken over<br />

or observed. There is a risk of potential loss of confidential data.<br />

Solution: Disable weak ciphers on the TLS/SSL server.<br />

CVE Not available<br />

Weak SSL Ciphers Supported<br />

<strong>PVS</strong> ID: 1105 FAMILY: Web Servers RISK: LOW NESSUS ID:10863<br />

Description: Synopsis :\n\nThe remote SSL Server is configured to use weak encryption\n\nThe SSL<br />

server allows clients to connect using weak (export grade) Ciphers. As these ciphers are<br />

more easily cracked or hijacked, there is the potential of a remote session being taken over<br />

or observed. There is a risk of potential loss of confidential data.<br />

Solution: Disable weak ciphers on the TLS/SSL server.<br />

CVE Not available<br />

Internet Key Exchange (IKE) Server Detection<br />

<strong>PVS</strong> ID: 1106 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11935<br />

Description: The remote host seems to be enabled to do Internet Key Exchange (IKE). This is typically<br />

indicative of a VPN server. VPN servers are used to connect remote hosts into internal<br />

resources. You should ensure that: the VPN is authorized for your Companies computing<br />

environment, the VPN utilizes strong encryption and that the VPN utilizes strong<br />

authentication.<br />

Solution: Contact your VPN vendor to ensure that you are operating at a security level commensurate<br />

with the assets being protected.<br />

CVE Not available<br />

Cisco IOS Version Detection<br />

<strong>PVS</strong> ID: 1107 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Cisco IOS version %L<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 282


SQL Server Cleartext 'sa' Account NULL Password Attempted Login<br />

<strong>PVS</strong> ID: 1108 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote client attempted to log into a SQL database with the 'sa' password set to NULL<br />

Solution: Ensure that the client is authorized and running with the proper encryption and<br />

authentication schemes for your Corporate environment.<br />

CVE Not available<br />

SQL Server Cleartext 'sa' Account 'sa' Password Attempted Login<br />

<strong>PVS</strong> ID: 1109 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote client attempted to log into a SQL database with the 'sa' password set to 'sa'<br />

Solution: Ensure that the client is authorized and running with the proper encryption and<br />

authentication schemes for your Corporate environment.<br />

CVE Not available<br />

SQL Server Cleartext 'sa' Account 'password' Password Attempted Login<br />

<strong>PVS</strong> ID: 1110 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote client attempted to log into a SQL database with the 'sa' password set to<br />

'password'<br />

Solution: Ensure that the client is authorized and running with the proper encryption and<br />

authentication schemes for your Corporate environment<br />

CVE Not available<br />

SQL Server Cleartext 'sa' Account 'administrator' Password Attempted Login<br />

<strong>PVS</strong> ID: 1111 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote client attempted to log into a SQL database with the 'sa' password set to<br />

'administrator'<br />

Solution: Ensure that the client is authorized and running with the proper encryption and<br />

authentication schemes for your Corporate environment.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

SQL Server Cleartext 'sa' Account 'admin' Password Attempted Login<br />

Family Internet Services 283


<strong>PVS</strong> ID: 1112 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote client attempted to log into a SQL database with the 'sa' password set to 'admin'<br />

Solution: Ensure that the client is authorized and running with the proper encryption and<br />

authentication schemes for your Corporate environment.<br />

CVE Not available<br />

SQL Server Cleartext 'admin' Account 'administrator' Password Attempted Login<br />

<strong>PVS</strong> ID: 1113 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote client attempted to log into a SQL database with the 'admin' password set to<br />

'administrator'<br />

Solution: Ensure that the client is authorized and running with the proper encryption and<br />

authentication schemes for your Corporate environment.<br />

CVE Not available<br />

SQL Server Cleartext 'admin' Account 'password' Password Attempted Login<br />

<strong>PVS</strong> ID: 1114 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote client attempted to log into a SQL database with the 'admin' password set to<br />

'password'<br />

Solution: Ensure that the client is authorized and running with the proper encryption and<br />

authentication schemes for your Corporate environment.<br />

CVE Not available<br />

SQL Server Cleartext 'admin' Account 'admin' Password Attempted Login<br />

<strong>PVS</strong> ID: 1115 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote client attempted to log into a SQL database with the 'admin' password set to<br />

'admin'<br />

Solution: Ensure that the client is authorized and running with the proper encryption and<br />

authentication schemes for your Corporate environment<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

SQL Server Cleartext 'probe' Account 'probe' Password Attempted Login<br />

Family Internet Services 284


<strong>PVS</strong> ID: 1116 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote client attempted to log into a SQL database with the 'probe' password set to<br />

'probe'<br />

Solution: Ensure that the client is authorized and running with the proper encryption and<br />

authentication schemes for your Corporate environment<br />

CVE Not available<br />

SQL Server Cleartext 'probe' Account 'password' Password Attempted Login<br />

<strong>PVS</strong> ID: 1117 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote client attempted to log into a SQL database with the 'probe' password set to<br />

'password'<br />

Solution: Ensure that the client is authorized and running with the proper encryption and<br />

authentication schemes for your Corporate environment.<br />

CVE Not available<br />

SQL Server Cleartext 'sql' Account 'sql' Password Attempted Login<br />

<strong>PVS</strong> ID: 1118 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote client attempted to log into a SQL database with the 'sql' password set to 'sql'<br />

Solution: Ensure that the client is authorized and running with the proper encryption and<br />

authentication schemes for your Corporate environment.<br />

CVE Not available<br />

SQL Server Cleartext 'sa' Account 'sql' Password Attempted Login<br />

<strong>PVS</strong> ID: 1119 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote client attempted to log into a SQL database with the 'sa' password set to 'sql'<br />

Solution: Ensure that the client is authorized and running with the proper encryption and<br />

authentication schemes for your Corporate environment<br />

CVE Not available<br />

SNMP Version 3 Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1120 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 285


Description: The remote host responds to SNMP v3 queries. It is likely that the host is configured for<br />

remote administration.<br />

Solution: Ensure that the instance of SNMP is configured within corporate standards and security<br />

policies.<br />

CVE Not available<br />

SQL Server Cleartext 'sa' Account 'NULL' Password Authentication<br />

<strong>PVS</strong> ID: 1121 FAMILY: Database RISK: HIGH NESSUS ID:10862<br />

Description: Synopsis :\n\nThe remote database has set the Administrator password to NULL\n\nThe<br />

remote SQL server allows logins with the 'sa' password set to NULL<br />

Solution: Require the SQL server to utilize an encrypted login and ensure that passwords are not<br />

trivially guessed.<br />

CVE Not available<br />

SQL Server Cleartext 'sa' Account 'sa' Password Authentication<br />

<strong>PVS</strong> ID: 1122 FAMILY: Database RISK: HIGH NESSUS ID:10862<br />

Description: Synopsis :\n\nThe remote database is configured with easily guessed (or default)<br />

Administrative passwords\n\nThe remote SQL server allows logins with the 'sa' password<br />

set to 'sa'<br />

Solution: Require the SQL server to utilize an encrypted login and ensure that passwords are not<br />

trivially guessed.<br />

CVE Not available<br />

SQL Server Cleartext 'sa' Account 'password' Password Authentication<br />

<strong>PVS</strong> ID: 1123 FAMILY: Database RISK: HIGH NESSUS ID:10862<br />

Description: Synopsis :\n\nThe remote database is configured with easily guessed (or default)<br />

Administrative passwords\n\nThe remote SQL server allows logins with the 'sa' password<br />

set to 'password'<br />

Solution: Require the SQL server to utilize an encrypted login and ensure that passwords are not<br />

trivially guessed.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

SQL Server Cleartext 'sa' Account 'administrator' Password Authentication<br />

<strong>PVS</strong> ID: 1124 FAMILY: Database RISK: HIGH NESSUS ID:10862<br />

Family Internet Services 286


Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials\n\nThe remote SQL server allows logins with the 'sa' password set to<br />

'administrator'<br />

Solution: Require the SQL server to utilize an encrypted login and ensure that passwords are not<br />

trivially guessed.<br />

CVE Not available<br />

SQL Server Cleartext 'sa' Account 'admin' Password Authentication<br />

<strong>PVS</strong> ID: 1125 FAMILY: Database RISK: HIGH NESSUS ID:10862<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials\n\nThe remote SQL server allows logins with the 'sa' password set to 'admin'<br />

Solution: Require the SQL server to utilize an encrypted login and ensure that passwords are not<br />

trivially guessed.<br />

CVE Not available<br />

SQL Server Cleartext 'admin' Account 'administrator' Password Authentication<br />

<strong>PVS</strong> ID: 1126 FAMILY: Database RISK: HIGH NESSUS ID:10862<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials\n\nThe remote SQL server allows logins with the 'admin' password set to<br />

'administrator'<br />

Solution: Require the SQL server to utilize an encrypted login and ensure that passwords are not<br />

trivially guessed.<br />

CVE Not available<br />

SQL Server Cleartext 'admin' Account 'admin' Password Authentication<br />

<strong>PVS</strong> ID: 1127 FAMILY: Database RISK: HIGH NESSUS ID:10862<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials\n\nThe remote SQL server allows logins with the 'admin' password set to<br />

'admin'<br />

Solution: Require the SQL server to utilize an encrypted login and ensure that passwords are not<br />

trivially guessed.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

SQL Server Cleartext 'probe' Account 'probe' Password Authentication<br />

<strong>PVS</strong> ID: 1128 FAMILY: Database RISK: HIGH NESSUS ID:10862<br />

Family Internet Services 287


Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials\n\nThe remote SQL server allows logins with the 'probe' password set to 'probe'<br />

Solution: Require the SQL server to utilize an encrypted login and ensure that passwords are not<br />

trivially guessed.<br />

CVE Not available<br />

SQL Server Cleartext 'probe' Account 'password' Password Authentication<br />

<strong>PVS</strong> ID: 1129 FAMILY: Database RISK: HIGH NESSUS ID:10862<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials\n\nThe remote SQL server allows logins with the 'probe' password set to<br />

'password'<br />

Solution: Require the SQL server to utilize an encrypted login and ensure that passwords are not<br />

trivially guessed.<br />

CVE Not available<br />

SQL Server Cleartext 'sql' Account 'sql' Password Authentication<br />

<strong>PVS</strong> ID: 1130 FAMILY: Database RISK: HIGH NESSUS ID:10862<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials\n\nThe remote SQL server allows logins with the 'sql' password set to 'sql'<br />

Solution: Require the SQL server to utilize an encrypted login and ensure that passwords are not<br />

trivially guessed.<br />

CVE Not available<br />

SQL Server Cleartext 'sa' Account 'sql' Password Authentication<br />

<strong>PVS</strong> ID: 1131 FAMILY: Database RISK: HIGH NESSUS ID:10862<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials\n\nThe remote SQL server allows logins with the 'sa' password set to 'sql'<br />

Solution: Require the SQL server to utilize an encrypted login and ensure that passwords are not<br />

trivially guessed.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

SQL Server Cleartext 'admin' Account 'password' Password Authentication<br />

<strong>PVS</strong> ID: 1132 FAMILY: Database RISK: HIGH NESSUS ID:10862<br />

Family Internet Services 288


Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials\n\nThe remote SQL server allows logins with the 'admin' password set to<br />

'password'<br />

Solution: Require the SQL server to utilize an encrypted login and ensure that passwords are not<br />

trivially guessed.<br />

CVE Not available<br />

Web Server SSLv3 Detection<br />

<strong>PVS</strong> ID: 1133 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: The web server on this port is tunneling traffic through SSL version 3.<br />

Solution: N/A<br />

CVE Not available<br />

Web Server SSLv2 Detection<br />

<strong>PVS</strong> ID: 1134 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: The server on this port is tunneling traffic through SSL version 2.<br />

Solution: N/A<br />

CVE Not available<br />

Web Server SSLv1 Detection<br />

<strong>PVS</strong> ID: 1135 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

Description: The server on this port is tunneling traffic through SSL version 1.<br />

Solution: Disable SSLv1 in favor of stronger encryption such as TLSv1 or SSLv3.<br />

CVE Not available<br />

lftp HTTP Directory Name Handling Remote Overflow<br />

NESSUS ID:Not Available<br />

<strong>PVS</strong> ID: 1136 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe client is using a<br />

version of lftp less than 2.6.10. This version is vulnerable to a remote buffer overflow from<br />

a malicious server.<br />

Solution: Upgrade to version 2.6.10 or later.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 289


CVE-2003-0963<br />

Symantec Antivirus LiveUpdate Local Privilege Escalation<br />

<strong>PVS</strong> ID: 1137 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running an instance of Symantec Anti-virus. The host is also<br />

configured to automatically update virus signatures via LiveUPDATE. Depending<br />

on the version, this may allow a local user to gain elevated privileges.<br />

Solution: Larger companies will wish to distribute virus pattern files via a central, internal<br />

update site. For large companies, individual users accessing Internet updates will tend<br />

to decrease bandwidth and cause undue congestion on the network.<br />

CVE-2003-0994<br />

Policy - SETI@HOME Client Detection<br />

<strong>PVS</strong> ID: 1138 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software which may be considered<br />

questionable.\n\nThe remote client is running the SETI@HOME application which is used<br />

to maximize spare CPU cycles within a workstation in order to Search for Extra Terrestrial<br />

Intelligence. While it does not usually interfere with operations on the local machine, it has<br />

the possibility of taking up bandwidth while downloading work updates.<br />

Solution: Ensure that the application is allowed within your environment.<br />

CVE Not available<br />

SHOUTcast Media Server Detection<br />

<strong>PVS</strong> ID: 1139 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: The remote server is running the SHOUTcast media server: %L<br />

Solution: Ensure that this instance of SHOUTcast meets corporate and security guidelines.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Elm frm Command Mail Subject Line Handling Remote Overflow<br />

<strong>PVS</strong> ID: 1140 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

running Elm 2.5.6 or older, which contains a buffer overflow which might be triggered<br />

remotely. To exploit it, an attacker would need to send a malicious email to a user of this<br />

hosts.<br />

Solution: Upgrade to the latest version of Elm (available at http://www.instinct.org/elm).<br />

Family Internet Services 290


CVE-2003-0966<br />

Trojan/Backdoor - W32/Bagle Virus Detection<br />

<strong>PVS</strong> ID: 1141 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has a backdoor installed.\n\nThe remote host seems to be<br />

infected with the W32/Bagle virus.<br />

Solution: Using your corporate standard for Anti-virus, update your pattern files and manually scan<br />

the machine.<br />

CVE Not available<br />

TrueWeather Application Detection<br />

<strong>PVS</strong> ID: 1142 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software which may be considered<br />

questionable.\n\nTrueWeather is a program which runs on a client workstation. The<br />

program routinely polls a parent server and downloads information such as weather reports<br />

and news. The program may, under certain circumstances, take up bandwidth while<br />

downloading. A network with too many instances of TrueWeather may notice a<br />

degradation in network performance during update periods.<br />

Solution: Ensure that this application is appropriate for your environment.<br />

CVE Not available<br />

Trojan/Backdoor - MyDOOM/NoVarg Detection<br />

<strong>PVS</strong> ID: 1143 FAMILY: Backdoors RISK: HIGH NESSUS ID:12029<br />

Description: Synopsis :\n\nThe remote host has a backdoor installed.\n\nThe remote machine is infected<br />

with the MyDOOM/NoVarg virus/backdoor.<br />

Solution: Remove the virus using your Corporate standard for anti-virus.<br />

CVE Not available<br />

NTP Server Protocol Version 3 Detection<br />

<strong>PVS</strong> ID: 1144 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote server is Running an NTP (protocol version 3) server service (Stratum 2) which<br />

is used to synchronize time amongst multiple machines<br />

Solution: Ensure that this server is authorized and running in compliance with Corporate standards<br />

and <strong>Security</strong> guidelines<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 291


RADIUS Server Failed Login Detection<br />

<strong>PVS</strong> ID: 1145 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is a RADIUS server. In addition, a login into this host just failed.<br />

realtime<br />

Solution: Ensure that this server is authorized and running in compliance with corporate standards<br />

and security guidelines. Ensure that the failed logins are valid mistakes, and not malicious<br />

cracking attempts.<br />

CVE Not available<br />

NTP Server Protocol Version 1 Detection<br />

<strong>PVS</strong> ID: 1146 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote server is Running a <strong>Network</strong> Time Protocol (NTP) protocol version 1 server<br />

service (Stratum 2) which is used to synchronize time amongst multiple machines.<br />

Solution: Ensure that this server is authorized and running in compliance with corporate standards<br />

and security guidelines.<br />

CVE Not available<br />

Crob FTP Server Connection Saturation Remote DoS<br />

<strong>PVS</strong> ID: 1147 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:12060<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote CROB<br />

FTP Server is vulnerable to multiple overflows when issued standard FTP commands.<br />

Solution: Upgrade your version of CROB FTP Server.<br />

CVE-2004-0282<br />

NTP Server Protocol Version 3 Detection<br />

<strong>PVS</strong> ID: 1148 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote server is Running a <strong>Network</strong> Time Protocol (NTP) protocol version 3 server<br />

service (Stratum 1) which is used to synchronize time amongst multiple machines.<br />

Solution: Ensure that this server is authorized and running in compliance with corporate standards<br />

and security guidelines.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 292


NTP Server Protocol Version 2 Detection<br />

<strong>PVS</strong> ID: 1149 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote server is running a <strong>Network</strong> Time Protocol (NTP) protocol version 2 server<br />

service (Stratum 2) which is used to synchronize time amongst multiple machines.<br />

Solution: Ensure that this server is authorized and running in compliance with Corporate standards<br />

and <strong>Security</strong> guidelines.<br />

CVE Not available<br />

NTP Server Protocol Version 1 Detection<br />

<strong>PVS</strong> ID: 1150 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote server is running a <strong>Network</strong> Time Protocol (NTP) protocol version 1 server<br />

service (Stratum 1) which is used to synchronize time amongst multiple machines.<br />

Solution: Ensure that this server is authorized and running in compliance with Corporate standards<br />

and <strong>Security</strong> guidelines.<br />

CVE Not available<br />

NTP Server Protocol Version 2 Detection<br />

<strong>PVS</strong> ID: 1151 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote server is running a <strong>Network</strong> Time Protocol (NTP) protocol version 2 server<br />

service (Stratum 1) which is used to synchronize time amongst multiple machines.<br />

Solution: Ensure that this server is authorized and running in compliance with Corporate standards<br />

and <strong>Security</strong> guidelines.<br />

CVE Not available<br />

smallftpd Crafted RETR Command Remote Overflow DoS<br />

<strong>PVS</strong> ID: 1152 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:12072<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack\n\nThe<br />

remote FTP server (smallftpd) is vulnerable to a flaw that may allow a remote user to crash<br />

the server if the user specifies an overly long RETR command. Note that the remote user<br />

must have a valid username and password to exploit this flaw.<br />

Solution: Restrict access to trusted users.<br />

CVE-2004-0299<br />

Windows RDP / Terminal Services Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 293


<strong>PVS</strong> ID: 1153 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running Terminal Services or Remote Desktop Protocol (RDP). This<br />

protocol is used to manage remote servers and is installed, by default, on Windows XP<br />

Systems. An attacker can use this port to brute force the user accounts present on the<br />

server.<br />

Solution: Ensure that RDP is required for the machine in question.<br />

CVE-2001-0540<br />

RIP Router Version 1 Detection<br />

<strong>PVS</strong> ID: 1154 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application\n\nThe remote host is running with Routing Information Protocol (RIP) version<br />

1 enabled, an inherently insecure protocol. It is probably a router.<br />

Solution: Either upgrade the protocol version of RIP, or use another routing protocol.<br />

CVE Not available<br />

RIP Router Version 2 Detection<br />

<strong>PVS</strong> ID: 1155 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running with Routing Information Protocol (RIP) version 2<br />

enabled. It is probably a router.<br />

Solution: Ensure that the router meets the corporate policies and guidelines concerning<br />

internetworking equipment.<br />

CVE Not available<br />

Novell GroupWise Internet Mail Server Detection<br />

<strong>PVS</strong> ID: 1156 FAMILY: SMTP Servers RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Novell GroupWise mail server.<br />

Solution: Ensure that this server is running within corporate guidelines.<br />

CVE Not available<br />

NetWare Apache Web Server Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1157 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 294


Description: The remote host is running Apache web server on Novell NetWare.<br />

Solution: N/A<br />

CVE Not available<br />

eEye Retina Scanner Detection<br />

<strong>PVS</strong> ID: 1158 FAMILY: Policy<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software which may be considered<br />

questionable\n\nThe remote host is running an instance of eEye Retina vulnerability<br />

scanner.<br />

Solution: Ensure that the owner of this machine is scanning within corporate policy.<br />

CVE Not available<br />

Nessus Scanner Detection<br />

<strong>PVS</strong> ID: 1159 FAMILY: Policy<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software which may be considered<br />

questionable\n\nThe remote host is running the Nessus vulnerability scanner.<br />

Solution: Ensure that the scanner is being used in a responsible and authorized manner.<br />

CVE Not available<br />

Sami HTTP Server 1.0.4 GET Request Remote Overflow<br />

<strong>PVS</strong> ID: 1160 FAMILY: Web Servers RISK: HIGH NESSUS ID:12073<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host seems<br />

to be running Sami HTTP Server v1.0.4 or older. A vulnerability has been reported for<br />

Sami HTTP server v1.0.4. An attacker may be capable of corrupting data such as return<br />

address, and thereby control the execution flow of the program. This may result in denial of<br />

service or execution of arbitrary code.<br />

Solution: Use another web server since Sami HTTP is not maintained any more.<br />

CVE-2004-0292<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Jigsaw < 2.2.4 URI Parsing Remote Code Execution<br />

<strong>PVS</strong> ID: 1161 FAMILY: Web Servers RISK: HIGH NESSUS ID:12071<br />

Family Internet Services 295


Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host<br />

appears to be running a version of the Jigsaw web server which is older than 2.2.4. This<br />

version is vulnerable to a bug in the way it parses URI. An attacker might exploit this flaw<br />

to execute arbitrary code on this host.<br />

Solution: Upgrade to version 2.2.4 or later.<br />

CVE-2004-2274<br />

Kerberos Version 5 Server Detection<br />

<strong>PVS</strong> ID: 1162 FAMILY: Generic RISK: HIGH NESSUS ID:11512<br />

Description: The remote host is running Kerberos 5. There are several vulnerabilities associated with<br />

this software.<br />

Solution: Ensure that this instance of Kerberos is in keeping with corporate standards and security<br />

guidelines.<br />

CVE-2003-0139<br />

MIT Kerberos 4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1163 FAMILY: Generic RISK: HIGH NESSUS ID:11511<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application\n\nThe remote host is running Kerberos 4. It has been demonstrated that the<br />

Kerberos 4 protocol has inherent design flaws that make it insecure to use.<br />

Solution: Upgrade to Kerberos 5. If you run Kerberos 5 with Kerberos 4 backward compatibility,<br />

make sure you upgrade to version 1.3.<br />

CVE-2003-0139<br />

Kerberos Version 5 Server Detection<br />

<strong>PVS</strong> ID: 1164 FAMILY: Generic RISK: HIGH NESSUS ID:11512<br />

Description: The remote host is running Kerberos 5. Kerberos 5 contains multiple vulnerabilities<br />

depending on the version and configuration.<br />

Solution: Ensure that this instance of Kerberos is in keeping with Corporate standards and<br />

<strong>Security</strong> guidelines. Upgrade to the latest version if required.<br />

CVE-2002-0036<br />

SAMI FTP Server Multiple DoS<br />

<strong>PVS</strong> ID: 1165 FAMILY: FTP Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:12061<br />

Family Internet Services 296


Description: Synopsis :\n\nThe remote host is vulnerable to multiple Denial of Service (DoS)<br />

attacks\n\nThe remote host is running SAMI FTP server. There is a bug in the way some<br />

versions of this server handles certain FTP command requests which may allow an attacker<br />

to trigger a remote Denial of Service (DoS) attack against the server.<br />

Solution: Ensure that your version of SAMI FTP server is patched to the latest revision.<br />

CVE-2004-2081<br />

Xlight FTP Server < 1.53 RETR Command Remote Overflow<br />

<strong>PVS</strong> ID: 1166 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:12056<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

running XLight FTP server. There is a bug in the way this server handles arguments to the<br />

RETR command that may allow an attacker to trigger a buffer overflow against this server,<br />

potentially allowing him to disable this server remotely or to execute arbitrary code.<br />

Solution: Upgrade XLight Server to version 1.53 or later.<br />

CVE-2004-0255<br />

Apache-SSL < 1.3.29 / 1.53 SSLVerifyClient SSLFakeBasicAuth Client Certificate Forgery<br />

<strong>PVS</strong> ID: 1167 FAMILY: Web Servers RISK: HIGH NESSUS ID:12046<br />

Description: Synopsis :\n\nThe remote server is configured to allow a potential bypass of<br />

authorization\n\nThe remote host is running a version of ApacheSSL which is older than<br />

1.3.29/1.53. This version is vulnerable to a flaw which may allow an attacker to make the<br />

remote server forge a client certificate.<br />

Solution: Upgrade to version ApacheSSL 1.3.29/1.53 or later.<br />

CVE-2004-0009<br />

Serv-U FTP Server < 4.2 SITE CHMOD Command Handling Overflow<br />

<strong>PVS</strong> ID: 1168 FAMILY: FTP Servers RISK: HIGH NESSUS ID:12037<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

running Serv-U FTP server. There is a bug in the way this server handles arguments to the<br />

SITE CHMOD requests which may allow an attacker to trigger a buffer overflow against<br />

this server, which may allow him to disable this server remotely or to execute arbitrary<br />

code on this host.<br />

Solution: Upgrade Serv-U FTP Server version 4.2 or later.<br />

CVE-2004-2533<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 297


Finjan SurfinGate Proxy FHTTP Command Admin Functions Authentication Bypass<br />

<strong>PVS</strong> ID: 1169 FAMILY: Web Servers RISK: HIGH NESSUS ID:12036<br />

Description: Synopsis :\n\nThe remote proxy can be tricked into executing commands\n\nThe remote<br />

host is running a Finjan proxy. It may be possible to use this proxy and force it to connect<br />

to itself, to then issue administrative commands to this service. An attacker may use this<br />

flaw to force this proxy to restart continuously, although other administrative commands<br />

might be executable.<br />

Solution: Block all connections to '*:ControlPort'<br />

CVE-2004-2107<br />

PPTP Set-Link-Info - Setup of PPTP VPN Channel Detection<br />

<strong>PVS</strong> ID: 1170 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software which may be considered<br />

questionable\n\nThe remote host has created a PPTP VPN connection. You should ensure<br />

that this sort of connection is authorized within existing Company guidelines or policies.<br />

Solution: Block port 1723 and ensure this connection is authorized.<br />

CVE Not available<br />

HTTP Based ZIP File Download Detection<br />

<strong>PVS</strong> ID: 1171 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: An HTTP transfer of a file compressed with the ZIP algorithm was just observed. This file<br />

may contain malicious code, or content that may not be subjected to any content filtering in<br />

place. However, if the host attempting the download is a web server, email server or other<br />

server, this behavior may be indicative of a system compromise.<br />

Solution: Block all HTTP requests with content type: application/zip, and ensure a content filtering<br />

system is in place that handles ZIP compressed files.<br />

CVE Not available<br />

LDAP Server NULL Bind Detection<br />

<strong>PVS</strong> ID: 1172 FAMILY: Generic<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10723<br />

Description: Synopsis :\n\nThe remote LDAP server allows NULL connections\n\nThe remote server is<br />

an LDAP server. Further, it appears as if the server allows NULL BIND requests. If this is<br />

an internal server, then this is considered an acceptable configuration.<br />

Solution: Ensure that this server is authorized with respect to Corporate standards and policies.<br />

Family Internet Services 298


CVE Not available<br />

SMTP Server Inbound .exe Attachment Detection<br />

<strong>PVS</strong> ID: 1173 FAMILY: SMTP Servers RISK: LOW NESSUS ID:Not Available<br />

Description: <strong>PVS</strong> has noted an inbound mail message that contained a .exe attachment. CAVEAT: <strong>PVS</strong><br />

was not able to determine whether or not the SMTP server actually processed the email<br />

message.<br />

Solution: If applicable, block incoming .exe attachments. Ensure antivirus and malware<br />

detection is deployed.<br />

TFTP Server Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 1174 FAMILY: FTP Servers RISK: NONE NESSUS ID:11819<br />

Description: The remote host is running a TFTPD server. This server allows for unauthenticated file<br />

transfer to and from the host.<br />

Solution: If you do not require this TFTP service, disable it.<br />

CVE Not available<br />

TYPSoft FTP Server < 1.11 Invalid Path Request DoS<br />

<strong>PVS</strong> ID: 1175 FAMILY: FTP Servers RISK: HIGH NESSUS ID:12075<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack\n\nThe<br />

remote host seems to be running TYPSoft FTP 1.10 or earlier. TYPESoft FTP Server is<br />

prone to a remote denial of service vulnerability that may allow an attacker to cause the<br />

server to crash.<br />

Solution: Upgrade to version 1.11 or later.<br />

CVE-2004-0325<br />

Windows NT FTP Server (WFTP) Pro Server < 3.21 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1176 FAMILY: FTP Servers RISK: HIGH NESSUS ID:12083<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple issues\n\nThe remote server is<br />

running a potentially vulnerable version of WFTPD. There are at least one remote<br />

stack-based buffer overflows and two remote Denial of Service (DoS) attacks that WFTPD<br />

is vulnerable to.<br />

Solution: Upgrade to WFTP 3.21 or later.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 299


CVE-2004-0341<br />

Zebra Routing Software Detection<br />

<strong>PVS</strong> ID: 1177 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the open source Zebra routing daemon. This daemon is<br />

capable of routing RIP, OSPF, and BGP traffic.<br />

Solution: Ensure that this software is running within the boundaries of existing corporate and security<br />

policies.<br />

CVE Not available<br />

GHOST UDP <strong>Network</strong> Client Detection<br />

<strong>PVS</strong> ID: 1178 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is a GHOST client which looks for a GHOST server and, if found,<br />

downloads a bootable image at system startup.<br />

Solution: Ensure that this protocol is secured and within corporate and security policies and<br />

guidelines. This traffic should never be seen on an external (DMZ or Extranet) segment.<br />

CVS Software Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 1179 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote client is using CVS to synchronize files.<br />

Solution: Ensure that the client is operating under the guidelines as set forth by corporate and security<br />

policies. Further, examine the possibility of securing the CVS session by using CVS over<br />

SSH.<br />

CVE Not available<br />

CVS < 1.11.10 / 1.12.3 pserver Crafted Module Request Arbitrary File / Directory Creation<br />

<strong>PVS</strong> ID: 1180 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11947<br />

Description: Synopsis :\n\nThe remote host allows unauthorized users to create or modify<br />

files/directories\n\nThe remote CVS server, according to its version number, may allow an<br />

attacker to create directories and possibly files at the root of the filesystem holding the CVS<br />

repository.<br />

Solution: Upgrade CVS to 1.11.10, 1.12.3 or later.<br />

CVE-2003-0977<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 300


CVS pserver CVSROOT Passwd File Arbitrary Code Execution<br />

<strong>PVS</strong> ID: 1181 FAMILY: Generic RISK: HIGH NESSUS ID:11970<br />

Description: Synopsis :\n\nAn attacker may execute arbitrary commands on the remote system\n\nThe<br />

remote CVS server, according to its version number, might allow an attacker to execute<br />

arbitrary commands on the remote system as cvs does not drop root privileges properly.<br />

Solution: Upgrade to most recent version of CVS<br />

Witty Worm Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 1182 FAMILY: Generic RISK: HIGH NESSUS ID:11214<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

vulnerable to a series of remote vulnerabilities to the ISS IDS engine. In addition, network<br />

traffic seems to indicate that the machine was compromised by a worm (Witty) which<br />

spreads via these ISS vulnerabilities.<br />

Solution: The Witty worm corrupts the victim's hard drive. The victim Operating System must be<br />

reinstalled.<br />

CVE-2004-0362<br />

Policy - iroffer Software Detection<br />

<strong>PVS</strong> ID: 1183 FAMILY: Backdoors RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software which may be considered<br />

questionable\n\nThe remote system appears to have iroffer. This program allows the<br />

machine to be used as an IRC fileserver. Iroffer and such bots are most common in warez<br />

and illegal file transfer agents.<br />

Solution: Locate and eliminate the application serving this traffic.<br />

CVE Not available<br />

Policy - iroffer Software Detection<br />

<strong>PVS</strong> ID: 1184 FAMILY: Backdoors RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software which may be considered<br />

questionable\n\nThe remote system appears to have iroffer. This program allows the<br />

machine to be used as an IRC fileserver. Iroffer and such bots are most common in warez<br />

and illegal file transfer agents.<br />

Solution: Locate and eliminate the application serving this traffic.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 301


Policy - iroffer Software Detection<br />

<strong>PVS</strong> ID: 1185 FAMILY: Backdoors RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software which may be considered<br />

questionable\n\nThe remote system appears to have iroffer. This program allows the<br />

machine to be used as an IRC fileserver. Iroffer and such bots are most common in warez<br />

and illegal file transfer agents.<br />

Solution: Locate and eliminate the application serving this traffic.<br />

CVE Not available<br />

Policy - Time of Defiance Gaming Client Detection<br />

<strong>PVS</strong> ID: 1186 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software which may be considered<br />

questionable\n\nThe remote client is playing the Internet-based 'Time of Defiance' <strong>Network</strong><br />

strategy game.<br />

Solution: Ensure that this sort of gaming is in alignment with corporate and security standards.<br />

CVE Not available<br />

Policy - BattleField 1942 <strong>Network</strong> Gaming Server Detection<br />

<strong>PVS</strong> ID: 1187 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software which may be considered<br />

questionable\n\nThe remote Server is hosting a 'BattleField 1942' <strong>Network</strong> Game Server.<br />

Solution: Ensure that this gaming server is in alignment with corporate and security policies.<br />

CVE Not available<br />

Mutt < 1.4.2 menu.c menu_pad_string Function Index Menu Code Remote Overflow DoS<br />

<strong>PVS</strong> ID: 1188 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nMutt 1.4.1 and older<br />

versions are vulnerable to a buffer overflow vulnerabilty in the code which is used to draw<br />

menus on screen. An attacker could exploit this flaw to prevent a user from reading his mail<br />

using this client (thus corrupting a full mailbox), or possibly to execute code remotely.<br />

Solution: Upgrade to Mutt 1.4.2 or later.<br />

CVE-2004-0078<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Policy - Command and Conquer Gaming Server Detection<br />

Family Internet Services 302


<strong>PVS</strong> ID: 1189 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software which may be considered<br />

questionable\n\nThe remote host is a Command and Conquer Game Server.<br />

Solution: Ensure that this sort of gaming is in alignment with corporate and security policies<br />

CVE Not available<br />

Policy - Quake Gaming Server Detection<br />

<strong>PVS</strong> ID: 1190 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software which may be considered<br />

questionable\n\nThe remote client is a Quake gaming client. Many games utilize the<br />

'Quake' Gaming Protocol. The presence of this traffic indicates that individuals are playing<br />

network-based games.<br />

Solution: Ensure that this gaming is in alignment with corporate and security policies.<br />

CVE Not available<br />

Policy - America's Army Game Client Detection<br />

<strong>PVS</strong> ID: 1191 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software which may be considered<br />

questionable\n\nThe remote client is running the 'Americas Army' game. This is an action<br />

game which allows users to play against opponents on both the Internet and Local Area<br />

<strong>Network</strong> (LAN).<br />

Solution: Ensure that this gaming is in alignment with corporate and security policies.<br />

CVE Not available<br />

Policy - Unreal Gaming Server Detection<br />

<strong>PVS</strong> ID: 1192 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software which may be considered<br />

questionable\n\nThe remote server is acting as an Unreal Tournament Server. Depending<br />

on the configuration, Internet or LAN gaming clients can connect to the machine and play<br />

Unreal Tournament.<br />

Solution: Ensure that this gaming is in alignment with corporate and security policies.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Policy - Unreal Tournament Gaming Client Detection<br />

<strong>PVS</strong> ID: 1193 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 303


Description: Synopsis :\n\nThe remote host is running client software which may be considered<br />

questionable\n\nThe remote client is running the Unreal Tournament game.<br />

Solution: Ensure that this sort of gaming is in alignment with corporate and security policies.<br />

CVE Not available<br />

Policy - Civilization III Gaming Server Detection<br />

<strong>PVS</strong> ID: 1194 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software which may be considered<br />

questionable\n\nThe remote client is a Civilization Gaming client. The presence of this<br />

traffic indicates that individuals are playing network-based games.<br />

Solution: Ensure that this gaming is in alignment with corporate and security policies.<br />

CVE Not available<br />

FTP Based ZIP File Download Detection<br />

<strong>PVS</strong> ID: 1195 FAMILY: FTP Clients RISK: LOW NESSUS ID:Not Available<br />

Description: <strong>PVS</strong> has detected a FTP transfer of a file compressed with the ZIP algorithm. This file may<br />

contain malicious code, but probably not a direct threat. However, if the host attempting the<br />

download is a web server, email server, or other server, this behavior may be indicative of a<br />

system compromise.<br />

Solution: Deploy a FTP proxy and block all the downloads of files ending in .zip. In addition, ensure<br />

desktop computers have anti-virus software.<br />

CVE Not available<br />

BGP Routing Protocol Open Message Detection<br />

<strong>PVS</strong> ID: 1196 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is advertising the BGP routing protocol.<br />

Solution: Ensure that BGP is authorized with respect to network policies. If not needed, block access<br />

to port 179.<br />

CVE Not available<br />

Policy - Halo LAN Gaming Client Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1197 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 304


Description: Synopsis :\n\nThe remote host is running client software which may be considered<br />

questionable\n\nThe remote client is running the Halo Local Area <strong>Network</strong> (LAN) Game.<br />

Solution: Ensure that this sort of gaming is in alignement with corporate and security policies.<br />

CVE Not available<br />

Windows Media Service Server Detection<br />

<strong>PVS</strong> ID: 1198 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote server is running the Windows Media Service Server. This server is used to<br />

stream media to remote clients.<br />

Solution: You should ensure that this server is within corporate and security policies.<br />

CVE Not available<br />

BGP Keep Alive Message Detection<br />

<strong>PVS</strong> ID: 1199 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: This event signifies that a BGP speaking system is trying to maintain connectivity with<br />

other BGP systems. The traffic is benign in nature, however it does reveal who is currently<br />

speaking BGP on your network.<br />

Solution: Ensure BGP traffic is intended to be deployed on this network. Block port 179 if necessary.<br />

CVE Not available<br />

BGP Keep Alive Message Detection<br />

<strong>PVS</strong> ID: 1200 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: This event signifies that a BGP speaking system is trying to maintain connectivity with<br />

other BGP systems. The traffic is benign in nature, however it does reveal who is currently<br />

speaking BGP on your network.<br />

Solution: Ensure BGP traffic is intended to be deployed on this network. Block port 179 if necessary.<br />

CVE Not available<br />

Policy - DirectX Gaming Server Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1201 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software that may be considered<br />

questionable\n\nThe remote server is a Microsoft DirectX Game Server. You should ensure<br />

that the gaming server is in alignment with corporate and security standards.<br />

Family Internet Services 305


Solution: If not required, disable the game server.<br />

CVE Not available<br />

Trojan/Backdoor - PhatBOT Detection<br />

<strong>PVS</strong> ID: 1202 FAMILY: Generic RISK: HIGH NESSUS ID:12111<br />

Description: Synopsis :\n\nThe remote host can be remotely controlled by a malicious user\n\nThe<br />

remote systems appears to have PhatBOT installed. This program allows the machine to be<br />

controlled via a P2P network. PhatBOT is extremely sophisticated and allows the remote<br />

attacker to use the victim machine to perform various actions.<br />

Solution: Remove the trojan software from the infected machine and consider re-installing the<br />

operating system.<br />

CVE Not available<br />

Policy - HALO Internet Gaming Client Detection<br />

<strong>PVS</strong> ID: 1203 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software which may be considered<br />

questionable\n\nThe remote client is playing the Internet-based action game, HALO.<br />

HALO is a game wherein users from across the Internet can play against each other via<br />

central Internet servers.<br />

Solution: Ensure that this gaming is in alignment with corporate and security policies.<br />

CVE Not available<br />

Policy - BattleField 1942 Gaming Client Detection<br />

<strong>PVS</strong> ID: 1204 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software which may be considered<br />

questionable\n\nThe remote client is running a 'BattleField 1942' network game.<br />

Solution: Ensure that this gaming is in alignment with corporate and security policies.<br />

CVE Not available<br />

Apache HTTP Server < 2.0.49 mod_ssl Plain HTTP Request DoS<br />

<strong>PVS</strong> ID: 1205 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:12100<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack\n\nThe<br />

remote host appears to be running a version of Apache 2.x which is older than 2.0.49.<br />

There is a bug in the mod_ssl module that ships with Apache 2.0.35 to 2.0.48 that makes it<br />

vulnerable to a remote denial of service. An attacker may exploit this flaw by issuing<br />

Family Internet Services 306


malformed SSL commands when connecting to the remote host, and may therefore use it to<br />

prevent HTTPS from working.<br />

Solution: Upgrade to Apache/2.0.49 or later.<br />

CVE-2004-0113<br />

Courier < 0.45 Japanese Codeset Conversion Overflows<br />

<strong>PVS</strong> ID: 1206 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:12102<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote mail server<br />

is the Courier MTA. There is a buffer overflow in the Japanese codeset conversion<br />

functions of this software that may allow an attacker to execute arbitrary code on this host.<br />

Solution: Upgrade to Courier 0.45 or later.<br />

CVE-2004-0224<br />

Trojan/Backdoor - Agobot.FO Detection<br />

<strong>PVS</strong> ID: 1207 FAMILY: Backdoors RISK: HIGH NESSUS ID:12128<br />

Description: Synopsis :\n\nThe remote host has a backdoor installed\n\nThe remote host has the<br />

Agobot.FO backdoor installed. This backdoor is known to scan local networks for<br />

common Microsoft vulnerabilities, scan local networks for exploitable DameWare<br />

systems, brute force local Microsoft machine User accounts, connect to an IRC<br />

channel and setup a BOT for remote command execution.<br />

Solution: This backdoor should be immediately removed from the infected systems and<br />

manually cleaned.<br />

CVE Not available<br />

WU-FTPD < 2.6.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1208 FAMILY: FTP Servers RISK: HIGH NESSUS ID:12098<br />

Description: Synopsis :\n\nAn attacker may be able to access directories outside the FTP root\n\nThe<br />

remote host is running wu-ftpd 2.6.2 or older. There is a bug in this version which may<br />

allow an attacker to bypass the restricted-gid feature and gain unauthorized access to<br />

otherwise restricted directories. In addition, this version is prone to a remote overflow in<br />

the S/KEY authentication.<br />

Solution: Upgrade to wu-ftpd 2.6.3 or later.<br />

CVE-2004-0185<br />

MetaSploit Framework Web Server Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1209 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 307


Description: Synopsis :\n\nThe remote host is running client software that may be considered<br />

questionable.\n\nThe remote server is running a MetaSploit Framework server. Metasploit<br />

allows users to easily exploit and backdoor vulnerable applications via the network. The<br />

fact that there is one running on your network may be indicative of a penetration testing<br />

team or malicious individual exploiting weaknesses on the network.\nFor your information,<br />

the remote server is running %L<br />

Solution: Ensure that this server is sanctioned by policy and guidelines regarding acceptable<br />

network usage.<br />

CVE Not available<br />

Courier IMAP Server < 3.0.7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1210 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:12103<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote mail server<br />

is the Courier-IMAP imap server. Versions of Courier-IMAP prior to 3.0.7 are prone to a<br />

remote buffer overflow and a remote format string vulnerability.<br />

Solution: If applicable, upgrade to Courier-Imap 3.0.7 or later.<br />

CVE-2004-0777<br />

HP Jet Admin 7.x Traversal Arbitrary Command Execution<br />

<strong>PVS</strong> ID: 1211 FAMILY: Web Servers RISK: LOW NESSUS ID:12120<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a directory traversal flaw\n\nThe remote<br />

host is an HP Web JetAdmin server. 7.X versions of this server are vulnerable to a<br />

directory traversal attack which can reveal the contents of arbitrary files, or be used to<br />

execute arbitrary commands.<br />

Solution: Set a password for the JetAdmin and ensure that you are running the latest version of the<br />

Webserver software. In addition, the device supports IP-based Access Control Lists (ACLs)<br />

which can be used to restrict access to only valid administrators.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Squid Proxy < 2.5.STABLE6 %xx URL Encoding ACL Bypass<br />

<strong>PVS</strong> ID: 1212 FAMILY: Web Servers RISK: HIGH NESSUS ID:12124<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw which allows for the bypassing of<br />

authentication\n\nThe remote squid caching proxy, according to its version number, is<br />

vulnerable to a flaw that may allow an attacker to gain access to unauthorized resources.<br />

The flaw in itself consists of sending a malformed username containing the %00 (null)<br />

character, that may allow an attacker to access otherwise restricted resources.<br />

Solution: Upgrade to squid 2.5.STABLE6 or later.<br />

Family Internet Services 308


CVE-2004-0189<br />

Oracle Application Server Web Cache Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1213 FAMILY: Web Servers RISK: HIGH NESSUS ID:12126<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a heap overflow\n\nThe remote host is<br />

running a version of Oracle Application Server Web Cache version 9.0.4.0 or older. There<br />

is a heap overflow condition in this version of the software, that may allow an attacker to<br />

execute arbitrary code on this host. In addition, there is an unspecified issue with client<br />

request handling.<br />

Solution: See http://otn.oracle.com/deploy/security/pdf/2004alert66.pdf for vendor patch information.<br />

CVE-2004-0385<br />

Real<strong>Network</strong>s Helix Universal Server < 9.0.3 HTTP GET Request DoS<br />

<strong>PVS</strong> ID: 1214 FAMILY: Generic RISK: HIGH NESSUS ID:12210<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack\n\nHelix<br />

Universal Server versions prior to 9.0.3 are vulnerable to a trivial remote Denial of Service<br />

(DoS) attack. By sending a malformed HTTP GET request, an unauthenticated attacker can<br />

crash the service.<br />

Solution: Upgrade to version 9.0.3 or higher.<br />

CVE-2004-0389<br />

Trojan/Backdoor Detection - Sasser Worm<br />

<strong>PVS</strong> ID: 1215 FAMILY: Backdoors RISK: HIGH NESSUS ID:12219<br />

Description: Synopsis :\n\nThe remote host has a backdoor installed\n\nThe remote host is<br />

infected with the Sasser Worm. This worm utilizes a backdoor command server<br />

and FTP server on ports 5554 and 9996, respectively.<br />

realtime<br />

Solution: Use an anti-virus product to remove the worm and consider re-installing the operating<br />

system.<br />

CVE Not available<br />

rsync < 2.6.1 Traversal Arbitrary File Creation<br />

<strong>PVS</strong> ID: 1216 FAMILY: Generic<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:12230<br />

Family Internet Services 309


Description: Synopsis :\n\nThe remote host is vulnerable to a directory traversal flaw\n\nThe remote<br />

rsync server may be vulnerable to a path traversal issue.\n An attacker may use this flaw to<br />

create arbitrary files hosted outside of a module directory.<br />

Solution: Upgrade to rsync 2.6.1 or later.<br />

CVE-2004-0426<br />

SquirrelMail < 1.4.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1217 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to XSS and SQL injection flaws\n\nThe<br />

remote host is running SquirrelMail : %L . SquirrelMail is a web-based mail server.<br />

There are several flaws in all versions prior to 1.4.3 that allow for remote cross-site<br />

scripting (XSS) attacks and SQL injection attacks.<br />

Solution: Upgrade to SquirrelMail 1.4.3 or later.<br />

CVE-2004-0519<br />

Eudora Long URL Status Bar Obfuscation<br />

<strong>PVS</strong> ID: 1218 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote email client may be tricked into visiting a malicious<br />

URI\n\nEudora versions 6.0.0 through 6.1.0 are vulnerable to a URI obfuscation weakness<br />

that may hide the true contents of a link. An attacker, exploiting this bug remotely, would<br />

send an HTML email with an obfuscated link which actually redirects to a malicous or<br />

misleading web page.<br />

Solution: Upgrade to the most recent version of Eudora.<br />

CVE-2004-2649<br />

CVS < 1.11.15 / 1.12.7 Client Traversal Arbitrary File Retrieval<br />

<strong>PVS</strong> ID: 1219 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:12212<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a directory traversal flaw\n\nThe remote<br />

CVS server, according to its version number, might allow an attacker to checkout RCS<br />

archive files that are outside of the cvs root.<br />

Solution: Upgrade to CVS 1.11.15, 1.12.7 or later.<br />

CVE-2004-0405<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

CVS < 1.11.16 / 1.12.8 pserver Line Entry Handling Remote Overflow<br />

Family Internet Services 310


<strong>PVS</strong> ID: 1220 FAMILY: Generic RISK: HIGH NESSUS ID:12240<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a heap overflow\n\nThe remote CVS server,<br />

according to its version number, might allow an attacker to execute arbitrary commands on<br />

the remote system because of a heap overflow in the cvs pserver code.<br />

Solution: Upgrade to CVS 1.11.16, 1.12.8, or later.<br />

CVE-2004-0396<br />

Apache < 1.3.31 / 2.0.49 Error Log Escape Sequence Injection<br />

<strong>PVS</strong> ID: 1221 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:12239<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw in the way that it displays log<br />

files\n\nThe target host is running an Apache web server that allows for the injection of<br />

arbitrary escape sequences into its error logs. An attacker might use this vulnerability in an<br />

attempt to exploit similar vulnerabilities in terminal emulators.<br />

Solution: Upgrade to Apache version 1.3.31, 2.0.49 or newer.<br />

CVE-2003-0020<br />

Winamp Fasttracker 2 Plug-in in_mod.dll Heap Overflow<br />

<strong>PVS</strong> ID: 1222 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote client is<br />

running a version of the Nullsoft Winamp media player that may be vulnerable to a heap<br />

overflow. This vulnerability may be used to remotely crash the client or possible execute<br />

arbitrary code.<br />

Solution: Upgrade to the latest version of Winamp.<br />

CVE-2004-1896<br />

Winamp b4s File Handling Multiple Malformed Fields Overflow<br />

<strong>PVS</strong> ID: 1223 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nWinamp versions 3.0<br />

build 488 and below suffer from a vulnerability in the processing of B4S files.<br />

Solution: Upgrade to the latest version of Nullsoft's Winamp.<br />

CVE-2003-1272<br />

H323 Application Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1224 FAMILY: Generic RISK: LOW NESSUS ID:12243<br />

Family Internet Services 311


Description: The H323 protocol is used for Voice Over IP (VOIP), Microsoft NetMeeting and countless<br />

other applications. <strong>PVS</strong> was able to observe that the server is using the H323 protocol.<br />

Solution: Ensure that this device is in compliance with security and corporate policies.<br />

CVE Not available<br />

Winamp Malformed File Name Handling DoS<br />

<strong>PVS</strong> ID: 1225 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack\n\nThe<br />

remote client is running a version of the Nullsoft Winamp media player that may be<br />

vulnerable to a denial of service attack if the client is presented with a file containing an<br />

excessive number of characters and has the '.mid' extension.<br />

Solution: Upgrade to the latest version of Winamp.<br />

CVE Not available<br />

Subversion (SVN) Software Detection<br />

<strong>PVS</strong> ID: 1226 FAMILY: Generic RISK: LOW NESSUS ID:12259<br />

Description: The remote server is running 'Subversion'. Subversion is an alternative to CVS that is used<br />

to synch file revisions between multiple developers.<br />

Solution: Ensure that you are running the most recent version of Subversion.<br />

CVE Not available<br />

Subversion (SVN) apr_time_t Data Conversion Remote Overflow<br />

<strong>PVS</strong> ID: 1227 FAMILY: Generic RISK: HIGH NESSUS ID:12261<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

running subversion, an open-source file management product. According to the version<br />

number, the remote system is vulnerable to at least one remote buffer overflow.<br />

Solution: Upgrade to the latest version.<br />

CVE-2004-0397<br />

Checkpoint Firewall-1 Version Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1228 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 312


Description: The remote host is a Checkpoint Firewall version AI R55.<br />

Solution: Ensure that the firewall is configured in a manner consistent with corporate and security<br />

policies.<br />

CVE Not available<br />

Trojan/Backdoor - JS.Scob.Trojan/Download.Ject Detection<br />

<strong>PVS</strong> ID: 1229 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has a backdoor installed\n\nThe remote web server is<br />

infected with JS.Scob.Trojan or Download.Ject Trojan. This Trojan installs malicious code<br />

on all web pages and infects clients as they browse the server. Specifically, the Trojan's<br />

dropper sets it as the document footer for all pages served.<br />

Solution: Stop the IIS server and use an Antivirus product to remove the Trojan. Consider<br />

re-installing the operating system.<br />

CVE Not available<br />

Policy - GATOR Software Detection<br />

<strong>PVS</strong> ID: 1230 FAMILY: Backdoors<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11998<br />

Description: Synopsis :\n\nThe remote host is running client software which may be considered<br />

questionable\n\nThe remote host is using the GATOR program. You should ensure that the<br />

user intended to install GATOR (it is sometimes silently installed) and that the use of<br />

GATOR matches your corporate mandates and security policies.<br />

Solution: Uninstall the program manually.<br />

CVE Not available<br />

Policy - ALEXA Software Detection<br />

<strong>PVS</strong> ID: 1231 FAMILY: Backdoors RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software which may be considered<br />

questionable\n\nThe remote host is using the ALEXA program. This software is bundled by<br />

default with Internet Explorer 6. This software transmits the complete URL of the search<br />

results to both 'msn.com' and 'alexa.com', thus potentially violating the privacy of the<br />

remote user. You should ensure that the user intended to install ALEXA and that the use of<br />

ALEXA matches your corporate mandates and security policies.<br />

Solution: Remove the software manually.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 313


Policy - BARGAINBUDDY Software Detection<br />

<strong>PVS</strong> ID: 1232 FAMILY: Backdoors<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:12010<br />

Description: Synopsis :\n\nThe remote host is running client software which may be considered<br />

questionable\n\nThe remote host is using the BARGAINBUDDY program. You should<br />

ensure that the user intended to install BARGAINBUDDY (it is sometimes silently<br />

installed) and that the use of BARGAINBUDDY matches your corporate mandates and<br />

security policies.<br />

Solution: Manually uninstall the software.<br />

CVE Not available<br />

Policy - HOTBAR Software Detection<br />

<strong>PVS</strong> ID: 1233 FAMILY: Backdoors RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software which may be considered<br />

questionable\n\nThe remote host is using the HOTBAR program. You should ensure that<br />

the user intended to install HOTBAR (it is sometimes silently installed) and that the use of<br />

HOTBAR matches your corporate mandates and security policies.<br />

Solution: Manually uninstall the software.<br />

CVE Not available<br />

Policy - EZULA Software Detection<br />

<strong>PVS</strong> ID: 1234 FAMILY: Backdoors RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software which may be considered<br />

questionable\n\nThe remote host is using the EZULA program. You should ensure that the<br />

user intended to install EZULA (it is sometimes silently installed) and that the use of<br />

EZULA matches your corporate mandates and security policies.<br />

Solution: Manually uninstall the software.<br />

CVE Not available<br />

Policy - HOTBAR Software Detection<br />

<strong>PVS</strong> ID: 1235 FAMILY: Backdoors RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software which may be considered<br />

questionable\n\nThe remote host is using the HOTBAR program. You should ensure that<br />

the user intended to install HOTBAR as it is sometimes silently installed.<br />

Solution: Manually uninstall the software.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 314


CVE Not available<br />

Policy - Cydoor Topicks Sofware Detection<br />

<strong>PVS</strong> ID: 1236 FAMILY: Backdoors RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software which may be considered<br />

questionable\n\nThe remote host is using the Cydoor Topicks program. You should ensure<br />

that the user intended to install Cydoor (it is sometimes silently installed) and that the use<br />

of Cydoor matches your corporate mandates and security policies.<br />

Solution: Manually uninstall the software.<br />

CVE Not available<br />

Apache Input Header Folding Remote DoS<br />

<strong>PVS</strong> ID: 1237 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:12293<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack\n\nThe<br />

remote host appears to be running a version of Apache 2.x that is older than 2.0.50. There is<br />

denial of service in Apache httpd 2.0.x by sending a specially crafted HTTP request. It is<br />

possible to consume arbitrary amounts of memory. On 64 bit systems with more than 4GB<br />

virtual memory this may lead to heap based buffer overflow.<br />

Solution: Upgrade to most recent version of Apache.<br />

CVE-2004-0493<br />

Trojan/Backdoor - Apache mod_rootme Detection<br />

<strong>PVS</strong> ID: 1238 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'Backdoor'<br />

program\n\nThe remote system appears to be running the mod_rootme module, this module<br />

silently allows a user to gain root shell access to the machine via crafted HTTP requests.<br />

Solution: - Remove the mod_rootme module from httpd.conf/modules.conf. Consider reinstalling the<br />

computer, as it is likely to have been compromised by an intruder<br />

CVE Not available<br />

Mozilla < 1.7 Multiple Remote Overflows<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1239 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote browser is vulnerable to multiple flaws\n\nThe remote<br />

host is using the Mozilla web browser prior to version 1.7. There are several flaws<br />

within this version of Mozilla that include a remote overflow via a spoofed address<br />

bar, an overflow in the SSL certificate store, and other serious issues.<br />

Family Internet Services 315


Solution: Upgrade to Mozilla 1.7 or later.<br />

CVE-2004-0757<br />

Trojan/Backdoor - MyDoom.M Detection<br />

<strong>PVS</strong> ID: 1240 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has a backdoor installed\n\nThe remote host is infected with<br />

MyDoom.M. One of the features of MyDoom.M is to install a backdoor on port 1034. An<br />

attacker, connecting to this backdoor would be given full access to the system.<br />

Solution: Use an Antivirus program to remove this worm. Consider re-installing the operating<br />

system.<br />

CVE Not available<br />

Trojan/Backdoor - BackDoor.Zincite.A Detection<br />

<strong>PVS</strong> ID: 1241 FAMILY: Backdoors RISK: HIGH NESSUS ID:14184<br />

Description: Synopsis :\n\nThe remote host has a backdoor installed\n\nThe backdoor<br />

'BackDoor.Zincite.A' is installed on the remote host. It has probably been installed by the<br />

'MyDoom.M' virus. This backdoor may allow an attacker to gain unauthorized access on<br />

the remote host.<br />

Solution: Use an appropriate Anti-virus product to remove this backdoor. Consider re-installing the<br />

operating system.<br />

CVE Not available<br />

Microsoft Outlook Web Access (OWA) Version Detection<br />

<strong>PVS</strong> ID: 1242 FAMILY: Web Servers RISK: LOW NESSUS ID:14255<br />

Description: The remote server is running Outlook Web Access (OWA) on Exchange %L<br />

Solution: Ensure that this instance of Outlook Web Access is within corporate standards and is fully<br />

patched.<br />

CVE Not available<br />

Opera Web Browser < 7.5.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1243 FAMILY: Web Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote browser is vulnerable to multiple flaws\n\nThe remote Opera<br />

Web Browser is vulnerable to at least 20 bugs. An attacker, exploiting these flaws, would<br />

be able to execute code on the remote system. The attacker would need to be able to coerce<br />

Family Internet Services 316


the local Opera user to browse to a malicous website.<br />

Solution: Install Opera 7.5.4 or newer<br />

CVE-2004-2260<br />

AOL Instant Messenger Arbitrary File Forced Download<br />

<strong>PVS</strong> ID: 1244 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nAn attacker can silently download files to the remote AOL Client\n\nThe<br />

remote host is running AOL Instant Messenger (AIM). A vulnerability has been discovered<br />

in AIM that could allow an attacker to force a user to download an attacker supplied file. If<br />

a vulnerable user has an option enabled that allows users to download files without a<br />

prompt, it may be possible to force the user to download a file. The file will be transferred<br />

without prompting the target user for authorization.<br />

Solution: Disable the option which ignores file transfer prompts.<br />

CVE Not available<br />

AOL Instant Messenger URL href Attribute Traversal Arbitrary Local File Execution<br />

<strong>PVS</strong> ID: 1245 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nAn attacker can execute local files on the remote AOL Client\n\nThe remote<br />

host is running AOL Instant Messenger (AIM). AIM is prone to an issue that may allow<br />

attackers to execute arbitrary files on the client system. It is possible to send a malicious<br />

link that references local files to a user of the client. When the link is visited, the referenced<br />

file on the client's local filesystem will be executed. To exploit this issue, the attacker must<br />

know the exact location of the file to be executed. Additionally, there can be no spaces in<br />

the path or filename. This limits exploitability, since files must be on the same partition and<br />

command line arguments cannot be supplied. Versions other than AOL Instant Messenger<br />

4.8.2790 do not seem to be affected by this vulnerability.<br />

Solution: This issue reportedly only present in AOL Instant Messenger 4.8.2790. Users may<br />

address this issue by upgrading or downgrading to another version.<br />

CVE-2002-1813<br />

AOL Instant Messenger goim Handler Screen Name Parameter Handling Overflow<br />

<strong>PVS</strong> ID: 1246 FAMILY: Internet Messengers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack\n\nThe<br />

remote host is running AOL Instant Messenger (AIM). A problem has been reported in the<br />

handling of special characters. When a URL is sent to a user containing special characters<br />

that must be converted to addressable format, an overflow may occur. This has reportedly<br />

been able to create a Denial of Service.<br />

Family Internet Services 317


Solution: Upgrade to the latest version of AOL Instant Messenger.<br />

CVE-2002-1953<br />

AOL Instant Messenger URL refresh Tag XSS<br />

<strong>PVS</strong> ID: 1247 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote AOL Client may be coerced into running arbitrary HTML<br />

code\n\nThe remote host is running AOL Instant Messenger (AIM). AIM is prone to an<br />

issue that may allow maliciously crafted HTML to perform unauthorized actions (such as<br />

adding entries to the buddy list) on behalf of the user of a vulnerable client. This condition<br />

is due to how the client handles aim: URIs. These actions will be taken without prompting<br />

or notifying the user. This issue was reported for versions of AIM running on Microsoft<br />

Windows and MacOS. The Linux version of this client is not affected.<br />

Solution: Upgrade to the latest version of AOL Instant Messenger.<br />

CVE-2002-2169<br />

AOL Instant Messenger AddBuddy Link Long ScreenName Parameter Overflow DoS<br />

<strong>PVS</strong> ID: 1248 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

running AOL Instant Messenger (AIM). A possible buffer overflow vulnerability exists in<br />

AIM. The condition is related to processing of malformed aim:AddBuddy hyperlinks. If a<br />

victim clinks on an AddBuddy hyperlink consisting of many comma delimited screen<br />

names, a crash occurs.<br />

Solution: Upgrade to the latest version of AOL Instant Messenger<br />

CVE-2002-0785<br />

AOL Instant Messenger AddExternalApp Remote Buffer Overflow<br />

<strong>PVS</strong> ID: 1249 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

running AOL Instant Messenger (AIM). AIM is vulnerable to a buffer overflow when an<br />

AddExternalApp request is received with a TLV greater than 0x2711. This vulnerability<br />

could allow a remote user to execute arbitrary code with the privaleges of the user running<br />

the AIM client.<br />

Solution: Upgrade to the latest version of AOL Instant Messenger.<br />

CVE-2002-0005<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 318


AOL Instant Messenger Active File Transfer Hijacking<br />

<strong>PVS</strong> ID: 1250 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote client passes network data in an insecure manner\n\nThe remote<br />

host is running AOL Instant Messenger (AIM). In certain versions of AIM it is possible for<br />

a remote attacker to intercept data sent by the AIM client.<br />

Solution: Upgrade to the latest version of AOL Instant Messenger.<br />

CVE-2002-0592<br />

AOL Instant Messenger IMG Tag Arbitrary Command Execution<br />

<strong>PVS</strong> ID: 1251 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote client might allow an attacker to execute arbitrary<br />

commands\n\nThe remote host is running AOL Instant Messenger (AIM). In<br />

versions of AIM prior to and including 4.7 a remote attacker can create arbitrary<br />

files on the client's machine by sending a specially crafted message during a<br />

direct connection between the client and the attacker. In addition to being able to<br />

overwrite important files or create arbitrary files on the users system, this<br />

vulnerability may allow the attacker to execute arbitrary commands.<br />

Solution: Upgrade to the latest version of AOL Instant Messenger.<br />

CVE-2002-0591<br />

AOL Instant Messenger Multiple DoS<br />

<strong>PVS</strong> ID: 1252 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to several denial of service attacks\n\nThe<br />

remote host is running AOL Instant Messenger (AIM). Versions prior to and including 4.7<br />

of AIM contain multiple buffer overflows that may be exploited when AIM tries to process<br />

exceptionally long comment strings in chat invite messages, long filenames (game names,<br />

buddy list names...), large amounts of font types in a message, or large Buddy Icons.<br />

Exploitation of these vulnerabilities can lock up or crash a victim's AIM client leading to a<br />

denial of service attack.<br />

Solution: Upgrade to the latest version of AOL Instant Messenger<br />

CVE-2001-1421<br />

AOL Instant Messenger <<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1253 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 319


Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

running AOL Instant Messenger (AIM). Version prior to and including 4.3.2229 contain<br />

buffer overflows in the code that processes AIM URLs. URLs containing "aim://" along<br />

with exceptionally long goim and screenname parameter strings may crash a remote AIM<br />

client provided the victim clicks on the link. A victim does NOT have to be running AIM<br />

for a remote attacker to exploit this vulnerability.<br />

Solution: Upgrade to the latest version of AOL Instant Messenger.<br />

CVE-2000-1093<br />

AOL Instant Messenger Filename Handling Format String<br />

<strong>PVS</strong> ID: 1254 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to format string flaw\n\nThe remote host is<br />

running AOL Instant Messenger (AIM). Version 4.1.2010 of AIM is vulnerable to a format<br />

string attack that may exploited by an attacker to crash a victim's IM client, leading to a<br />

denial of service. The vulnerability lies in AIM's improper handling of file transfers of<br />

filenames containing "%s".<br />

Solution: Upgrade to the latest version of AOL Instant Messenger.<br />

CVE-2000-1000<br />

AOL Instant Messenger File Transfer Path Disclosure<br />

<strong>PVS</strong> ID: 1255 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote client may reveal file path information\n\nThe remote host is<br />

running AOL Instant Messenger (AIM). Version 4.0 of AIM reveals the full pathname of<br />

transferred files. This information could be used to leverage further attacks against the<br />

client's machine.<br />

Solution: Upgrade to the latest version of AOL Instant Messenger.<br />

CVE-2000-0383<br />

AOL Instant Messenger Malformed ASCII Value Message DoS<br />

<strong>PVS</strong> ID: 1256 FAMILY: Internet Messengers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a denial of service (DoS) attack\n\nThe<br />

remote host is running AOL Instant Messenger (AIM). Versions prior to and including 3.5<br />

of AIM do not properly handle coded ASCII symbols (&#XXX format) where XXX is a<br />

number greater than 255. AIM may crash if such a symbol is encountered resulting in a<br />

denial of service attack.<br />

Family Internet Services 320


Solution: Upgrade to the latest version of AOL Instant Messenger.<br />

CVE Not available<br />

AOL Instant Messenger Login Sequence Remote Overflow<br />

<strong>PVS</strong> ID: 1257 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

running AOL Instant Messenger (AIM). Certain versions of AIM contain a buffer overflow<br />

in the packet processing routines for the login process. Exploitation of this vulnerability<br />

may allow for execution of arbitrary code on the victim's machine.<br />

Solution: Upgrade to the latest version of AOL Instant Messenger.<br />

CVE Not available<br />

AOL Instant Messenger ASCII-Symbol Interpretation Denial of Service<br />

<strong>PVS</strong> ID: 1258 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

running AOL Instant Messenger (AIM). Certain versions of AIM contain a buffer overflow<br />

in the packet processing routines for the login process. Exploitation of this vulnerability<br />

may allow for execution of arbitrary code on the victims machine.<br />

Solution: Upgrade to the latest version of AOL Instant Messenger<br />

CVE Not available<br />

AOL Instant Messenger Password Encryption Weakness<br />

<strong>PVS</strong> ID: 1259 FAMILY: Internet Messengers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner\n\nThe remote host is running AOL Instant Messenger (AIM). Version 1.2 of AIM<br />

uses a very weak encryption scheme to protect user passwords. A remote attacker may<br />

determine a user's password given only the encrypted form of the password (by sniffing the<br />

login process for example).<br />

Solution: Upgrade to the latest version of AOL Instant Messenger.<br />

CVE Not available<br />

Yahoo! Messenger Shared File Access User Status Enumeration<br />

<strong>PVS</strong> ID: 1260 FAMILY: Internet Messengers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 321


Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks\n\nThe remote host is running a version of Yahoo Instant Messenger that reveals<br />

whether a user is on-line or not regardless of whether the user is marked as being<br />

"invisible". This information can be determined by trying to access the user's shared files: a<br />

different error message is reported if the user is on-line than if the user is off-line.<br />

Solution: Upgrade to the latest version of Yahoo! Messenger.<br />

CVE Not available<br />

Yahoo! Messenger ymsgr Protocol Multiple Function Overflow<br />

<strong>PVS</strong> ID: 1261 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

running a version of Yahoo Instant Messenger that is vulnerable to multiple buffer<br />

overflows in the code that processes URLs of the type "ymsgr:". By supplying a specially<br />

crafted URL a remote attacker can exploit this vulnerability to execute arbitrary code on the<br />

client's machine.<br />

Solution: Upgrade to the latest version of Yahoo Instant Messenger.<br />

CVE-2002-0031<br />

Yahoo! Messenger ymsgr URI Arbitrary Script Execution<br />

<strong>PVS</strong> ID: 1262 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a script injection flaw\n\nThe remote host is<br />

running a version of Yahoo Instant Messenger that is vulnerable to a script injection attack.<br />

It is possible to create a URL that contains the ymsgr:addview? function and which points<br />

to a webpage containing malicious code. This code will be automatically loaded and<br />

rendered by the Yahoo Client allowing for the execution of attacker supplied code that will<br />

run with the privileges of the IM client user.<br />

Solution: Upgrade to the latest version of Yahoo Instant Messenger.<br />

CVE-2002-0032<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Yahoo! Messenger ymsgr URI Arbitrary Script Execution<br />

<strong>PVS</strong> ID: 1263 FAMILY: Internet Messengers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner\n\nThe remote host is running a version of Yahoo Instant Messenger that does not<br />

encrypt user passwords when authenticating a user during login. Anyone monitoring the<br />

local segment can thus extract the passwords of the user running the client.<br />

Solution: Upgrade to the latest version of Yahoo Instant Messenger.<br />

Family Internet Services 322


CVE-2002-0322<br />

Yahoo! Messenger IMvironment Field Remote Overflow<br />

<strong>PVS</strong> ID: 1264 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack\n\nThe<br />

remote host is running Yahoo Instant Messenger. Version 5.0 of Instant Messenger is<br />

vulnerable to a Denial of Service attack, caused by a buffer overflow in the IMvironment<br />

Field. A remote attacker can send a message with a large IMvironment field and crash a<br />

local users IM client.<br />

Solution: Upgrade to the latest version of Yahoo Instant Messenger<br />

CVE-2002-0320<br />

Yahoo! Messenger Spoofed Username<br />

<strong>PVS</strong> ID: 1265 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software which allows spoofed<br />

communications\n\nThe remote host is running Yahoo Instant Messenger. Reportedly, in<br />

version 5.0 of Instant Messenger a user can spoof his or her username. A remote attacker<br />

can use this future to flood a victim with messages without being identified.<br />

Solution: Upgrade to the latest version of Yahoo Instant Messenger.<br />

CVE-2002-0321<br />

Yahoo! Messenger Message Field Remote Overflow<br />

<strong>PVS</strong> ID: 1266 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

running Yahoo Instant Messenger. Version 5.0 of instant messenger contains a buffer<br />

overflow that may be exploited by a remote attacker by sending a message with an overly<br />

large message field. An attacker would have to craft a message of this type as Yahoo clients<br />

do not limit the size of messages sent. Exploitation of this vulnerability may allow for the<br />

execution of arbitrary code on the victim's computer.<br />

Solution: Upgrade to the latest version of Yahoo Instant Messenger.<br />

CVE-2002-0320<br />

MSN Messenger Malformed Invite Request Remote DoS<br />

<strong>PVS</strong> ID: 1267 FAMILY: Internet Messengers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 323


Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack\n\nThe<br />

remote host is running Microsoft MSN Messenger. Certain versions of MSN messenger are<br />

vulnerable to a Denial of Service attack. Specifically, a message received with a malformed<br />

invite request containing HTML-encoded space characters (%20) in the Invitation-Cookie<br />

field may cause an MSN client to crash. A remote attacker may use this vulnerability to<br />

create a Denial of Service attack.<br />

Solution: Upgrade to the latest version of MSN Messenger.<br />

CVE-2002-1831<br />

MSN Messenger Malformed Font Field Remote DoS<br />

<strong>PVS</strong> ID: 1268 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack\n\nThe<br />

remote host is running Microsoft MSN Messenger. Certain versions of MSN messenger are<br />

vulnerable to a Denial of Service attack. Specifically, a message received with a large<br />

amount of data (HTML encoded spaces %20 in particular) in the font field of the message<br />

header can cause the MSN client to crash. This vulnerability can be exploited by a remote<br />

attacker to continuously crash a victim's IM client, causing a Denial of Service.<br />

Solution: Upgrade to the latest version of MSN Messenger<br />

CVE-2002-1698<br />

MSN Messenger Detection<br />

<strong>PVS</strong> ID: 1269 FAMILY: Internet Messengers RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running Microsoft MSN Messenger version %L.<br />

Solution: Ensure this software meets corporate guidelines for employee use.<br />

CVE Not available<br />

AOL Instant Messenger Detection<br />

<strong>PVS</strong> ID: 1270 FAMILY: Internet Messengers RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running AOL Instant Messenger version %L.<br />

Solution: Ensure this software meets corporate guidelines for employee use.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Yahoo! Messenger Download Feature Long Filename Overflow<br />

<strong>PVS</strong> ID: 1271 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 324


Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

running a version of Yahoo Instant Messenger that is vulnerable to a buffer overflow in the<br />

code that processes user-initiated file transfer requests. A successful attacker would be able<br />

to execute malicious code under the same privileges that Yahoo! Messenger is running<br />

under.<br />

Solution: Upgrade to the latest version of Yahoo Instant Messenger.<br />

CVE-2004-0043<br />

Yahoo! Messenger Peer To Peer File Sharing Detection<br />

<strong>PVS</strong> ID: 1272 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11993<br />

Description: The remote host is running the Yahoo! Messenger Peer To Peer application.<br />

Solution: Ensure that this activity matches corporate standards and security guidelines.<br />

CVE Not available<br />

Yahoo! Messenger Detection<br />

<strong>PVS</strong> ID: 1273 FAMILY: Internet Messengers RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running a Yahoo Instant Messenger client.<br />

Solution: Ensure this software meets corporate guidelines for employee use.<br />

CVE Not available<br />

AOL Instant Messenger aim:goaway URI Handler goaway Function Away Message Handling Remote<br />

Overflow<br />

<strong>PVS</strong> ID: 1274 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

running AOL Instant Messenger (AIM). In versions 5.5.3595 and 5.5, a remote attacker can<br />

execute arbitrary code to gain unauthorized access on the client's machine by sending a<br />

specially crafted overly long 'Away' message through a link or a malicious website.<br />

Solution: Upgrade to AOL Instant Messenger 5.9 or later.<br />

CVE-2004-0636<br />

Yahoo! Messenger Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1275 FAMILY: Internet Messengers RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 325


Description: The remote host is running Yahoo! Messenger version %L.<br />

Solution: Ensure this software meets corporate guidelines for employee use.<br />

CVE Not available<br />

Finger Service Detection<br />

<strong>PVS</strong> ID: 1276 FAMILY: Finger<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10069<br />

Description: The remote host seems to be running a finger daemon. This service provides valuable<br />

information to remote attackers, and should be disabled.<br />

Solution: Edit /etc/inetd.conf and comment out the finger line, or refer to your operating system<br />

manual for more information.<br />

CVE-1999-0612<br />

Finger Service Detection<br />

<strong>PVS</strong> ID: 1277 FAMILY: Finger<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10069<br />

Description: The remote host seems to be running a finger daemon. This service provides valuable<br />

information to attackers, and should be disabled.<br />

Solution: Edit /etc/inetd.conf and comment out the finger line, or refer to your operating system<br />

manual for more information.<br />

CVE-1999-0612<br />

cfingerd Service Detection<br />

<strong>PVS</strong> ID: 1278 FAMILY: Finger RISK: NONE NESSUS ID:10651<br />

Description: The remote host is running CFINGERd. We could determine that the version run is : %L<br />

Solution: Consider disabling this service if not required for system functionality.<br />

CVE Not available<br />

cfingerd < 1.4.4 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1279 FAMILY: Finger RISK: HIGH NESSUS ID:10652<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple issues\n\nThe remote cfinger server<br />

is vulnerable to a format string attack that may allow an attacker execute arbitrary<br />

command on this host. In addition, cfingerd has been found to be vulnerable to privilege<br />

escalation and overflow attacks.<br />

Family Internet Services 326


Solution: Upgrade to cfingerd 1.4.4 or later.<br />

CVE-2001-0609<br />

Solaris in.fingerd Crafted Request Information Disclosure<br />

<strong>PVS</strong> ID: 1280 FAMILY: Finger<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10788<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks\n\nThe remote finger server discloses the full list of its users when it receives the<br />

query "a b c d e f g h". An attacker may use this flaw to try to log in with the name of each<br />

account being displayed, hoping to find a null or trivial password.<br />

Solution: Disable the finger service.<br />

CVE-2001-1503<br />

FreeBSD 4.1.1 Finger Arbitrary File Access<br />

<strong>PVS</strong> ID: 1281 FAMILY: Finger RISK: HIGH NESSUS ID:10534<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks\n\nThe remote finger server allows anyone to read arbitrary files on this host, by<br />

requesting the file name on port 79. An attacker may use this flaw to retrieve your<br />

password file or any file readable by the fingerd process.<br />

Solution: Disable the finger service.<br />

CVE-2000-0915<br />

in.fingerd Remote Command Execution<br />

<strong>PVS</strong> ID: 1282 FAMILY: Finger RISK: HIGH NESSUS ID:10126<br />

Description: Synopsis :\n\nThe remote server allows anyone to execute arbitrary commands\n\nThe<br />

remote finger server allows anyone to execute arbitrary commands on this host by<br />

prepending a pipe in front of the name of the command to be executed. An attacker may<br />

use this flaw to gain a root shell on this host.<br />

Solution: Disable the finger service.<br />

CVE-1999-0152<br />

Qualcomm Eudora < 5.2 Long Attachment Filename Handling DoS<br />

<strong>PVS</strong> ID: 1283 FAMILY: SMTP Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 327


Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack\n\nThe<br />

remote host is running a version of the Eudora mail client that may be vulnerable to a DoS<br />

attack. Specifically, a remote user can create a DoS attack by sending a file with an<br />

exceptionally long name. This does not cause an exploitable buffer overflow but crashes<br />

the program.<br />

Solution: Upgrade to Version 5.2 or higher.<br />

CVE Not available<br />

Qualcomm Eudora File Attachment Spoofing Vulnerability<br />

<strong>PVS</strong> ID: 1284 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nBy spoofing file extensions, an attacker may be able to coerce malicious code<br />

execution\n\nThe remote client is running a version of the Eudora mail client that may be<br />

vulnerable to an issue where a remote attacker may spoof the file extension in an<br />

attachment. This may aid the attacker in enticing a user of the email client into executing<br />

malicious content, and in avoiding generating warning messages.<br />

Solution: Upgrade to the latest version of Eudora<br />

CVE-2002-2351<br />

Qualcomm Eudora MIME Multipart Boundary Buffer Overflow Vulnerability<br />

<strong>PVS</strong> ID: 1285 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote client is<br />

running a version of the Eudora mail client that may be vulnerable to a buffer overflow.<br />

This condition may occur if a MIME multipart boundary is of excessive length. Remote<br />

attackers may exploit this vulnerability to execute arbitrary code.<br />

Solution: Upgrade to the latest version of Eudora<br />

CVE-2002-0833<br />

Qualcomm Eudora WebBrowser Control Embedded Media Player File Vulnerability<br />

<strong>PVS</strong> ID: 1286 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an arbitrary 'command insertion'<br />

flaw\n\nThe remote host is running a version of the Eudora mail client that may have<br />

vulernabilities regarding how it handles attachments. Specifically if the client is using the<br />

WebBrowser control to view messages, then an attacker may be able to craft a message<br />

containing malicious code that will be run on the victims computer.<br />

Solution:<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 328


Do not use the WebBrowser control to view messages: go to Tools -> Options -> Viewing<br />

Mail and uncheck "Use Microsoft's viewer".<br />

CVE-2002-1770<br />

Qualcomm Eudora Hidden Attachment Execution Vulnerability<br />

<strong>PVS</strong> ID: 1287 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may allow attackers to run arbitrary code\n\nThe remote<br />

host is running a version of the Eudora mail client that may contain a vulnerability allowing<br />

an attacker to execute arbitrary code on the remote host even if 'allow executables in<br />

HTML content' is disabled, if the 'Use Microsoft Viewer' is enabled.<br />

Solution: Disable the 'Use Microsoft Viewer' option.<br />

CVE-2001-0365<br />

Qualcomm Eudora Client and Path Disclosure Vulnerability<br />

<strong>PVS</strong> ID: 1288 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks\n\nThe remote host is running a version of the Eudora mail client that may disclose<br />

path information in email messages under certain condtions. If a message containing an<br />

attachement is replied to (by an individual running this version of Eudora), the reply<br />

message is sent with an appended string containing the full path of the attached file<br />

revealing the directory structure of the client.<br />

Solution: Disable the 'Use Microsoft Viewer' option.<br />

CVE-2000-0874<br />

Qualcomm Eudora 4.2/4.3 Warning Message Circumvention Vulnerability<br />

<strong>PVS</strong> ID: 1289 FAMILY: SMTP Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may be tricked into running an executable file\n\nThe<br />

remote host is running a version of the Eudora mail client that doesn't properly warn when<br />

a user attempts to view an executable attachment. Specifically it doesn't give out warning<br />

messages if a user attempts to open a file that doesn't have one of the following extensions:<br />

.exe, .com, .bat. So, for example, an attacker can bypass the warnings by using a .lnk file to<br />

launch an executable.<br />

Solution: Edit the Eudora.ini file and add lnk to the WarnLaunchExtensions list or upgrade to the<br />

latest version<br />

Family Internet Services 329


CVE-2000-0874<br />

Microsoft Outlook and Outlook Express Arbitrary Program Execution Vulnerability<br />

<strong>PVS</strong> ID: 1290 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may be tricked into running an executable file\n\nThe<br />

remote host may be running a version of the Outlook mail client that will execute arbitrary<br />

programs through objects embedded in HTML email messages.<br />

Solution: Set Outlook and Outlook Express to use the Internet Explorer Restricted Sites Zone.<br />

This can be set on the <strong>Security</strong> Tab in Tools -> Options<br />

CVE-2003-1378<br />

Microsoft Outlook Express S/MIME Buffer Overflow Vulnerability<br />

<strong>PVS</strong> ID: 1291 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

running a version of Outlook Express that contains an unchecked buffer in the code that<br />

generates warning messages when certain error conditions associated with digital<br />

signatures are encountered. Execution of arbitrary code in the security context of the<br />

current user is possible.<br />

Solution: Microsoft has supplied a patch for 5.5 and 6.0 that may be downloaded from their webpage.<br />

CVE-2002-1179<br />

Microsoft Outlook Express POP Denial of Service Vulnerability<br />

<strong>PVS</strong> ID: 1292 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack\n\nThe<br />

remote host is running a version of Outlook Express that is vulnerable to a DoS attack<br />

whereby a malicious message sent to the users mailbox will halt POP mail download. This<br />

vulnerability results from Outlook incorrectly processing escaped '.' as EOM markers when<br />

the dots are contained in separate IP datagrams.<br />

Solution: Upgrade to the latest version.<br />

CVE-1999-1033<br />

Microsoft Outlook Express for MacOS HTML Attachment Automatic Download Vulnerability<br />

<strong>PVS</strong> ID: 1293 FAMILY: SMTP Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 330


Description: Synopsis :\n\nThe remote host may be tricked into downloading a malicious file\n\nThe<br />

remote host is running Outlook Express 5.0 for MacOS. This version of Express will<br />

automatically download attachments to HTML messages, without prompting the user. This<br />

weakness does not allow for a means of forcing the user to execute any code, or place files<br />

in a specific folder, but could be used in conjunction with other attacks.<br />

Solution: Upgrade to the latest version.<br />

CVE Not available<br />

Microsoft Outlook 98 / Outlook Express 4.x Long Filename Vulnerability<br />

<strong>PVS</strong> ID: 1294 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

running a version of Outlook they may be vulernable to a buffer overflow. Specifically if<br />

an attacker sends an attachment with a very long filename, they may be able to execute<br />

arbitrary code and/or crash the victim machine.<br />

Solution: Apply patches available from Microsoft website.<br />

CVE-2000-0415<br />

Mutt < 1.4.1 / 1.5 IMAP Remote Folder Buffer Overflow Vulnerabilities<br />

<strong>PVS</strong> ID: 1295 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote<br />

host is running a version of the Mutt email client that may be vulnerable to a<br />

buffer overrun. A specially crafted folder on an IMAP server may be able to<br />

trigger these overflow conditions and cause the mutt client to crash.<br />

Solution: Upgrade to either 1.4.1 or 1.5. Patches/upgrades are available at www.mutt.org<br />

CVE-2003-0167<br />

Mutt < 1.4.1 / 1.5 UTF-7 IMAP Remote Folder Buffer Overflow Vulnerability<br />

<strong>PVS</strong> ID: 1296 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

running a version of the Mutt email client that may be vulnerable to a buffer overrun.<br />

Specifically, it has been reported that Mutt does not handle remote internationalized folders<br />

properly. Because of this, it is possible for a malicious server to launch an attack that could<br />

result in the execution of code as the mutt user.<br />

Solution: Upgrade to either 1.4.1 or 1.5. Patches/upgrades are available at www.mutt.org<br />

CVE-2003-0140<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 331


Mutt < 1.4.1 / 1.5 Address Handling Buffer Overflow Vulnerability<br />

<strong>PVS</strong> ID: 1297 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

running a version of the Mutt email client that contains a buffer overflow in the email<br />

address handling routines. Exploitation of this overflow by an attacker may allow arbitrary<br />

code execution in the context of the Mutt user.<br />

Solution: Upgrade to either 1.4.1 or 1.5. Patches/upgrades are available at www.mutt.org<br />

CVE-2002-0001<br />

Mutt < 1.4.1 / 1.5 IMAP Server Format String Vulnerability<br />

<strong>PVS</strong> ID: 1298 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a 'format string' vulnerability\n\nThe remote<br />

host is running a version of the Mutt email client that contains a format string vulnerability.<br />

Due to improper handling of input from IMAP servers, it may be possible for a malicious<br />

IMAP server to send a specially crafted message to the mutt client that will cause execution<br />

of arbitrary code in the context of the mutt user.<br />

Solution: Upgrade to either 1.4.1 or 1.5. Patches/upgrades are available at www.mutt.org<br />

CVE Not available<br />

Mutt < 1.4.1 / 1.5 Text Enriched Handler Buffer Overflow Vulnerability<br />

<strong>PVS</strong> ID: 1299 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

running a version of the Mutt email client that contains a buffer overflow in the handling<br />

routines for the text enriched MIME type. This vulnerability may allow malicious email<br />

messages to execute code in the context of the mutt user.<br />

Solution: Upgrade to either 1.4.1 or 1.5. Patches/upgrades are available at www.mutt.org<br />

CVE Not available<br />

Elm Alternative Folder Buffer Overflow Vulnerability<br />

<strong>PVS</strong> ID: 1300 FAMILY: SMTP Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

running Elm 2.4 PL3 which contains a buffer overflow accessible by passing a long string<br />

to the -f (Alternative-Folder) command-line option.<br />

Family Internet Services 332


Solution: Upgrade to the latest version of Elm (available at www.instinct.org/elm)<br />

Pegasus Mail <<br />

CVE Not available<br />

<strong>PVS</strong> ID: 1301 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Pegasus 3.11 mail client which contains a vulnerability, where if more than<br />

approximately 90KB of binary data is placed in the body of a message, an overflow will<br />

occur, causing the program to crash and/or allowing for the execution of arbitrary code.<br />

Solution: Upgrade to the latest version of Pegasus.<br />

Pegasus Mail <<br />

CVE-2000-0931<br />

<strong>PVS</strong> ID: 1302 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may be tricked into uploading confidential files to a<br />

malicious webserver.\n\nThe remote host is running the Pegasus 3.12c mail client. This<br />

version contains a vulnerability whereby a malicious website operator may be able to<br />

obtain copies of known files on a remote system if a website visitor is running the 3.12c<br />

version of the Pegasus client.<br />

Solution: Upgrade to the latest version of Pegasus.<br />

CVE-2000-0930<br />

Pegasus Mail < 4.02 To/From Header Overflow DoS<br />

<strong>PVS</strong> ID: 1303 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running the Pegasus 4.01 mail client. Pegasus Mail 4.01 (and possibly earlier<br />

versions) are vulnerable to a Denial of Service attack caused by a buffer overflow. By<br />

sending an email message containing 259 characters or more in either the "From" or "To"<br />

message header, a remote attacker can overflow a buffer and crash the system.<br />

Solution: Upgrade to Pegasus Mail 4.02 or higher.<br />

CVE-2002-1075<br />

Lotus Notes R5 S/MIME Message Modification Warning Failure<br />

<strong>PVS</strong> ID: 1304 FAMILY: SMTP Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 333


Description: Synopsis :\n\nThe remote client does not properly flag tampered messages.\n\nThe remote<br />

host is running the Lotus Notes 5.x email client. Lotus Notes R5 client versions 5.0.5 and<br />

earlier could allow a remote attacker to send unsigned email messages as signed email<br />

messages, due to a vulnerability in the implementation of the S/MIME standard. Lotus<br />

Notes R5 client uses the S/MIME standard to securely send and receive messages with<br />

digital certificates. However, Lotus Notes fails to notify the recipient if the email being<br />

received has been tampered with. A remote attacker can corrupt signed messages in transit<br />

without the recipient being warned of the invalid signature. The message appears to the<br />

recipient as an unsigned message.<br />

Solution: No known remedy as of August 2002 however at the time of writing Lotus Notes 6.0 is<br />

available.<br />

CVE-2000-1138<br />

Lotus Notes Password Hieroglyphics Information Disclosure<br />

<strong>PVS</strong> ID: 1305 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running a Lotus Notes 4.6 or 5.x email client. The login<br />

dialogue box used by these version of Notes includes a number of security features,<br />

including a set of four hieroglyphic characters. The goal of these characters is to increase<br />

the difficulty in spoofing the login dialog. An attacker with knowledge of the expected<br />

hieroglyphic sequence for a given login may use this dialogue to perform a brute force<br />

attack. This will eliminate a number of incorrect passwords, reducing the search space by<br />

approximately a factor of two. A conventional brute force attack against the remaining<br />

possibilities will then be required.<br />

Solution: Contact vendor for an upgrade/patch.<br />

CVE Not available<br />

Ximian Evolution < 1.1.1 camel Component Man-in-the-Middle SSL Session Weakness<br />

<strong>PVS</strong> ID: 1306 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nThe remote host is running a version of the Ximian Evolution email client that<br />

may be vulnerable to a man-in-the-middle attack if the client is being used with SSL<br />

(IMAPS, SMTPS, POP3S). Evolution's camel component fails to re-authenticate previously<br />

accepted SSL certificates when reestablishing a connection. Exploitation of this<br />

vulnerability potentially allows for an attacker to intercept and/or modify SSL traffic.<br />

Solution: Upgrade to Evolution 1.1.1 or higher.<br />

CVE-2002-1471<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 334


Ximian Evolution < 1.2.3 UUEncoding Overflow DoS / Data Injection<br />

<strong>PVS</strong> ID: 1307 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack and data<br />

injection.\n\nThe remote host is running a version of the Ximian Evolution email client that<br />

may be vulnerable to a Denial of Service attack or data injection. The Evolution mail client<br />

supports uuencoded content and decodes it automatically when a message is initially<br />

parsed. An attacker may be able to send a malformed message that will crash the mail<br />

client. Because Evolution automatically decodes uuencoded messages, the presence of the<br />

malformed message may cause a Denial of Service attack as the user will be unable to<br />

remove the message from her mailbox.<br />

Solution: Upgrade to Evolution 1.2.3 or higher.<br />

CVE-2003-0130<br />

Ximian Evolution < 1.2.3 MIME image/* Content-Type Data Injection<br />

<strong>PVS</strong> ID: 1308 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may be tricked into running an executable file\n\nThe<br />

remote host is running a version of the Ximian Evolution email client that does not properly<br />

validate MIME image/* Content-Type fields. If an email message contains an image/*<br />

Content-Type, any type of data can be embedded where the image information is expected.<br />

This can be used to embed HTML tags that will be rendered by GTKHtml, bypass policies,<br />

or invoke bonobo components to handle external content types.<br />

Solution: Upgrade to Evolution 1.2.3 or higher.<br />

CVE-2003-0130<br />

Mozilla Predictable Temporary File Symbolic Link Arbitrary File Overwrite<br />

<strong>PVS</strong> ID: 1309 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a local flaw in the way that it creates<br />

temporary files.\n\nThe remote host is running a version of the Mozilla browser that<br />

follows symbolic links on lock files created in the /tmp directory, allowing a local attacker<br />

to create arbitrary files in the security context of the Mozilla user.<br />

Solution: Upgrade to the latest version of Mozilla<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Netscape/Mozilla Null Character Cookie Disclosure<br />

<strong>PVS</strong> ID: 1310 FAMILY: SMTP Clients RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 335


Description: Synopsis :\n\nThe remote client browser is vulnerable to a flaw which allows for the theft<br />

of authentication cookies.\n\nThe remote host is running a version of the Mozilla browser<br />

that could allow a remote attacker to steal cookie-based authentication information. A<br />

remote attacker could create a specially crafted URL link containing a NULL byte<br />

character string (%00) that would cause the victims cookie information to be sent to a<br />

specified hostname once the link is clicked.<br />

Solution: Upgrade to the latest version of Mozilla<br />

CVE-2002-2013<br />

Netscape/Mozilla/Galeon Local File Enumeration<br />

<strong>PVS</strong> ID: 1311 FAMILY: SMTP Clients RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running a version of the Mozilla browser that could allow a<br />

remote attacker to detect the existence of files on the local file system of the web client<br />

accessing the attackers page. The vulnerability is caused by improper handling of<br />

embedded Cascading Style-Sheet (CSS) elements in the broswer.<br />

Solution: Upgrade to the latest version of Mozilla<br />

CVE-2002-0594<br />

Netscape/Mozilla Malformed Email Newline POP3 Remote DoS<br />

<strong>PVS</strong> ID: 1312 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running a version of the Mozilla browser that is vulnerable to a Denial of<br />

Service attack. Specifically, a malformed email message may prevent the client from<br />

accessing POP3 mailboxes.<br />

Solution: Upgrade to the latest version of Mozilla or Netscape<br />

CVE-2002-2338<br />

Netscape/Mozilla Navigator Plugin Path Disclosure<br />

<strong>PVS</strong> ID: 1313 FAMILY: SMTP Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running a version of the Mozilla browser that is prone to a<br />

path-disclosure issue. Javascript may be used to communicate with the plugin. It is possible<br />

to access the filename of the plugin using JavaScript, and on some systems this also will<br />

expose the full path to the plugin. If the plugin is located in the home directory of the user,<br />

this also has the potential to disclose their username.<br />

Family Internet Services 336


Solution: Upgrade to the latest version of Mozilla or Netscape<br />

CVE Not available<br />

Mozilla JavaScript URL Host Spoofing Arbitrary Cookie Disclosure<br />

<strong>PVS</strong> ID: 1314 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote client allows malicious websites to steal 'cookie' data.\n\nThe<br />

remote host is running a version of the Mozilla browser that may allow script code to<br />

access cookie data associated with arbitrary domains. It has been reported possible to create<br />

a javascript URL which appears to start with a valid domain. Malicious script code may<br />

specify an arbitrary domain, and will be able to access cookie data associated with that<br />

domain.<br />

Solution: Upgrade to Mozilla 1.1 Beta or higher<br />

CVE-2002-2314<br />

Mozilla FTP View URL Title Tag XSS<br />

<strong>PVS</strong> ID: 1315 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a cross-site scripting (XSS) attack.\n\nThe<br />

remote host is running a version of the Mozilla browser that contains a cross-site scripting<br />

vulnerability. When viewing the contents of a FTP site as web content from a ftp:// URL,<br />

the directory name is included in the HTML representation. It is not adequately sanetized<br />

before this occurs. An attacker may embed javascript as this value between opening and<br />

closing "" tags in a FTP URLL<br />

Solution: Upgrade to the latest version of Mozilla or disable Javascript.<br />

CVE-2002-2359<br />

Mozilla OnUnload Referer Information Leakage Race Condition Information Disclosure<br />

<strong>PVS</strong> ID: 1316 FAMILY: SMTP Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running a version of the Mozilla browser that has a problem<br />

in its implementation of the JavaScript "onUnload" event handler that has the potential to<br />

leak sensitive information to websites. When other pages are launched using the event<br />

handler, the vulnerable client encapsulates the address of the next page that is visited in the<br />

HTTP referer field. The correct behavior is to include the address of the previously visited<br />

page in the HTTP referer field. Using this handler, a webpage can cause the browser to link<br />

information about the next page that was visited.<br />

Family Internet Services 337


Solution: Upgrade to the latest version of Mozilla.<br />

CVE-2002-1126<br />

Mozilla onkeypress Function XPI Installation Weakness<br />

<strong>PVS</strong> ID: 1317 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may be tricked into running an executable file.\n\nThe<br />

remote host is running a version of the Mozilla browser that contains an improper<br />

implementation of the onekeypress function for the space bar. As such, it may be possible<br />

to use a single keypress for multiple conformation, potentially allowing for the<br />

confirmation of a malicious XPI to be installed into the client.<br />

Solution: Upgrade to the latest version of Mozilla.<br />

CVE Not available<br />

Mozilla document.open() Memory Corruption Denial of Service<br />

<strong>PVS</strong> ID: 1318 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running a version of the Mozilla browser that contains a vulnerability that<br />

will result in memory corruption. This issue occurs when document.open() is called as the<br />

action to be performed when a form is submitted. Under certain circumstances, processing<br />

this data will result in memory corruption, resulting in a denial of service.<br />

Solution: Upgrade to the latest version of Mozilla.<br />

CVE Not available<br />

Mozilla Browser HTTP/HTTPS Redirection Weakness<br />

<strong>PVS</strong> ID: 1319 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote client allows malicious websites to redirect to non-secure sites<br />

without warning.\n\nThe remote host is running a version of the Mozilla browser that may<br />

not sufficiently provide users with warning information when being redirected from secure<br />

sites to other secure sites via non-secure sites. This may give users a false sense of security<br />

when browsing the Internet.<br />

Solution: Upgrade to the latest version of Mozilla.<br />

CVE Not available<br />

Mozilla POP3 Mail Handler Remote Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 338


<strong>PVS</strong> ID: 1320 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of the Mozilla browser that may contain a buffer overflow vulnerability.<br />

An integer overflow vulnerability has been reported for the Netscape/Mozilla POP3 mail<br />

handler routines. Reportedly, insufficient checks are performed on some server supplied<br />

values. An attacker may exploit this vulnerability through an attacker-controlled POP3<br />

server. By issuing a very large integer value that is used by the Netscape/Mozilla POP3<br />

mail handler, it may be possible to cause an integer overflow condition and allocate a<br />

buffer that is too small. Successful exploitation of this vulnerability may allow an attacker<br />

to obtain control over the execution of the vulnerable Mozilla process.<br />

Solution: Upgrade to the latest version of Mozilla.<br />

CVE Not available<br />

Mozilla Browser Large HTTP Header Handling Overflow<br />

<strong>PVS</strong> ID: 1321 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of the Mozilla browser that may contain a buffer overflow vulnerability.<br />

The condition occurs when HTTP responses of excessive length are received from remote<br />

servers.<br />

Solution: Upgrade to Mozilla 1.0.1, 1.1 or higher.<br />

CVE Not available<br />

Mozilla JAR File Decompression Heap Overflow<br />

<strong>PVS</strong> ID: 1322 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a heap overflow.\n\nThe remote host is<br />

running a version of the Mozilla browser that may contain a heap corruption vulnerability.<br />

A vulnerability has been discovered in the JAR URI handler used by Netscape and Mozilla.<br />

By constructing a malformed JAR file containing invalid file length information, it is<br />

possible to cause heap corruption in a vulnerable browser. When a client attempts to<br />

decompress a malicious JAR file, invalid values will be used to allocate buffer space for the<br />

inflated data. As there are no checks to prevent this, an overrun condition in the heap may<br />

occur if excessive data is decompressed.<br />

Solution: Upgrade to the latest version of Mozilla.<br />

CVE-2002-1308<br />

Mozilla Browser 'onclick' Property Cross Domain Violation<br />

<strong>PVS</strong> ID: 1323 FAMILY: SMTP Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 339


Description: Synopsis :\n\nThe remote web browser may be tricked into passing browsing information<br />

to a malicious website.\n\nThe remote host is running a version of the Mozilla browser that<br />

may allow access to information in other browser windows. Upon the execution of code<br />

through the 'onclick' property, a violation in browser security zone policy would occur that<br />

allows the original web site to view the contents of web pages in other browser windows.<br />

Solution: Upgrade to the latest version of Mozilla.<br />

CVE Not available<br />

Qualcomm Eudora Attachment Filename Handling Overflow<br />

<strong>PVS</strong> ID: 1324 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of the Eudora mail client that may be vulnerable to a buffer overflow<br />

when an attachment containing many dots is received. Exploitation of this vulnerability will<br />

crash the Eudora client and may allow for the execution of arbitrary code.<br />

Solution: Upgrade to the latest version of the mail client.<br />

CVE Not available<br />

Microsoft Outlook Remote Buffer Overflow<br />

<strong>PVS</strong> ID: 1325 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

running a version of the Microsoft Outlook mail client that may be vulnerable to a buffer<br />

overflow. Specifically, it may be possible for a malicious IMAP server to send a specially<br />

crafted message to the Outlook client that will cause the exection of arbitrary code in the<br />

security context of the user.<br />

Solution: Upgrade to the latest version of the mail client.<br />

CVE Not available<br />

Pine < 4.58 Multiple Overflows<br />

<strong>PVS</strong> ID: 1326 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an arbitrary 'command insertion'<br />

flaw.\n\nPine versions 4.56 and below suffer from a vulnerability which allows an attacker<br />

to force the client to execute the attacker's code on the client's system. This issue is easily<br />

exploitable since the client will send it's version number by default allowing an attacker to<br />

easily identify potential targets.<br />

Solution: Upgrade to Version 4.58 or higher<br />

CVE-2003-0720<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 340


Netscape/Mozilla/Galeon Long IRC Channel Name Overflow<br />

<strong>PVS</strong> ID: 1327 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of the Mozilla browser that is vulnerable to a buffer overflow.<br />

Specifically the browser will crash when handling an exceptionally long request (32kb+)<br />

for a channel. The vulnerability may be used to crash the browser and/or allow the<br />

execution of arbitrary code on the client host.<br />

Solution: Upgrade to the latest version of Mozilla<br />

CVE-2002-1126<br />

Mozilla Javascript Array Object Heap Overflow<br />

<strong>PVS</strong> ID: 1328 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a heap overflow.\n\nThe remote host is<br />

running a version of the Mozilla browser that contains a vulnerability in the JavaScript<br />

implementation. The condition is triggered when a large integer value (x40000000) is<br />

passed to the array constructor. The implementation of the array class fails to check for<br />

oversized integers, causing memory in the heap to be corrupted.<br />

Solution: Upgrade to Mozilla 1.0.1, 1.1 or disable Javascript.<br />

CVE Not available<br />

SMTP Client Return Email Address Detection<br />

<strong>PVS</strong> ID: 1329 FAMILY: SMTP Clients RISK: LOW NESSUS ID:Not Available<br />

Description: The return email address of the user operating this system is:\n %L<br />

realtime<br />

Solution: N/A<br />

CVE Not available<br />

Mozilla Mail Client Detection<br />

<strong>PVS</strong> ID: 1330 FAMILY: SMTP Clients RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running a Mozilla-based mail client<br />

Solution: N/A<br />

CVE Not available<br />

Qualcomm Eudora Mail Client Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 341


<strong>PVS</strong> ID: 1331 FAMILY: SMTP Clients RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running a version of the Eudora mail client.<br />

Solution: N/A<br />

CVE Not available<br />

Microsoft Outlook Express Mail Client Detection<br />

<strong>PVS</strong> ID: 1332 FAMILY: SMTP Clients RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running a version of the Microsoft Outlook Express mail client.<br />

Solution: N/A<br />

CVE Not available<br />

Mutt Mail Client Detection<br />

<strong>PVS</strong> ID: 1333 FAMILY: SMTP Clients RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running a version of the Mutt email client<br />

Solution: N/A<br />

CVE Not available<br />

Lotus Notes Mail Client Detection<br />

<strong>PVS</strong> ID: 1334 FAMILY: SMTP Clients RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running a Lotus Notes email client. The reported version number is: %L<br />

Solution: N/A<br />

CVE Not available<br />

Pegasus Mail Client Detection<br />

<strong>PVS</strong> ID: 1335 FAMILY: SMTP Clients RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Pegasus mail client.<br />

Solution: N/A<br />

CVE Not available<br />

Elm Mail Client Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1336 FAMILY: SMTP Clients RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 342


Description: The remote host is running an Elm mail client.<br />

Solution: N/A<br />

CVE Not available<br />

Samba Version Detection<br />

<strong>PVS</strong> ID: 1337 FAMILY: Samba RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running Samba : %L<br />

Solution: N/A<br />

CVE Not available<br />

Samba < 2.0.10 Remote Arbitrary File Overwrite<br />

<strong>PVS</strong> ID: 1338 FAMILY: Samba RISK: HIGH NESSUS ID:10786<br />

Description: Synopsis :\n\nThe remote SAMBA server allows anonymous users to gain 'root'<br />

access.\n\nThe remote Samba server is be vulnerable to a remote file creation vulnerability.<br />

This vulnerability allows an attacker overwrite arbitrary files by supplying an arbitrartily<br />

formed NetBIOS machine name to this server, and to potentially become root on this host.<br />

Solution: Upgrade to Samba 2.0.10, 2.2.0a or higher<br />

CVE-2001-1162<br />

Samba < 2.2.8 Fragment Reassembly Overflow / Arbitrary File Overwrite<br />

<strong>PVS</strong> ID: 1339 FAMILY: Samba RISK: HIGH NESSUS ID:11398<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a buffer overflow and an arbitrary file<br />

overwrite.\n\nThe remote Samba server is vulnerable to a remote buffer overflow when<br />

receiving specially crafted SMB/CIFS packets. To exploit this flaw, an attacker would need<br />

to be able to access at least one share and send a specially formated packet which would<br />

execute arbitrary code on the remote host. The remote host is running Samba version: \n<br />

%L<br />

Solution: Upgrade to Samba 2.2.8<br />

CVE-2003-0086<br />

Samba < 2.2.5 Multiple Overflows<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1340 FAMILY: Samba RISK: HIGH NESSUS ID:11113<br />

Family Internet Services 343


Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote Samba<br />

server is vulnerable to an unspecified buffer overflow, whose implications are not clear at<br />

this time.<br />

Solution: Upgrade to samba 2.2.5 or higher.<br />

CVE-2002-2196<br />

Samba-TNG < 0.3.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1341 FAMILY: Samba RISK: HIGH NESSUS ID:11442<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote<br />

Samba-TNG server is vulnerable to multiple flaws that may let an attacker gain a root shell<br />

on this host. As the version number did not change with the update, this alert might be a<br />

false positive<br />

Solution: Upgrade to Samba-TNG 0.3.1<br />

CVE-2003-0085<br />

Samba < 2.2.8a trans2.c trans2open() Function Overflow<br />

<strong>PVS</strong> ID: 1342 FAMILY: Samba RISK: HIGH NESSUS ID:11523<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote Samba<br />

server is vulnerable to a buffer overflow when it processes the function trans2open(). An<br />

attacker may exploit it to gain a root shell on this host. The remote host is running Samba<br />

version: \n %L<br />

Solution: Upgrade to Samba 2.2.8a or higher<br />

CVE-2003-0201<br />

Samba < 2.2.7 Unicode Encrypted Password Decryption Overflow<br />

<strong>PVS</strong> ID: 1343 FAMILY: Samba RISK: HIGH NESSUS ID:11168<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote Samba<br />

server is vulnerable to a buffer overflow when a client requests a password change. An<br />

attacker may use it to cause a denial of service or execute arbitrary code on this host with<br />

root privileges<br />

Solution: Upgrade to Samba 2.2.7<br />

CVE-2002-1318<br />

SNMP Public Community String<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1344 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 344


Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - public<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE-2002-0053<br />

SNMP Public Community String<br />

<strong>PVS</strong> ID: 1345 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - public<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP Private Community String<br />

<strong>PVS</strong> ID: 1346 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - private<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP Private Community String<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1347 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - private<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

Family Internet Services 345


CVE Not available<br />

SNMP ilmi Community String<br />

<strong>PVS</strong> ID: 1348 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - ilmi<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP ilmi Community String<br />

<strong>PVS</strong> ID: 1349 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - ilmi<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP ILMI Community String<br />

<strong>PVS</strong> ID: 1350 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - ILMI<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP ILMI Community String<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1351 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - ILMI<br />

Family Internet Services 346


Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP System Community String<br />

<strong>PVS</strong> ID: 1352 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - system<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP System Community String<br />

<strong>PVS</strong> ID: 1353 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - system<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP Write Community String<br />

<strong>PVS</strong> ID: 1354 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - write<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP Write Community String<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 347


<strong>PVS</strong> ID: 1355 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - write<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP all Community String<br />

<strong>PVS</strong> ID: 1356 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - all<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP all Community String<br />

<strong>PVS</strong> ID: 1357 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - all<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP Monitor Community String<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1358 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - monitor<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

Family Internet Services 348


string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP Monitor Community String<br />

<strong>PVS</strong> ID: 1359 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - monitor<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP Agent Community String<br />

<strong>PVS</strong> ID: 1360 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - agent<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP Agent Community String<br />

<strong>PVS</strong> ID: 1361 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - agent<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP Manager Community String<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1362 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 349


Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - manager<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP Manager Community String<br />

<strong>PVS</strong> ID: 1363 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - manager<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP OrigEquipMfr Community String<br />

<strong>PVS</strong> ID: 1364 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - OrigEquipMfr<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP OrigEquipMfr Community String<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1365 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - OrigEquipMfr<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

Family Internet Services 350


CVE Not available<br />

SNMP Admin Community String<br />

<strong>PVS</strong> ID: 1366 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - admin<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP Admin Community String<br />

<strong>PVS</strong> ID: 1367 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - admin<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP Default Community String<br />

<strong>PVS</strong> ID: 1368 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - default<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP Default Community String<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1369 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - default<br />

Family Internet Services 351


Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP Password Community String<br />

<strong>PVS</strong> ID: 1370 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - password<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP Password Community String<br />

<strong>PVS</strong> ID: 1371 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - password<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP Tivoli Community String<br />

<strong>PVS</strong> ID: 1372 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - tivoli<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP Tivoli Community String<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 352


<strong>PVS</strong> ID: 1373 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - tivoli<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP Openview Community String<br />

<strong>PVS</strong> ID: 1374 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - openview<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP Openview Community String<br />

<strong>PVS</strong> ID: 1375 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - openview<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP community Community String<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1376 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - community<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

Family Internet Services 353


string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP community Community String<br />

<strong>PVS</strong> ID: 1377 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - community<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP snmp Community String<br />

<strong>PVS</strong> ID: 1378 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - snmp<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP snmp Community String<br />

<strong>PVS</strong> ID: 1379 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - snmp<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP snmpd Community String<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1380 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 354


Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - snmpd<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP snmpd Community String<br />

<strong>PVS</strong> ID: 1381 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - snmpd<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP security Community String<br />

<strong>PVS</strong> ID: 1382 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - security<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP <strong>Security</strong> Community String<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1383 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - security<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

Family Internet Services 355


CVE Not available<br />

SNMP rmon Community String<br />

<strong>PVS</strong> ID: 1384 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - rmon<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP rmon Community String<br />

<strong>PVS</strong> ID: 1385 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - rmon.<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP rmon_admin Community String<br />

<strong>PVS</strong> ID: 1386 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - rmon_admin.<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP rmon_admin Community String<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1387 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - rmon_admin.<br />

Family Internet Services 356


Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP hp_admin Community String<br />

<strong>PVS</strong> ID: 1388 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - hp_admin.<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP hp_admin Community String<br />

<strong>PVS</strong> ID: 1389 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - hp_admin.<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP NoGaH$@! Community String<br />

<strong>PVS</strong> ID: 1390 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - NoGaH$@!.<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP NoGaH$@! Community String<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 357


<strong>PVS</strong> ID: 1391 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - NoGaH$@!.<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP 0392a0 Community String<br />

<strong>PVS</strong> ID: 1392 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - 0392a0.<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP 0392a0 Community String<br />

<strong>PVS</strong> ID: 1393 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - 0392a0.<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP xyzzy Community String<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1394 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - xyzzy.<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

Family Internet Services 358


string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP xyzzy Community String<br />

<strong>PVS</strong> ID: 1395 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - xyzzy.<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP agent_steal Community String<br />

<strong>PVS</strong> ID: 1396 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - agent_steal.<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP agent_steal Community String<br />

<strong>PVS</strong> ID: 1397 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - agent_steal.<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP freekevin Community String<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1398 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 359


Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - freekevin.<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP freekevin Community String<br />

<strong>PVS</strong> ID: 1399 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - freekevin.<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP fubar Community String<br />

<strong>PVS</strong> ID: 1400 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - fubar.<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP fubar Community String<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1401 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - fubar.<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

Family Internet Services 360


CVE Not available<br />

SNMP secret Community String<br />

<strong>PVS</strong> ID: 1402 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - secret.<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP secret Community String<br />

<strong>PVS</strong> ID: 1403 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - secret.<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP cisco Community String<br />

<strong>PVS</strong> ID: 1404 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - cisco.<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP cisco Community String<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1405 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - cisco<br />

Family Internet Services 361


Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP apc Community String<br />

<strong>PVS</strong> ID: 1406 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - apc<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP apc Community String<br />

<strong>PVS</strong> ID: 1407 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - apc<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP ANYCOM Community String<br />

<strong>PVS</strong> ID: 1408 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - ANYCOM<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP ANYCOM Community String<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 362


<strong>PVS</strong> ID: 1409 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - ANYCOM<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP cable-docsis Community String<br />

<strong>PVS</strong> ID: 1410 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - cable-docsis<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP cable-docsis Community String<br />

<strong>PVS</strong> ID: 1411 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - cable-docsis<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP c Community String<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1412 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - c<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

Family Internet Services 363


string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP c Community String<br />

<strong>PVS</strong> ID: 1413 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - c<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP cc Community String<br />

<strong>PVS</strong> ID: 1414 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - cc<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP cc Community String<br />

<strong>PVS</strong> ID: 1415 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - cc<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP cascade Community String<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1416 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 364


Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - cascade<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP cascade Community String<br />

<strong>PVS</strong> ID: 1417 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - cascade<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP comcomcom Community String<br />

<strong>PVS</strong> ID: 1418 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - comcomcom<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP comcomcom Community String<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1419 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - comcomcom<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

Family Internet Services 365


CVE Not available<br />

SNMP internal Community String<br />

<strong>PVS</strong> ID: 1420 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - internal<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP internal Community String<br />

<strong>PVS</strong> ID: 1421 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - internal<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP blue Community String<br />

<strong>PVS</strong> ID: 1422 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - blue<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP blue Community String<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1423 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - blue<br />

Family Internet Services 366


Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP yellow Community String<br />

<strong>PVS</strong> ID: 1424 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - yellow<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP yellow Community String<br />

<strong>PVS</strong> ID: 1425 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - yellow<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP Agent on Remote Host<br />

<strong>PVS</strong> ID: 1426 FAMILY: SNMP Traps RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software which may be considered<br />

questionable.\n\nThe remote host is running an SNMPv1 agent. Having such an agent open<br />

to outside access may be used to compromise sensitive information. Certain SNMP agents<br />

may be vulnerable to root compromise attacks.<br />

Solution: Disable insecure protocols or apps<br />

CVE Not available<br />

SNMP Agent on Remote Host<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1427 FAMILY: SNMP Traps RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 367


Description: The remote host is running an SNMPv2 agent. Having such an agent open to outside access<br />

may be used to compromise sensitive information. Certain SNMP agents may be vulnerable<br />

to root compromise attacks.<br />

Solution: N/A<br />

CVE Not available<br />

SNMP Trap Agent on Remote Host<br />

<strong>PVS</strong> ID: 1428 FAMILY: SNMP Traps<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nThe remote host is running an SNMPv1 trap agent. It is possible to<br />

overflow the SNMP traps log with fake traps (if the community names are known), causing<br />

a Denial of service.<br />

Solution: Look at alternate protocols or applications which do not blindly accept user-supplied input<br />

CVE Not available<br />

SNMP Trap Agent on Remote Host<br />

<strong>PVS</strong> ID: 1429 FAMILY: SNMP Traps RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running an SNMPv2 trap agent. It is possible to overflow the SNMP<br />

traps log with fake traps (if the community names are known), causing a denial of service.<br />

Solution: N/A<br />

CVE Not available<br />

Operating System Detection (SNMP)<br />

<strong>PVS</strong> ID: 1430 FAMILY: SNMP Traps RISK: INFO NESSUS ID:10800<br />

Description: The remote host is running an SNMPv1 agent. By evaluating SNMP requests, we can<br />

determine the OS on the remote host. Make sure that remote access is limited to this SNMP<br />

agent.<br />

Solution: Only allow valid network management devices to connect to the SNMP services on a<br />

device.<br />

CVE Not available<br />

Operating System Detection (SNMP)<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1431 FAMILY: SNMP Traps RISK: INFO NESSUS ID:10800<br />

Family Internet Services 368


Description: The remote host is running an SNMPv2 agent. Using SNMP get request, we can determine<br />

the OS on the remote host. Make sure that remote access is limited to this SNMP agent.<br />

Solution: Only allow valid network management devices to connect to the SNMP services on a<br />

device.<br />

CVE Not available<br />

<strong>Network</strong> Interfaces List Detection (SNMP)<br />

<strong>PVS</strong> ID: 1432 FAMILY: SNMP Traps<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10551<br />

Description: The remote host is running an SNMPv1 agent. Using an SNMP get request, we can<br />

determine the list of network interfaces on the remote host. An attacker may use this<br />

information to gain more knowledge about the target host.<br />

Solution: Disable SNMP service on this host if you do not use it, or filter incoming UDP packets<br />

going to this port.<br />

CVE Not available<br />

<strong>Network</strong> Interfaces List Detection (SNMP)<br />

<strong>PVS</strong> ID: 1433 FAMILY: SNMP Traps RISK: INFO NESSUS ID:10551<br />

Description: The remote host is running an SNMPv2 agent. Using an SNMP get request, we can<br />

determine the list of network interfaces on the remote host. An attacker may use this<br />

information to gain more knowledge about the target host.<br />

Solution: Disable SNMP service on this host if you do not use it, or filter incoming UDP packets<br />

going to this port.<br />

CVE Not available<br />

Wireless Access Point Detection (SNMP)<br />

<strong>PVS</strong> ID: 1434 FAMILY: SNMP Traps<br />

Description: The remote host is a wireless access point.<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11026<br />

Solution: You should ensure that the proper physical and logical controls exist around the AP.<br />

CVE Not available<br />

Wireless Access Point Detection (SNMP)<br />

<strong>PVS</strong> ID: 1435 FAMILY: SNMP Traps<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11026<br />

Family Internet Services 369


Description: The remote host is a wireless access point. The observed device name, as observed within<br />

an SNMP trap, is: \n %L<br />

Solution: You should ensure that the proper physical and logical controls exist around the AP.<br />

CVE Not available<br />

Wireless Access Point Detection (SNMP)<br />

<strong>PVS</strong> ID: 1436 FAMILY: SNMP Traps<br />

Description: The remote host is a wireless access point.<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11026<br />

Solution: You should ensure that the proper physical and logical controls exist around the AP.<br />

CVE Not available<br />

Wireless Access Point Detection (SNMP)<br />

<strong>PVS</strong> ID: 1437 FAMILY: SNMP Traps<br />

Description: The remote host is a wireless access point.<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11026<br />

Solution: You should ensure that the proper physical and logical controls exist around the AP.<br />

CVE Not available<br />

Wireless Access Point Detection (SNMP)<br />

<strong>PVS</strong> ID: 1438 FAMILY: SNMP Traps<br />

Description: The remote host is a wireless access point.<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11026<br />

Solution: You should ensure that the proper physical and logical controls exist around the AP.<br />

CVE Not available<br />

Wireless Access Point Detection (SNMP)<br />

<strong>PVS</strong> ID: 1439 FAMILY: SNMP Traps<br />

Description: The remote host is a wireless access point.<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11026<br />

Solution: You should ensure that the proper physical and logical controls exist around the AP.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 370


Wireless Access Point Detection (SNMP)<br />

<strong>PVS</strong> ID: 1440 FAMILY: SNMP Traps<br />

Description: The remote host is a wireless access point.<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11026<br />

Solution: You should ensure that the proper physical and logical controls exist around the AP.<br />

CVE Not available<br />

Wireless Access Point Detection (SNMP)<br />

<strong>PVS</strong> ID: 1441 FAMILY: SNMP Traps<br />

Description: The remote host is a wireless access point.<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11026<br />

Solution: You should ensure that the proper physical and logical controls exist around the AP.<br />

Web Server Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 1442 FAMILY: Web Servers RISK: NONE NESSUS ID:10107<br />

Description: A web server is running on this port. The server string is :\n %L<br />

Solution: N/A<br />

CVE Not available<br />

Apache < 2.0.46 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1443 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11507<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote server is running a version of Apache 2.x which is older than 2.0.45.\nThis version<br />

is vulnerable to various flaw :\n- There is a denial of service attack which may allow the<br />

attacker to disable this server remotely.\n- The httpd process leaks file descriptors to child<br />

processes such as CGI scripts. An attacker who has the ability to execute arbitrary CGI<br />

scripts on this server (include PHP code) would be able to write arbitrary data in the files<br />

pointed to (in particular the log files).<br />

Solution: Upgrade to Apache 2.0.46<br />

CVE-2003-0132<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Zope < 2.1.7 DocumentTemplate Unauthorized Modification<br />

Family Internet Services 371


<strong>PVS</strong> ID: 1444 FAMILY: Web Servers RISK: HIGH NESSUS ID:10447<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw which allows for the bypassing of<br />

authentication.\n\nThe remote web server is running a version of Zope which is older than<br />

2.1.7. There is a security problem in all the releases older than 2.1.7 which may allow the<br />

content of DTMLDocuments (or DTMLMethods) to be changed by any user without<br />

authentication.<br />

Solution: Upgrade to Zope 2.1.7 or higher.<br />

CVE-2000-0483<br />

Zope < 2.2.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1445 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10702<br />

Description: Synopsis :\n\nThe remote web server contains an application server that fails to protect<br />

stored content from modification by remote users.\n\nAccording to its banner, the remote<br />

web server is Zope < 2.2.5. Such versions suffer from security issues involving incorrect<br />

protection of a data updating method on Image and File objects. Because the method is not<br />

correctly protected, it is possible for users with DTML editing privileges to update the raw<br />

data of a File or Image object via DTML even though they do not have editing privileges<br />

on the objects themselves.<br />

Solution: Upgrade to Zope 2.2.5 or higher.<br />

CVE-2000-0483<br />

Zope < 2.3.3 ZClass Permission Mapping Modification Local Privilege Escalation<br />

<strong>PVS</strong> ID: 1446 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10777<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw which allows for the bypassing of<br />

authentication.\n\nThe remote web server is a version of Zope which is older than 2.3.3.<br />

There is a security issue in all releases prior to version 2.3.3 which allow any user to visit a<br />

ZClass declaration and change its permission mappings for methods and other objects<br />

defined within the ZClass, possibly allowing unauthorized access within the Zope instance.<br />

Solution: Update to Zope 2.3.3 or higher.<br />

CVE-2001-0567<br />

Zeus < 3.3.5a Web Server Null Byte Request CGI Source Disclosure<br />

<strong>PVS</strong> ID: 1447 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10327<br />

Family Internet Services 372


Description: Synopsis :\n\nThe remote host is vulnerable to a flaw which allows attackers to retrieve<br />

sensitive files.\n\nThe remote host is running the Zeus WebServer. Version 3.1.x to 3.3.5 of<br />

this web server are vulnerable to a bug which allows an attacker to view the source code of<br />

all the CGI scripts installed, and possibly steal credentials from them.<br />

Solution: Upgrade to Zeus Web Server 3.3.5a or higher<br />

CVE-2000-0149<br />

Webserver4everyone < 1.30 URI Overflow<br />

<strong>PVS</strong> ID: 1448 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11167<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote web<br />

server (WebServer4Everyone) is vulnerable to various buffer overflows which may allow<br />

an attacker to execute arbitrary commands on this host, with the privileges of the web<br />

daemon (typically, SYSTEM)<br />

Solution: Upgrade to version 1.30<br />

CVE-2002-1212<br />

WebsitePro


<strong>PVS</strong> ID: 1451 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11089<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote web server (WebSEAL) is vulnerable to a flaw which may allow an attacker to<br />

disable it remotely by requesting specially malformed files. An attacker may use this flaw<br />

to prevent the web server from operating properly.<br />

Solution: None<br />

CVE-2001-1191<br />

Webmin Server Detection<br />

<strong>PVS</strong> ID: 1452 FAMILY: Web Servers RISK: LOW NESSUS ID:10757<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nA Webmin server is running on this port in clear text. As webmin is a web<br />

interface to configure Unix systems, you should not let unciphered communication to be<br />

established on this service, as an attacker may sniff Webmin sessions and reuse the user<br />

passwords to take the control of this host.<br />

Solution: Force the use of SSL in the webmin configuration file.<br />

CVE Not available<br />

WebLogic Server < 6.0 SP1 Encoded Request Directory Listing<br />

<strong>PVS</strong> ID: 1453 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10698<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw which allows attackers to retrieve<br />

sensitive files.\n\nThe remote WebLogic server discloses the listing of the page directories<br />

when a user submits a URL finishing with %00, %2e, %2f or %5c. An attacker may use<br />

this flaw to view the source code of JSP files or other dynamic content.<br />

Solution: Upgrade to WebLogic 6.0 SP1<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

WebLogic Server < 5.1 SP 7 ".." URL Handling Remote Overflow DoS<br />

<strong>PVS</strong> ID: 1454 FAMILY: Web Servers RISK: HIGH NESSUS ID:10697<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote WebLogic server can be disabled remotely by requesting a long URL starting with a<br />

double dot.<br />

Solution: Upgrade to WebLogic 5.1 SP7 or higher<br />

Family Internet Services 374


CVE-2001-0098<br />

WebLogic Internal Management Servlet Authentication Bypass<br />

<strong>PVS</strong> ID: 1455 FAMILY: Web Servers RISK: HIGH NESSUS ID:11486<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw which allows for the bypassing of<br />

authentication.\n\nThe remote web server is an unpatched version of WebLogic. This<br />

version has an internal management servlet which does not properly check the user<br />

credentials and can be accessed from the outside, allowing an attacker to change the<br />

passwords of the users or even to upload or download any file on the remote server.<br />

Solution: Apply SP2 rolling patch 3 on WebLogic 6.0, service pack 4 on WebLogic 6.1 and SP2 on<br />

WebLogic 7.0<br />

CVE-2003-0151<br />

vqServer < 1.9.30 Directory Traversal File Access<br />

<strong>PVS</strong> ID: 1456 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a directory traversal flaw.\n\nThe remote<br />

web server (vqServer) is vulnerable to a directory traversal bug which may allow attackers<br />

to read arbitrary files on the remote host.<br />

Solution: Upgrade to version 1.9.30 or higher.<br />

CVE-2000-0240<br />

VisualRoute Web Server Detection<br />

<strong>PVS</strong> ID: 1457 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10744<br />

Description: Synopsis :\n\nThe remote application allows attackers to 'bounce' attacks against other<br />

networks.\n\nThe remote host is running VisualRoute, a web server allowing anyone to<br />

perform a traceroute interactively. An attacker may use this interface to perform traceroutes<br />

on third party hosts without being noticed, therefore using a VisualRoute server as a relay<br />

for their discoveries.<br />

Solution: Disable this server if you do not use it, or block its access on the firewall<br />

CVE Not available<br />

Vignette StoryServer Cross-user Session Information Disclosure<br />

<strong>PVS</strong> ID: 1458 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11526<br />

Family Internet Services 375


Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running Vignette StoryServer, a web interface to Vignette's<br />

content management suite. A flaw in the product may allow an attacker, under certain<br />

circumstances, to extract information about the sessions of other users as well as other<br />

sensitive information.<br />

Solution: A patch is available at http://support.vignette.com/VOLSS/KB/View/1,,5360,00.html<br />

CVE-2002-0385<br />

UltraSeek < 4.0 Malformed URL DoS<br />

<strong>PVS</strong> ID: 1459 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10542<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nAn<br />

attacker may be able to remotely disable this UltraSeek server by doingt a malformed<br />

request to it (as in /index.html?&col).<br />

Solution: Upgrade to UltraSeek 4.0 or higher.<br />

CVE-2000-1019<br />

UltraSeek Server Detection<br />

<strong>PVS</strong> ID: 1460 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the UltraSeek server. UltraSeek has been known to contain security vulnerabilities<br />

ranging from buffer overflows to cross-site scripting issues. It is therefore not<br />

recommended that you use it if you can do the same with another product<br />

Solution: Remove the vulnerable application<br />

CVE Not available<br />

Tripwire for WebPages Installation Disclosure<br />

<strong>PVS</strong> ID: 1461 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10743<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw which allows attackers to retrieve<br />

sensitive files.\n\nThe remote host is running TripWire for WebPages under the Apache<br />

web server. This software may allow attackers to gather sensitive information about your<br />

server configuration.<br />

Solution: Hide the TripWire information by setting the option "ServerTokens" to "ProductOnly" in<br />

httpd.conf.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 376


Apache Tomcat /status Information Disclosure<br />

<strong>PVS</strong> ID: 1462 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11218<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running the Tomcat web server, with the /status special page<br />

set. By requesting this URI, an attacker may obtain information about the status of the<br />

remote host and may also be able to reset the statistics of the server.<br />

Solution: If you do not use this feature, comment out the appropriate section in your httpd.conf file. If<br />

you really need it, limit access to the administrator's host.<br />

CVE Not available<br />

Apache Tomcat < 4.x JSP Source Code Disclosure<br />

<strong>PVS</strong> ID: 1463 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11176<br />

Description: Synopsis :\n\nThe remote web server can disclose source code.\n\nTomcat 4.0.4 and 4.1.10<br />

(and possibly earlier versions) are vulnerable to source code disclosure by using the default<br />

servlet org.apache.catalina.servlets.DefaultServlet<br />

Solution: Upgrade to version 4.0.5, 4.1.12 or higher<br />

CVE-2002-1148<br />

Apache Tomcat Snoop Servlet Remote Information Disclosure<br />

<strong>PVS</strong> ID: 1464 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10478<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote Tomcat server has the 'snoop' servlet installed. This servlet<br />

discloses valuable information about the remote host, such as the server type and version,<br />

the PATHs in use, and the kernel version of the remote host. An attacker may use this<br />

information to gain intimate knowledge about this host and make more precise attacks<br />

against it.<br />

Solution: Delete this servlet<br />

CVE-2000-0760<br />

Jakarta Tomcat < 3.2.1 Path Disclosure<br />

<strong>PVS</strong> ID: 1465 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10807<br />

Family Internet Services 377


Description: Synopsis :\n\nThe remote host allows remote attackers to determine physical file<br />

layout.\n\nThe remote Jakarta Tomcat server reveals the physical path of the remote<br />

webroot when asked for a .jsp file using a specially crafted request. An attacker may use<br />

this flaw to gain further knowledge about the remote system layout.<br />

Solution: Upgrade to Tomcat 3.2.1 or higher.<br />

CVE-2000-0759<br />

Apache Tomcat < 3.3.1a Directory Listing and File Disclosure<br />

<strong>PVS</strong> ID: 1466 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11438<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks\n\nApache Tomcat (prior to 3.3.1a) is prone to a directory listing and file disclosure<br />

vulnerability. An attacker may exploit this bug to get the listing of directories otherwise<br />

protected by an index.html file, or even to get the source code of the remote .jsp scripts.<br />

Solution: Upgrade to Tomcat 3.3.1a or higher.<br />

CVE-2003-0042<br />

Apache Tomcat < 3.3.1a Servlet Engine MS/DOS Device Name DoS<br />

<strong>PVS</strong> ID: 1467 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11150<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nIt may<br />

be possible the freeze or crash the remote Tomcat web server by making it read MS/DOS<br />

devices files through its servlet engine (ie: /examples/servlet/AUX).<br />

Solution: Upgrade to Tomcat 3.3.1a or higher.<br />

CVE-2003-0045<br />

thttpd < 2.20 ssi Servlet Traversal File Access<br />

<strong>PVS</strong> ID: 1468 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10523<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw which allows attackers to retrieve<br />

sensitive files.\n\nThe remote web server (thttpd) allows an attacker to read arbitrary files<br />

on this host, by exploiting a weakness in an included ssi package, in prepending %2e%2e/<br />

to the pathname (as in GET /cgi-bin/ssi//%2e%2e/%2e%2e/etc/passwd).<br />

Solution: Upgrade to thttpd 2.20 or higher.<br />

CVE-2000-0900<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 378


thttpd < 2.05 If-Modified-Since Header Remote Overflow<br />

<strong>PVS</strong> ID: 1469 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10286<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote thttpd<br />

server is vulnerable to a stack overflow when it is issued a malformed HTTP header. An<br />

attacker may use this bug to run arbitrary code on the remote server, with the privileges of<br />

the thttpd daemon (typically root or nobody).<br />

Solution: Upgrade to thttpd 2.05 or higher.<br />

CVE-2000-0359<br />

SWAT Server Detection<br />

<strong>PVS</strong> ID: 1470 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10273<br />

Description: The remote host is running SWAT (Samba Web Administration Tool). SWAT allows<br />

Samba users to change their passwords and provides the system administrator with an<br />

easy-to-use web interface to configure Samba. It is not recommended to let SWAT be<br />

accessed by the world, as it allows an intruder to attempt to brute force some account<br />

passwords. In addition to this, the traffic between SWAT and the web client is not ciphered,<br />

so an eavesdropper can gain cleartext passwords easily.<br />

Solution: Disable SWAT once your Samba server is configured.<br />

CVE-2000-0935<br />

Sun Cobalt Adaptative Firewall Detection<br />

<strong>PVS</strong> ID: 1471 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Sun Cobalt hosts contain a firewall mechanism, which can be configured remotely using<br />

Cobalt's built-in HTTP server. To access it, a user simply has to enter a passphrase which<br />

could possibly be brute-forced.<br />

Solution: Block incoming connections to this port<br />

CVE Not available<br />

StrongHold Web Server Detection<br />

<strong>PVS</strong> ID: 1472 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11230<br />

Description: The remote host seems to be running the StrongHold web server. This server comes with a<br />

sample script (swish) which allows a user to obtain the physical path to the remote webroot<br />

directory. It may also display system-specific information about the remote host. Note: The<br />

Family Internet Services 379


CGI was not tested for.<br />

Solution: Remove the CGI mapped behind the /search URL<br />

CVE Not available<br />

StrongHold < 3.0 build 3015 System File Disclosure<br />

<strong>PVS</strong> ID: 1473 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10803<br />

Description: The remote web server (RedHat StrongHold Web server) allows anyone to disclose<br />

sensitive system files, including httpd.conf, by requesting the URLs /stronghold-info and<br />

/stronghold-status. An attacker may use this flaw to gain a better intimate knowledge about<br />

the remote host and make more focused attacks.<br />

Solution: Upgrade to version 3.0 build 3015 or higher.<br />

CVE-2001-0868<br />

StrongHold < 3.0 build 3015 File System Disclosure<br />

<strong>PVS</strong> ID: 1474 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10803<br />

Description: The remote web server (RedHat StrongHold Web server) allows anyone to disclose<br />

sensitive system files, including httpd.conf, by requesting the URLs /stronghold-info and<br />

/stronghold-status. An attacker may use this flaw to gain a better intimate knowledge about<br />

the remote host and make more focused attacks.<br />

Solution: Upgrade to version 3.0 build 3015 or higher.<br />

CVE-2001-0868<br />

Abyss Web Server < 1.1.4 HTTP GET Header Remote DoS<br />

<strong>PVS</strong> ID: 1475 FAMILY: Web Servers RISK: HIGH NESSUS ID:11521<br />

Description: The remote Abyss web server can be disabled remotely by an attacker by sending a<br />

malformed HTTP request.<br />

Solution: Upgrade to Abyss 1.1.4 or higher.<br />

CVE-2003-1364<br />

PHP < 4.2.2 Malformed POST Requests<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1476 FAMILY: Web Servers RISK: HIGH NESSUS ID:11050<br />

Family Internet Services 380


Description: The remote host is running a version of PHP which is older than 4.2.2. This version has a<br />

bug which allows an attacker to disable the remote server or execute arbitrary code on it.<br />

Solution: Upgrade to PHP 4.2.2 or downgrade to 4.1.x<br />

CVE-2002-0986<br />

PHP < 4.3.1 CGI Module File Access<br />

<strong>PVS</strong> ID: 1477 FAMILY: Web Servers RISK: HIGH NESSUS ID:11237<br />

Description: The remote host is running PHP 4.3.0 which contains a flaw which may let anyone execute<br />

arbitrary PHP code on this host.<br />

Solution: Upgrade to PHP 4.3.1 or higher.<br />

CVE-2003-0097<br />

PHP < 3.0.17 / 4.0.3 Hidden Form Field File Upload<br />

<strong>PVS</strong> ID: 1478 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10513<br />

Description: The remote host is running a version of PHP which is older than 3.0.17 or 4.0.3. If a PHP<br />

script that allows users to upload files and then display their content is running on this host,<br />

an attacker may use it to read arbitrary files.<br />

Solution: Upgrade to PHP 3.0.17 or 4.0.3 or higher.<br />

CVE-2000-0860<br />

PHP < 4.0.4 IMAP Module Overflow<br />

<strong>PVS</strong> ID: 1479 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10628<br />

Description: The remote host is running a version of PHP which is older than 4.0.4. There is a buffer<br />

overflow in the IMAP module of this version which may allow an attacker to execute<br />

arbitrary commands with the privileges of the web server if a PHP script connects to a<br />

rogue IMAP server.<br />

Solution: Upgrade to PHP 4.0.4<br />

CVE Not available<br />

PHP < 3.0.17 / 4.0.3 Error Log Command Injection<br />

<strong>PVS</strong> ID: 1480 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10535<br />

Family Internet Services 381


Description: The remote host is running a version of PHP which is older than 3.0.17 or 4.0.3. If the<br />

option 'log_errors' is set to 'On' in php.ini, an attacker may use a bug present in this version<br />

to execute arbitrary commands on this host.<br />

Solution: Upgrade your installation of PHP to 3.0.17 or 4.0.3 or higher.<br />

CVE-2000-0967<br />

PHP < 4.2.3 Mail Function Header Spoofing<br />

<strong>PVS</strong> ID: 1481 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11444<br />

Description: The remote web server is running a version of PHP which is 4.2.2 or older. This version<br />

has a bug in its mail() function which does not properly sanitize user input. As a result,<br />

users can forge email to make it look like it is coming from a different source that the<br />

server. The remote version of PHP is: \n %L<br />

Solution: Upgrade to PHP 4.2.3 or higher.<br />

CVE-2002-0985<br />

PHP < 4.0.4 php.cgi Shell Access Overflow<br />

<strong>PVS</strong> ID: 1482 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host seems to be running PHP as a standby application (php.cgi). Due to<br />

security bugs and performance issues, you should compile it as a module for your web<br />

server.<br />

Solution: Upgrade to version 4.0.4 or higher.<br />

CVE-1999-0058<br />

PHP < 4.1.0 Safe Mode Mail Function Command Execution<br />

<strong>PVS</strong> ID: 1483 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:12307<br />

Description: The remote host is running PHP 4.0.5. There is a flaw in this version which allows local<br />

users to circumvent the safe mode and gain the UID of the HTTP process.<br />

Solution: Upgrade to PHP 4.1.0<br />

CVE-2001-1246<br />

PHP < 4.3.2 Multiple Function Remote Overflows<br />

<strong>PVS</strong> ID: 1484 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11468<br />

Family Internet Services 382


Description: The remote host is running a version of PHP which is older than 4.3.2. This version<br />

contains various flaws that may allow an attacker who has the ability to execute PHP<br />

scripts in safe_mode on this host to execute arbitrary commands with the privileges of the<br />

HTTP daemon<br />

Solution: Upgrade to PHP 4.3.2 or higher.<br />

CVE-2003-0172<br />

PHP < 4.1.2 POST Request file_upload Overflow<br />

<strong>PVS</strong> ID: 1485 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host is running a version of PHP which is older than 4.1.2. This version<br />

contains a bug which the handling functions of data of type multipart/form-data, which may<br />

allow an attacker to gain a shell on this host.<br />

Solution: Upgrade to PHP 4.1.2 or higher.<br />

CVE-2002-0081<br />

RemotelyAnywhere Web Server Detection<br />

<strong>PVS</strong> ID: 1486 FAMILY: Web Servers RISK: LOW NESSUS ID:10920<br />

Description: The remote host is running the RemotelyAnywhere web server. RemotelyAnywhere allows<br />

a user to remotely control the server. You should ensure that this service is authorized by<br />

the appropriate groups and relevant security policies.<br />

Solution: Ensure that this server was legitimately installed.<br />

CVE Not available<br />

Alibaba 2.0 HTTP Request Overflow DoS<br />

<strong>PVS</strong> ID: 1487 FAMILY: Web Servers RISK: HIGH NESSUS ID:10012<br />

Description: It is possible to disable the remote AliBaba web server by sending a long argument to a<br />

GET or POST HTTP request.<br />

Solution: None at this time.<br />

CVE-2000-0626<br />

Apache < 1.3.27 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1488 FAMILY: Web Servers RISK: HIGH NESSUS ID:11137<br />

Family Internet Services 383


Description: The remote host is running a version of Apache which is older than 1.3.27. This version<br />

contains several flaws that have been fixed in 1.3.27.<br />

Solution: Upgrade to Apache 1.3.27 or higher.<br />

CVE-2002-0843<br />

Apache < 2.0.43 HTTP POST Request Source Disclosure<br />

<strong>PVS</strong> ID: 1489 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11408<br />

Description: The remote host is running a version of Apache 2.x which is older than 2.0.43. This version<br />

allows an attacker to view the source code of CGI scripts via a POST request made to a<br />

directory with both WebDAV and CGI enabled.<br />

Solution: Upgrade to Apache 2.0.43 or higher.<br />

CVE-2002-1156<br />

Apache mod_auth_pgsql < 0.9.6 SQL Injection<br />

<strong>PVS</strong> ID: 1490 FAMILY: Web Servers RISK: HIGH NESSUS ID:10752<br />

Description: The remote host is running a version of mod_auth_pgsql which is older than 0.9.6. It is<br />

vulnerable to a SQL injection attack which may let anyone bypass authentication or even<br />

modify your database.<br />

Solution: Upgrade to mod_auth_pgsql 0.9.6 or higher.<br />

CVE-2001-1379<br />

Apache mod_auth_pg < 1.2b3 SQL Injection<br />

<strong>PVS</strong> ID: 1491 FAMILY: Web Servers RISK: HIGH NESSUS ID:10752<br />

Description: The remote host is running a version of mod_auth_pg which is older than 1.2b3. It is<br />

vulnerable to a SQL injection attack which may let anyone bypass authentication or even<br />

modify your database.<br />

Solution: Upgrade to mod_auth_pg 1.2b3 or higher.<br />

CVE-2001-1379<br />

Apache mod_auth_mysql < 1.10 SQL Injection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1492 FAMILY: Web Servers RISK: HIGH NESSUS ID:10752<br />

Family Internet Services 384


Description: The remote host is running a version of mod_auth_mysql which is older than 1.10. It is<br />

vulnerable to a SQL injection attack which may let anyone bypass authentication or even<br />

modify your database.<br />

Solution: Upgrade to mod_auth_pg 1.10 or higher.<br />

CVE-2001-1379<br />

Apache mod_auth_oracle < 0.52 SQL Injection<br />

<strong>PVS</strong> ID: 1493 FAMILY: Web Servers RISK: HIGH NESSUS ID:10752<br />

Description: The remote host is running a version of mod_auth_oracle which is older than 0.5.2. It is<br />

vulnerable to a SQL injection attack which may let anyone bypass authentication or even<br />

modify your database.<br />

Solution: Upgrade to mod_auth_oracle 0.5.2 or higher.<br />

CVE-2001-1379<br />

Apache mod_auth_pgsql_sys < 0.9.5 SQL Injection<br />

<strong>PVS</strong> ID: 1494 FAMILY: Web Servers RISK: HIGH NESSUS ID:10752<br />

Description: The remote host is running a version of mod_auth_pgsql_sys which is older than 0.9.5. It is<br />

vulnerable to a SQL injection attack which may let anyone bypass authentication or even<br />

modify your database.<br />

Solution: Upgrade to mod_auth_pgsql_sys 0.9.5 or higher.<br />

CVE-2001-1379<br />

Apache Chunked Encoding Remote Overflow / DoS<br />

<strong>PVS</strong> ID: 1495 FAMILY: Web Servers RISK: HIGH NESSUS ID:11030<br />

Description: The remote host is running a version of Apache which is vulnerable to a chunked encoding<br />

vulnerability. An attacker may use this flaw to gain a shell on this host.<br />

Solution: Upgrade to Apache 1.3.26, 2.0.39 or higher.<br />

CVE-2002-0392<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Apache-SSL < 1.47 mod_ssl i2d_SSL_SESSION Function Overflow<br />

<strong>PVS</strong> ID: 1496 FAMILY: Web Servers RISK: HIGH NESSUS ID:10918<br />

Description: The remote host is using a version of Apache-SSL which is older than 1.47. This version is<br />

vulnerable to a buffer overflow which may allow an attacker to execute arbitrary<br />

commands on this host.<br />

Family Internet Services 385


Solution: Upgrade to version 1.47 or higher.<br />

CVE-2002-0082<br />

Apache < 2.0.44 MS-DOS Device Name DoS / Code Execution<br />

<strong>PVS</strong> ID: 1497 FAMILY: Web Servers RISK: HIGH NESSUS ID:11209<br />

Description: The remote host is running a version of Apache2 for Win32 which is older than 2.0.44.<br />

There are several flaws pre-2.0.44 which may allow an attacker to crash this host or even<br />

execute arbitrary code remotely. However, these bugs only affect WindowsME and<br />

Windows9x.<br />

Solution: Upgrade to Apache 2.0.44 or higher.<br />

CVE-2003-0016<br />

Apache < 2.0.40 Win32 Directory Traversal File Access<br />

<strong>PVS</strong> ID: 1498 FAMILY: Web Servers RISK: HIGH NESSUS ID:11092<br />

Description: The remote host is running a Apache 2.0.39 for Win32. There is a flaw in this version<br />

which allows anyone to access files that would otherwise be inaccessible by a directory<br />

traversal attack. An attacker may use this flaw to read sensitive files on this host, or even<br />

possibly execute commands on your system.<br />

Solution: Upgrade to Apache 2.0.40 or higher for Win32.<br />

CVE-2002-0661<br />

Apache < 2.0.44 File Access on Win32<br />

<strong>PVS</strong> ID: 1499 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11210<br />

Description: The remote host is running a version of Apache for Win32 which is older than 2.0.44.<br />

There is a flaw in this version which may allow an attacker to access files they should not<br />

have access to, by appending special chars to their name.<br />

Solution: Upgrade to Apache 2.0.44 or higher for Win32.<br />

CVE-2003-0017<br />

BadBlue < 2.3 ISAPI Extension Administrative Actions Bypass<br />

<strong>PVS</strong> ID: 1500 FAMILY: Web Servers RISK: HIGH NESSUS ID:11554<br />

Description: The remote host is running the BadBlue web server. There is a flaw in the version used that<br />

may allow attackers to gain administrative privileges on this host without having to log in.<br />

Solution: Upgrade to BadBlue 2.3 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 386


CVE Not available<br />

BitKeeper 3.0.x Remote Command Execution<br />

<strong>PVS</strong> ID: 1501 FAMILY: Web Servers RISK: HIGH NESSUS ID:11198<br />

Description: The remote host is running version 3.0.x of the BitKeeper web server. Some versions of<br />

this service are known to allow anyone execute arbitrary commands with the privileges of<br />

the BitKeeper daemon.<br />

Solution: Contact the vendor for a fix.<br />

CVE Not available<br />

Communigate Pro < 3.2 HTTP Configuration Port Remote Overflow<br />

<strong>PVS</strong> ID: 1502 FAMILY: Web Servers RISK: HIGH NESSUS ID:10048<br />

Description: The remote host is running Communigate Pro version 3.0 or 3.1. There is a flaw in this<br />

version which may allow an attacker to execute arbitrary code on this host.<br />

Solution: Upgrade to CommunigatePro 3.2 or higher.<br />

CVE-1999-0865<br />

Compaq WBEM Server Detection<br />

<strong>PVS</strong> ID: 1503 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10746<br />

Description: The remote host is running the Compaq WBEM service. This service discloses sensitive<br />

information about this host, such as the platform name and version, the installed hotfixes<br />

and the running services. The version which is running is : %L<br />

Solution: Disable this service if you do not use it.<br />

CVE Not available<br />

Lotus Domino < 5.0.12 / 6.0.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1504 FAMILY: Web Servers RISK: HIGH NESSUS ID:11338<br />

Description: The remote host is running a version of the Domino web server which is vulnerable to<br />

various flaws when it acts as a web client (through web retriever) or in LDAP. An attacker<br />

may use these flaws to execute arbitrary code on this host.<br />

Solution: Upgrade to Domino 5.0.12, 6.0.1 or higher.<br />

CVE-2001-1311<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 387


Domino < 5.0.7 NSF File Request Directory Traversal File Access<br />

<strong>PVS</strong> ID: 1505 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11344<br />

Description: The remote Domino Web Server is vulnerable to a directory traversal attack. An attacker<br />

may read arbitrary files on the remote system by prepending %00%00.nsf/../ in front of<br />

their names.<br />

Solution: Upgrade to Domino 5.0.7 or higher.<br />

CVE-2001-0009<br />

dwhttpd < 4.2 GET Request Remote Format String<br />

<strong>PVS</strong> ID: 1506 FAMILY: Web Servers RISK: HIGH NESSUS ID:11075<br />

Description: The remote dwhttpd server is vulnerable to a format string attack. An attacker may use this<br />

flaw to execute arbitrary code on this host, with the privileges of the dwhttpd web server<br />

Solution: Upgrade to version 4.2 or higher.<br />

CVE Not available<br />

IMail < 7.0.6 Account Hijacking<br />

<strong>PVS</strong> ID: 1507 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11271<br />

Description: The remote host is running the IMail web interface. There is a bug in the version being run<br />

which may allow an attacker to read the mailboxes of the users by sending them a<br />

malformed HTML email containing a link to an image hosted on a rogue web server.<br />

Solution: Upgrade to IMail 7.0.6 or higher.<br />

CVE Not available<br />

LocalWeb2000 2.10 Crafted Request File Disclosure<br />

<strong>PVS</strong> ID: 1508 FAMILY: Web Servers RISK: HIGH NESSUS ID:11005<br />

Description: The remote host is running LocalWeb2000. Versions of this software up to and including<br />

2.10 allow an attacker to read normally protected files by prepending a dot in front of their<br />

name.<br />

Solution: The product is no longer supported by the vendor.<br />

CVE-2002-0897<br />

Apache mod_frontpage < 1.6.1 Remote Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 388


<strong>PVS</strong> ID: 1509 FAMILY: Web Servers RISK: HIGH NESSUS ID:11303<br />

Description: The remote Apache server is running mod_frontpage. Versions older than 1.6.1 are<br />

vulnerable to a buffer overflow which may allow an attacker to gain root access on this<br />

host. *** Note that it is not possible to remotely determine the version of mod_frontpage<br />

which is running, so this may be a false positive.<br />

Solution: Upgrade to mod_frontpage 1.6.1 or higher.<br />

CVE-2002-0427<br />

Apache mod_jk < 1.2.1 Chunked Encoding DoS<br />

<strong>PVS</strong> ID: 1510 FAMILY: Web Servers RISK: HIGH NESSUS ID:11519<br />

Description: The remote Apache server is running a version of mod_jk which is vulnerable in the way it<br />

processes chunked encoded requests. This may allow an attacker to desynchronise Apache<br />

and Tomcat which would prevent this host from running properly.<br />

Solution: Upgrade to mod_jk 1.2.1 or higher.<br />

CVE-2002-2272<br />

Apache mod_python < 2.7.8 Imported Function Access<br />

<strong>PVS</strong> ID: 1511 FAMILY: Web Servers RISK: HIGH NESSUS ID:10947<br />

Description: The remote Apache server is running a version of mod_python which is older than 2.7.6.<br />

This version contains a bug which may allow an attacker to execute potentially harmful<br />

python function even though he should not have the privileges to do so.<br />

Solution: Upgrade to mod_python 2.7.8 or higher.<br />

CVE-2002-0185<br />

Apache mod_ssl < 2.8.10 Off-by-one Overflow<br />

<strong>PVS</strong> ID: 1512 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11039<br />

Description: The remote Apache server is running a version of mod_ssl which contains a off-by-one<br />

buffer overflow. An attacker with write access to a .htacess file could exploit this bug to<br />

execute arbitrary code on this host with the privileges the web server is running.<br />

Solution: Upgrade to mod_ssl 2.8.10 or higher.<br />

CVE-2002-0653<br />

Apache mod_ssl Session Cache Code Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1513 FAMILY: Web Servers RISK: HIGH NESSUS ID:10888<br />

Family Internet Services 389


Description: The remote Apache server is running a version of mod_ssl which is older than 2.8.7. There<br />

is a bug in this module which may allow an attacker to obtain a shell on this host.<br />

Solution: Upgrade to mod_ssl 2.8.7 or higher.<br />

CVE-2002-0082<br />

Monkey HTTP Daemon < 0.6.2 POST Request Remote Overflow<br />

<strong>PVS</strong> ID: 1514 FAMILY: Web Servers RISK: HIGH NESSUS ID:11544<br />

Description: The remote host is running a version of Monkey which contains a bug in the way it handles<br />

POST requests. An attacker may exploit this flaw to execute arbitrary code.<br />

Solution: Upgrade to Monkey HTTP Daemon 0.6.2 or higher.<br />

CVE-2003-0218<br />

OpenSSL Private Key Disclosure<br />

<strong>PVS</strong> ID: 1515 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11267<br />

Description: The remote host is running a version of OpenSSL which is vulnerable to a timing attack<br />

which may allow an attacker to recover the content of fixed data blocks and even<br />

eventually the RSA private key of the web server.<br />

Solution: Upgrade to OpenSSL 0.9.6i or 0.9.7a<br />

CVE-2003-0131<br />

Oracle WebCache Server < 2.0.0.3.x Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1516 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10808<br />

Description: The remote host is running a version of the OracleWebCache server which may be disable<br />

remotely by an attacker by sending a malformed request to it. The remote server is running<br />

: %L<br />

Solution: Upgrade to version 2.0.0.3.x or newer<br />

CVE-2002-0102<br />

Resin < 2.1s020604 MS-DOS Device Path Disclosure<br />

<strong>PVS</strong> ID: 1517 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11048<br />

Family Internet Services 390


Description: The remote web server may disclosure the physical path of the remote web root when asked<br />

for a special MS-DOS device as, for instance, lpt9.xtp. An attacker may use this flaw to<br />

gain more knowledge about this host.<br />

Solution: Upgrade to the Resin 2.1s020604 or higher.<br />

CVE-2002-2090<br />

Savant < 3.0 GET Request CGI Source Disclosure<br />

<strong>PVS</strong> ID: 1518 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote Savant Web Server can be forced by an attacker to display the content of the<br />

CGIs it runs instead of the output of their execution. An attacker may use this flaw to view<br />

the source code of your scripts or to get a copy of your binary CGIs.<br />

Solution: Upgrade to Savant 3.x or higher.<br />

CVE-2000-0521<br />

Pi3Web WebServer < 2.0.1 CGI Handler Overflow<br />

<strong>PVS</strong> ID: 1519 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11099<br />

Description: The remote web server may crash when it is sent a too long CGI parameter multiple times.<br />

An attacker may use this flaw to prevent this host from working properly.<br />

Solution: Upgrade to Pi3Web 2.0.1 or higher.<br />

CVE-2002-0142<br />

Shoutcast Multiple GET Request Remote DoS<br />

<strong>PVS</strong> ID: 1520 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10717<br />

Description: The remote ShoutCast server can be disabled remotely by sending a multiple GET requests<br />

to it. An attacker may use this flaw to prevent this host from working properly.<br />

Solution: No solution is known at this time.<br />

CVE-2001-1304<br />

AnalogX SimpleServer:WWW < 1.2 Remote DoS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1521 FAMILY: Web Servers RISK: HIGH NESSUS ID:11305<br />

Family Internet Services 391


Description: The remote web server (SimpleServer:WWW) contains a bug which may allow an attacker<br />

to disable it.<br />

Solution: Upgrade to SimpleServerWWW 1.2 or higher.<br />

CVE-2000-0243<br />

thttpd < 2.05 If-Modified-Since Header Overflow<br />

<strong>PVS</strong> ID: 1522 FAMILY: Web Servers RISK: HIGH NESSUS ID:10285<br />

Description: The remote web server contains a buffer overflow in the portion of its code which<br />

processes the argument of the header 'If-Modified-Since'. By supplying a malformed<br />

argument to this header, an attacker may be able to execute arbitrary code on this host, with<br />

the privileges of the web server.<br />

Solution: Upgrade to thttpd 2.05 or higher.<br />

CVE-2000-0359<br />

Squid < 2.4.STABLE6 Multiple Overflows<br />

<strong>PVS</strong> ID: 1523 FAMILY: Web Servers RISK: HIGH NESSUS ID:10923<br />

Description: The remote squid caching proxy, according to its version number, is vulnerable to various<br />

buffer overflows. An attacker may use these to gain a shell on this system. It was<br />

determined that you are running %L<br />

Solution: Upgrade to squid 2.4.STABLE6 or higher.<br />

CVE-2002-0068<br />

Squid Proxy mkdir-only PUT Request DoS<br />

<strong>PVS</strong> ID: 1524 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10768<br />

Description: The remote squid caching proxy may be disabled remotely by any user by sending it a<br />

malformed 'mkdir-only' PUT request.<br />

Solution: Upgrades and a patch are available for multiple platforms.<br />

CVE-2001-0843<br />

BEA WebLogic < 5.1.0 SP8 Hex-encoded Request JSP Source Disclosure<br />

<strong>PVS</strong> ID: 1525 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10715<br />

Family Internet Services 392


Description: BEA WebLogic may be tricked into revealing the source code of the remote JSP scripts by<br />

using simple URL encoding of the characters in the filename extensions (ie: default.js%70<br />

instead of .jsp).<br />

Solution: Upgrade to WebLogic version 5.1.0 SP8 or higher.<br />

CVE Not available<br />

BEA WebLogic < 6.1 SP2 Encoded Null Byte Request JSP Source Disclosure<br />

<strong>PVS</strong> ID: 1526 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10949<br />

Description: The remote BEA WebLogic server may be tricked into revealing the source code of the<br />

remote JSP scripts by adding an encoded character (ie: %00x) at the end of the request.<br />

Solution: Upgrade to WebLogic 6.1 SP2 or higher.<br />

CVE Not available<br />

SHOUTcast Server Log Files XSS<br />

<strong>PVS</strong> ID: 1527 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11624<br />

Description: The remote host is running a SHOUTcast server. This software does not properly validate<br />

the data provided by web clients, and is therefore vulnerable to a cross-site scripting issue<br />

in its logs interface (which can only be used by the administrator). An attacker may use this<br />

flaw to steal the cookies of the administrator and gain access to this server.<br />

Solution: None solution known at this time.<br />

CVE Not available<br />

miniPortail admin.php Cookie Manipulation Admin Access<br />

<strong>PVS</strong> ID: 1528 FAMILY: CGI RISK: HIGH NESSUS ID:11623<br />

Description: The remote host is running MiniPortail, a set of PHP scripts designed to manage to web<br />

portal. There is a flaw in the remote version of miniPortail which may allow anyone to gain<br />

administrative privileges on this server.<br />

Solution: No solution known at this time.<br />

CVE-2003-0272<br />

mod_ssl < 2.8.10 Wildcard DNS Server Name XSS<br />

<strong>PVS</strong> ID: 1529 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11622<br />

Family Internet Services 393


Description: The remote host is using a version of mod_ssl which is older than 2.8.10. This version is<br />

vulnerable to a flaw which may allow an attacker to successfully perform a cross-site<br />

scripting attack. *** Note that several Linux distributions (such as RedHat) patched this<br />

CGI without increasing its version number, therefore this might be a false positive.<br />

Solution: Upgrade to mod_ssl 2.8.10 or higher.<br />

CVE-2002-1157<br />

Snitz Forums < 3.4.03 register.asp Email Parameter SQL Injection<br />

<strong>PVS</strong> ID: 1530 FAMILY: CGI RISK: HIGH NESSUS ID:11621<br />

Description: Synopsis :\n\nThe remote web server contains a script which is vulnerable to a SQL<br />

injection attack.\n\nThe remote host is using Snitz Forum 2000. This set of CGI is<br />

vulnerable to a SQL injection issue which may allow an attacker to execute arbitrary<br />

commands on this host.<br />

Solution: Upgrade to version 3.4.03 or higher.<br />

CVE Not available<br />

eServ HTTP Connection Saturation Memory Leak Remote DoS<br />

<strong>PVS</strong> ID: 1531 FAMILY: Web Servers RISK: HIGH NESSUS ID:11619<br />

Description: The remote web server (eServ) contains a memory leak which may allow an attacker to<br />

disable it remotely by making a large amount of requests to this port.<br />

Solution: No solution known at this time.<br />

CVE-2003-0290<br />

Horde and IMP Test Script Disclosure<br />

<strong>PVS</strong> ID: 1532 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11617<br />

Description: The remote host is running Horde and/or IMP with the test script available to anyone. An<br />

attacker may use these to gain valuable information about the remote host.<br />

Solution: Delete all the files named 'test.php' on the remote host.<br />

CVE Not available<br />

PHP Topsites counter.php Arbitrary File Overwrite<br />

<strong>PVS</strong> ID: 1533 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11611<br />

Family Internet Services 394


Description: The remote host is running PHP Topsites and has the CGI 'counter.php' installed. There is a<br />

flaw in this CGI which may allow an attacker to overwrite arbitrary files on this host.<br />

Solution: Delete this CGI.<br />

CVE Not available<br />

mod_survey < 3.0.14e / 3.0.15pre6 ENV tags SQL Injection<br />

<strong>PVS</strong> ID: 1534 FAMILY: CGI RISK: HIGH NESSUS ID:11609<br />

Description: Synopsis :\n\nThe remote web server contains a script which is vulnerable to a SQL<br />

injection attack.\n\nThe remote host is using mod_survey, a perl add-on to manage online<br />

surveys. There is a flaw in the remote installation of mod_survey which makes it vulnerable<br />

to SQL injection attacks when a database backend is being used. An attacker may use this<br />

flaw to gain control of your database.<br />

Solution: Upgrade to mod_survey 3.0.14e or 3.0.15pre6 or higher.<br />

CVE Not available<br />

Apache < 2.0.46 on OS/2 filestat.c Device Name Request DoS<br />

<strong>PVS</strong> ID: 1535 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11607<br />

Description: The remote host is running a version of Apache/2.x which is older than 2.0.46 on top of<br />

OS/2. There is an OS/2 specific bug in this version which may allow an attacker to disable<br />

this service remotely by abusing a flaw in the OS/2 specific source file filestat.c.<br />

Solution: Upgrade to Apache 2.0.46 or higher.<br />

CVE-2003-0134<br />

BEA WebLogic Server GET Request Name Disclosure<br />

<strong>PVS</strong> ID: 1536 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11606<br />

Description: The remote host is running the WebLogic web server. There is a flaw which allows an<br />

attacker to gain the NetBIOS host name of the remote host.<br />

Solution: No solution known at this time.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

IkonBoard FUNC.pm lang Cookie Arbitrary Command Execution<br />

<strong>PVS</strong> ID: 1537 FAMILY: CGI RISK: HIGH NESSUS ID:11605<br />

Family Internet Services 395


Description: The remote host is running IkonBoard, an on-line BBS system. There is a flaw in the<br />

version used which may allow an attacker to execute arbitrary commands on this host.<br />

Solution: Upgrade to the latest version of IkonBoard.<br />

CVE-2003-0770<br />

BEA WebLogic < 5.1 SP 11 JSP Source Disclosure<br />

<strong>PVS</strong> ID: 1538 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11604<br />

Description: The remote WebLogic server may be tricked into revealing the source code of JSP scripts<br />

by prefixing their path by '/*.shtml/'.<br />

Solution: Upgrade to version 5.1 SP 11 or higher.<br />

CVE-2000-0683<br />

HappyMall normal_html.cgi Remote Command Execution<br />

<strong>PVS</strong> ID: 1539 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11603<br />

Description: The remote host is running HappyMall, an e-commerce CGI suite. Some versions of this<br />

CGI are vulnerable to a flaw which may allow an attacker to execute arbitrary commands<br />

on this host.<br />

Solution: The vendor has provided a patch for this program.<br />

CVE-2003-0277<br />

CGI Script Path Disclosure<br />

<strong>PVS</strong> ID: 1540 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is hosting a CGI which seems to disclose a physical path as one of its<br />

arguments. An attacker may use it to gain more information about the remote host. The<br />

request we saw was : %P<br />

Solution: Fix this CGI<br />

CVE Not available<br />

NetCharts Server Default Password<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1541 FAMILY: Web Servers RISK: HIGH NESSUS ID:11600<br />

Family Internet Services 396


Description: The remote host is running a NetCharts server with the default login and password<br />

(Admin/Admin).<br />

Solution: Change the default password.<br />

CVE Not available<br />

12Planet Chat Server Path Disclosure<br />

<strong>PVS</strong> ID: 1542 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11592<br />

Description: The remote host is running 12Planet Chat Server, a web based chat server written in Java.<br />

There is a flaw in this software that may allow an attacker to obtain the physical path of the<br />

installation of the remote server by sending a malformed request to this service.<br />

Solution: None solution is known at this time.<br />

CVE Not available<br />

12Planet Chat Server ClearText Password Remote Disclosure<br />

<strong>PVS</strong> ID: 1543 FAMILY: CGI RISK: LOW NESSUS ID:11591<br />

Description: The remote host is running 12Planet Chat Server over an unencrypted channel. An attacker<br />

who can sniff traffic on this network may use this configuration issue to obtain the<br />

password of the administrator of this site and use it to take control.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

JetDB Direct Request Database Download<br />

<strong>PVS</strong> ID: 1544 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: The following request was used to download a JetDB database over HTTP : %P<br />

Solution: Ensure that proper permissions are set on this file.<br />

CVE Not available<br />

YaBB SE < 1.5.2 Remote File Inclusion and SQL Injection<br />

<strong>PVS</strong> ID: 1545 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11588<br />

Description: The remote host is running the YaBB SE forum management system. There is a flaw in this<br />

version which may allow an attacker to execute arbitrary commands on this host and to<br />

inject arbitrary values in the remote SQL database.<br />

Family Internet Services 397


Solution: Upgrade to YaBB SE 1.5.2 or higher.<br />

CVE-2002-1176<br />

XMB < 1.8 SP1 member.php SQL Injection<br />

<strong>PVS</strong> ID: 1546 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11587<br />

Description: The remote host is running XMB Forum. There is flaw in the version this host is using<br />

which may allow an attacker to perform a SQL injection attack against this host.<br />

Solution: Upgrade to XMB 1.8 SP1 or higher.<br />

CVE Not available<br />

Sambar Cleartext Password Remote Disclosure<br />

<strong>PVS</strong> ID: 1547 FAMILY: Web Servers RISK: LOW NESSUS ID:11585<br />

Description: The remote Sambar server does not run on top of SSL, therefore passwords are transmitted<br />

in cleartext over HTTP. An attacker who can sniff network traffic may use this flaw to gain<br />

access on the web interface of this host.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

TrueGalerie admin.php loggedin Parameter Admin Authentication Bypass<br />

<strong>PVS</strong> ID: 1548 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11582<br />

Description: It is possible to gain administrative privileges on the remote TrueGallerie installation by<br />

requesting the URL '/admin.php?loggedin<br />

Solution: Disable the option 'register_globals' in php.ini.<br />

CVE-2003-1488<br />

album.pl < 6.2 Remote Command Execution<br />

<strong>PVS</strong> ID: 1549 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11581<br />

Description: The remote host is running a version of the CGI 'album.pl' which may allow an attacker to<br />

execute arbitrary commands on this host.<br />

Solution: Upgrade to version 6.2 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 398


CVE-2003-1456<br />

thttpd < 2.24 Host:' Header Traversal File Access / libhttpd.c defang Overflow<br />

<strong>PVS</strong> ID: 1550 FAMILY: Web Servers RISK: HIGH NESSUS ID:11576<br />

Description: The remote host is using an old version of thttpd which is vulnerable to a directory traversal<br />

when virtual hosting is enabled. An attacker may use this flaw to read arbitrary files on the<br />

remote host.<br />

Solution: Upgrade to thttpd 2.24 or higher.<br />

CVE-2002-1562<br />

StockMan Shopping Cart < 7.9 shop.plx Command Execution<br />

<strong>PVS</strong> ID: 1551 FAMILY: CGI RISK: HIGH NESSUS ID:11569<br />

Description: The remote host is running Stockman Shopping Cart. There is a flaw in this software which<br />

may allow an attacker to execute arbitrary commands on this host.<br />

Solution: Uprade to version 7.9 or higher.<br />

CVE Not available<br />

CommuniGate Pro < 4.0 .1b2 Referer Field Hijacking<br />

<strong>PVS</strong> ID: 1552 FAMILY: Web Servers RISK: HIGH NESSUS ID:11567<br />

Description: The remote CommuniGate Pro, according to its version number, is vulnerable to a flaw<br />

which may allow an attacker access the mailbox of its victims. To exploit such a flaw, the<br />

attacker needs to send an email to its victim with a link to an image hosted on a rogue<br />

server which will store the Referrer field sent by the user user-agent which contains the<br />

credentials used to access the victim's mailbox.<br />

Solution: Upgrade to CommuniGate Pro 4.0 .1b2 or higher.<br />

CVE-2003-1481<br />

Coppermine Gallery < 1.1 beta 3 SQL Injection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1553 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script which is vulnerable to a SQL<br />

injection attack.\n\nThe remote host is running CopperMine Gallery, a set of PHP scripts to<br />

handle galleries of pictures. There is a flaw in the version of Coppermine Gallery which is<br />

used by the remote host, which may allow an attacker to do a SQL injection attack, which<br />

would allow the viewing of arbitrary pictures or even to gain administrative access on this<br />

database.<br />

Solution: Upgrade to Coppermine Gallery 1.1 beta 3 or higher.<br />

Family Internet Services 399


CVE Not available<br />

BadBlue < 2.2 Unspecified Admin Access<br />

<strong>PVS</strong> ID: 1554 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote BadBlue web server has a vulnerability which may allow attackers to gain the<br />

administrative control of this host.<br />

Solution: Upgrade to BadBlue version 2.2 or higher.<br />

CVE Not available<br />

Bugzilla XSS / Insecure Temporary File Names<br />

<strong>PVS</strong> ID: 1555 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11462<br />

Description: The remote server is running Bugzilla, a bug tracking system. There is a flaw in the remote<br />

installation of Bugzilla that makes it vulnerable to cross-site scripting attacks and that may<br />

allow local attackers to escalate their privileges due to the use of insecure temporary file<br />

names.<br />

Solution: Upgrade to Bugzilla 2.16.3, 2.17.4 or higher.<br />

CVE Not available<br />

mod_NTLM Overflow / Format String<br />

<strong>PVS</strong> ID: 1556 FAMILY: Web Servers RISK: HIGH NESSUS ID:11552<br />

Description: The remote host appears to be running mod_NTLM on top of Apache. There is a bug in<br />

several versions of this module which make it vulnerable to a buffer overflow and a format<br />

string attack.<br />

Solution: No solution known at this time.<br />

CVE Not available<br />

OpenBB Multiple SQL Injection<br />

<strong>PVS</strong> ID: 1557 FAMILY: CGI RISK: HIGH NESSUS ID:11550<br />

Description: The remote host seems to be running OpenBB, a forum management system. There is a<br />

flaw in the remote version of OpenBB which allows an attacker to take the control of the<br />

database.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 400


Nokia IPSO Voyager WebGUI readfile.tcl file Parameter Arbitrary File Access<br />

<strong>PVS</strong> ID: 1558 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11549<br />

Description: The remote host is running readfile.tcl on Nokia IPSO Voyager WebGUI, which allows any<br />

user with a web account on this host to read arbitrary files on this system with the<br />

privileges of the HTTP server.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

bttlxeForum login.asp < 2.0 Multiple SQL Injection<br />

<strong>PVS</strong> ID: 1559 FAMILY: CGI RISK: HIGH NESSUS ID:11548<br />

Description: Synopsis :\n\nThe remote host is running bttlxeForum, a set of CGI designed to manager a<br />

web-based forum server.\n\n There is a SQL injection vulnerability in this installation<br />

which allows an attacker to gain the privileges of the administrator while logging in, or to<br />

take the control of the remote database.<br />

Solution: Upgrade to version 2.0 or higher.<br />

CVE-2003-0215<br />

Xeneo Web Server < 2.1.5 GET Request Denial of Service<br />

<strong>PVS</strong> ID: 1560 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11546<br />

Description: It is possible to make the remote Xeneo web server to crash remotely. An attacker may use<br />

this flaw to prevent this host from working properly.<br />

Solution: Upgrade to version 2.1.5 or higher.<br />

CVE-2002-1248<br />

Monkey HTTP Daemon < 0.6.2 PostMethod Function Remote Overflow<br />

<strong>PVS</strong> ID: 1561 FAMILY: Web Servers RISK: HIGH NESSUS ID:11544<br />

Description: It is possible to make the remote web server crash when sending a POST command with<br />

too much data in it. An attacker might also exploit this flaw to execute arbitrary code on<br />

this host.<br />

Solution: Upgrade to version 0.6.2 or higher.<br />

CVE-2003-0218<br />

eZ Publish site.ini Configuration Disclosure<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 401


<strong>PVS</strong> ID: 1562 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11538<br />

Description: eZ Publish (a content management system) is installed on the remote host. An attacker may<br />

retrieve the file 'settings/site.ini' and gather interesting information about the remote host.<br />

Solution: Restrict remote access to .ini files.<br />

CVE Not available<br />

Ocean12 Guestbook XSS<br />

<strong>PVS</strong> ID: 1563 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11537<br />

Description: The remote host is running Ocean12 Guestbook, a set of scripts designed to manage an<br />

on-line guestbook. There is a flaw in this program which may be abused by attackers to<br />

inject malicious HTML code in the remote site, which may be used to steal the cookies of<br />

legitimate users.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

Super Guestbook superguestconfig Admin Password Disclosure<br />

<strong>PVS</strong> ID: 1564 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11536<br />

Description: The remote host is running SuperGuestBook, a set of PHP scripts designed to manage an<br />

interactive guestbook. There is a flaw in this version which may allow an attacker to<br />

retrieve the configuration file of this setup, which contains the password of the<br />

administrator.<br />

Solution: Restrict remote access to the 'superguestconfig' file.<br />

CVE Not available<br />

Instaboard index.cfm SQL Injection<br />

<strong>PVS</strong> ID: 1565 FAMILY: CGI RISK: HIGH NESSUS ID:11532<br />

Description: Synopsis :\n\nThe remote web server contains a script which is vulnerable to a SQL<br />

injection attack.\n\nThe remote host is running NetPleasure's Instaboard, a web-interface<br />

designed to manage online forums. There is a vulnerability in this release which allows an<br />

attacker to perform a SQL injection attack through the CGI 'index.cfm'.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 402


Vignette StoryServer Information Disclosure<br />

<strong>PVS</strong> ID: 1566 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11526<br />

Description: The remote host is running Vignette StoryServer. There is a flaw in this version which may<br />

allow an attacker to extract parts of the sessions of the other users.<br />

Solution: The vendor has released a patch to address this issue.<br />

CVE-2002-0385<br />

Coppermine Gallery < 1.1 Beta 2 PHP Code Execution<br />

<strong>PVS</strong> ID: 1567 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host is running Coppermine Gallery, a set of PHP scripts to handle galleries of<br />

pictures. There is a flaw in the version of Coppermine Gallery used by the remote host that<br />

may allow an attacker to execute arbitrary commands on this host.<br />

Solution: Upgrade to Coppermine 1.1 beta 2 or higher.<br />

CVE Not available<br />

Linksys Router Default Password<br />

<strong>PVS</strong> ID: 1568 FAMILY: Web Servers RISK: HIGH NESSUS ID:11522<br />

Description: The remote Linksys router has its default password (admin) set. An attacker may use it to<br />

reconfigure this device.<br />

Solution: Log into the remote host and set a strong password for the administrator.<br />

CVE Not available<br />

VPOPMail vpopmail.php Remote Command Execution<br />

<strong>PVS</strong> ID: 1569 FAMILY: CGI RISK: HIGH NESSUS ID:11397<br />

Description: The remote VPOPMail webmail interface lets authenticated users to execute arbitrary<br />

commands on this host. An attacker may use it to gain a shell on this host.<br />

Solution: Upgrade to the VPOPMail 0.98 or higher.<br />

CVE Not available<br />

Abyss Malformed GET Request Remote DoS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1570 FAMILY: Web Servers RISK: HIGH NESSUS ID:11521<br />

Family Internet Services 403


Description: The remote web server can be disabled remotely by sending a malformed HTTP request.<br />

An attacker may use this flaw to prevent the remote host from functioning properly.<br />

Solution: Upgrade to Abyss X1 v1.1.4 or higher.<br />

CVE-2003-1364<br />

mod_jk Chunked Encoding DoS<br />

<strong>PVS</strong> ID: 1571 FAMILY: Web Servers RISK: HIGH NESSUS ID:11519<br />

Description: The remote host is using a version of the Apache mod_jk module which is older than 1.2.1.<br />

There is a bug in this version which may allow an attacker to use chunked encoding<br />

requests to desynchronize Apache and Tomcat and therefore prevent this host from<br />

working properly.<br />

Solution: Upgrade to mod_jk 1.2.1 or higher.<br />

CVE-2002-2272<br />

AutomatedShops webc.cgi Multiple Overflows<br />

<strong>PVS</strong> ID: 1572 FAMILY: Web Servers RISK: HIGH NESSUS ID:11516<br />

Description: The remote host is running webc.cgi, a shopping cart application, which is older than 5.020.<br />

This CGI is vulnerable to a remote buffer overflow as well as a local one. An attacker may<br />

exploit this flaw to execute arbitrary code on this host.<br />

Solution: Upgrade to version 5.020 or higher.<br />

CVE Not available<br />

NETGEAR ProSafe Router Password Disclosure / Port Filtering Bypass<br />

<strong>PVS</strong> ID: 1573 FAMILY: Web Servers RISK: HIGH NESSUS ID:11514<br />

Description: The remote NETGEAR FM114P ProSafe Wireless router discloses the username and the<br />

password of the WAN when it receives specially crafted UPnP SOAP requests.<br />

Solution: Disable UPnP on this device.<br />

CVE Not available<br />

Ecartis User Password Reset Privilege Escalation<br />

<strong>PVS</strong> ID: 1574 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11505<br />

Family Internet Services 404


Description: The remote host is running the Ecartis Mailing List Manager web interface (lsg2.cgi).<br />

There is a vulnerability in versions older than version 1.0.0 snapshot 20030227 which<br />

allows an attacker to spoof a username while changing passwords, thus potentially gaining<br />

control of the mailing list.<br />

Solution: Upgrade to version 1.0.0 snapshot 20030227 or higher.<br />

CVE-2004-0913<br />

Sambar Default 'billy-bob' Account<br />

<strong>PVS</strong> ID: 1575 FAMILY: Web Servers RISK: HIGH NESSUS ID:11493<br />

Description: The remote host is running Sambar with the default account 'billy-bob' set.<br />

Solution: Disable this account.<br />

CVE Not available<br />

Sambar Default Admin Account<br />

<strong>PVS</strong> ID: 1576 FAMILY: Web Servers RISK: HIGH NESSUS ID:11493<br />

Description: The remote host is running Sambar with the default account 'admin' set.<br />

Solution: Disable this account.<br />

CVE Not available<br />

Sambar Default Anonymous Account<br />

<strong>PVS</strong> ID: 1577 FAMILY: Web Servers RISK: HIGH NESSUS ID:11493<br />

Description: The remote host is running Sambar with the default account 'anonymous' set.<br />

Solution: Disable this account.<br />

CVE Not available<br />

Sambar environ.pl Default CGI Disclosure<br />

<strong>PVS</strong> ID: 1578 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: The remote Sambar server is running environ.pl, which discloses too much information<br />

about the installation.<br />

Solution: Delete this CGI.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 405


Sambar testcgi.exe Default CGI Disclosure<br />

<strong>PVS</strong> ID: 1579 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: The remote Sambar server is running testcgi.exe, which discloses too much information<br />

about the installation.<br />

Solution: Delete this CGI.<br />

CVE Not available<br />

Advanced Poll info.php Information Disclosure<br />

<strong>PVS</strong> ID: 1580 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11487<br />

Description: The remote host seems to be running Advanced Poll. This program includes a file called<br />

'info.php' which is located under db/misc/info.php and may disclose valuable information<br />

about the remote host.<br />

Solution: Delete this file.<br />

CVE-2003-1181<br />

Advanced Poll info.php Information Disclosure<br />

<strong>PVS</strong> ID: 1581 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11487<br />

Description: The remote host seems to be running Advanced Poll. This program includes a file called<br />

'info.php' which is located under text/misc/info.php and may disclose valuable information<br />

about the remote host.<br />

Solution: Delete this file.<br />

CVE-2003-1181<br />

Bugzilla < 2.14.5 / 2.16.2 / 2.17.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1582 FAMILY: CGI RISK: HIGH NESSUS ID:11463<br />

Description: The remote server is running Bugzilla, a bug tracking system. There is a flaw in the remote<br />

installation of Bugzilla that may allow an attacker to execute arbitrary code on this host.<br />

Solution: Upgrade to Bugzilla 2.14.5, 2.16.2 or 2.17.3 or higher.<br />

CVE-2002-0811<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Microsoft IIS UNC Mapped Virtual Host Source Disclosure<br />

<strong>PVS</strong> ID: 1583 FAMILY: Web Servers NESSUS ID:11443<br />

Family Internet Services 406


RISK:<br />

MEDIUM<br />

Description: The IIS web server allows the retrieval of ASP/HTR source code. An attacker can use this<br />

vulnerability to see how your pages interact and find holes in them to exploit.<br />

Solution: Install the latest patches from Microsoft.<br />

CVE-2000-0246<br />

Bonsai < 1.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1584 FAMILY: CGI RISK: HIGH NESSUS ID:11440<br />

Description: The remote host has the CGI suite 'Bonsai' installed. This suite is used to navigate a CVS<br />

repository with a web browser. The remote Bonsai might be vulnerable to various flaws,<br />

including path disclosure, cross-site scripting and remote command execution.<br />

Solution: Upgrade to the latest version of Bonsai.<br />

WebDAV Enabled<br />

CVE-2003-0155<br />

<strong>PVS</strong> ID: 1585 FAMILY: Web Servers RISK: NONE NESSUS ID:11424<br />

Description: The remote web server is running with WebDAV enabled. WebDAV is an industry<br />

standard extension to the HTTP specification that adds the capability for authorized users to<br />

remotely add and manage the content of a web server. If this extension is not used, it should<br />

be disabled.<br />

Solution: See Microsoft KB article Q241520 (http://support.microsoft.com/kb/241520)<br />

CVE Not available<br />

Sun ONE (iPlanet) Application Server < 6.5 SP1 NSAPI Plugin Overflow<br />

<strong>PVS</strong> ID: 1586 FAMILY: Web Servers RISK: HIGH NESSUS ID:11403<br />

Description: The remote Sun ONE Application Server (formerly known as iPlanet Application Server) is<br />

vulnerable to a buffer overflow when a user provides a long buffer after the application<br />

service prefix, as in \nGET /[AppServerPrefix]/[long buffer]\n An attacker may use this<br />

flaw to execute arbitrary code on this host or disable it remotely.<br />

Solution: If you are running Application Server 6.5, apply SP1 or higher. There is no patch for<br />

version 6.0.<br />

CVE-2002-0387<br />

Lotus Domino < 6.0.1 Multiple Overflows<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 407


<strong>PVS</strong> ID: 1587 FAMILY: Web Servers RISK: HIGH NESSUS ID:11386<br />

Description: The remote Lotus Domino server, according to its version number, is vulnerable to various<br />

buffer overflows and denial of service attack. An attacker may use these to disable this<br />

server or execute arbitrary commands on the remote host.<br />

Solution: Upgrade to Domino 6.0.1 or higher.<br />

CVE-2003-0178<br />

popper_mod < 1.2.3 Administration Authentication Bypass<br />

<strong>PVS</strong> ID: 1588 FAMILY: CGI RISK: HIGH NESSUS ID:11334<br />

Description: It is possible to administrate the remote popper_mod CGI by requesting the /admin<br />

directory directly. An attacker may use this vulnerability to obtain user passwords.<br />

Solution: Upgrade to version 1.2.3 or higher.<br />

CVE-2002-0513<br />

WebWho+ whois.cgi Remote Command Execution<br />

<strong>PVS</strong> ID: 1589 FAMILY: CGI RISK: HIGH NESSUS ID:11333<br />

Description: The remote host is using WebWho+ (webwho.pl), a CGI that contains a flaw that allows an<br />

attacker to execute arbitrary commands on this host.<br />

Solution: Upgrade to a newer version of this CGI.<br />

CVE-2000-0010<br />

Proxy Accepts gopher:// Protocol Requests<br />

<strong>PVS</strong> ID: 1590 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11305<br />

Description: The proxy accepts gopher:// requests. Gopher is an old network protocol which predates<br />

HTTP and is nearly unused today. As a result, gopher-compatible software is generally less<br />

audited and more likely to contain security bugs than others. By making gopher requests,<br />

an attacker may evade your firewall settings by making connections to port 70 or may even<br />

exploit arcane flaws in this protocol to gain more privileges on this host (see the attached<br />

CVE ID for such an example).<br />

Solution: Reconfigure your proxy to refuse gopher protocol requests.<br />

CVE-2002-0371<br />

PHP-Nuke Software Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1591 FAMILY: Web Servers RISK: HIGH NESSUS ID:11236<br />

Family Internet Services 408


Description: The remote host is running a copy of PHP-Nuke. Given the history of this package, we<br />

recommend that you do not use it, as security was not important to the authors of the<br />

software. The author of PHP-Nuke (Francisco Burzi) even started to rewrite the program<br />

from scratch, given the huge number of vulnerabilities.<br />

Solution: Do not use this software.<br />

CVE-2005-0434<br />

phpinfo() Function Information Disclosure<br />

<strong>PVS</strong> ID: 1592 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11229<br />

Description: The remote host seems to have a PHP page that calls the phpinfo() function. A call to this<br />

function should be avoided as it provides information about this host to an attacker. The<br />

request which triggered the viewing of a phpinfo() file was : \n%P<br />

Solution: Delete this file.<br />

CVE Not available<br />

Oracle 9iAS SOAP Default Configuration Unauthenticated Application Deployment<br />

<strong>PVS</strong> ID: 1593 FAMILY: Web Servers RISK: HIGH NESSUS ID:11227<br />

Description: In a default installation of Oracle 9iAS v.1.0.2.2, it is possible to deploy or undeploy SOAP<br />

services without the need of any kind of credentials. This is due to SOAP being enabled by<br />

default after installation in order to provide a convenient way to use SOAP samples.<br />

However, this feature poses a threat to HTTP servers with public access since remote<br />

attackers can create SOAP services and then invoke them remotely. Since SOAP services<br />

can contain arbitrary Java code in Oracle 9iAS this means that an attacker can execute<br />

arbitrary code in the remote server.<br />

Solution: Disable SOAP.<br />

CVE-2001-1371<br />

Oracle 9iAS .JSP File Request Default Error Information Disclosure<br />

<strong>PVS</strong> ID: 1594 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11226<br />

Description: Oracle 9iAS allows remote attackers to obtain the physical path of a file under the server<br />

root via a request for a non-existent .JSP file. The default error generated leaks the<br />

pathname in an error message.<br />

Solution: Ensure that virtual paths of URL is different from the actual directory path. Also, do not<br />

use the directory in 'ApJServMount ' to<br />

store data or files.<br />

Family Internet Services 409


CVE-2001-1372<br />

Phorum < 3.4.3 Message Post XSS<br />

<strong>PVS</strong> ID: 1595 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: A cross-site scripting (XSS) vulnerability in Phorum before 3.4.3 allows remote attackers<br />

to inject arbitrary web scripting and HTML.<br />

Solution: Upgrade to version 3.4.3 or higher.<br />

CVE-2003-0283<br />

WebGUI < 5.2.4 Crafted HTTP Request DoS<br />

<strong>PVS</strong> ID: 1596 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: WebGUI version 5.2.3 and possibly earlier versions are vulnerable to a denial of service<br />

attack. By sending a specially-crafted HTTP request, a remote attacker could cause to the<br />

proxy server to consume 100% of the available CPU resources.<br />

Solution: Upgrade to version 5.2.4 or higher.<br />

CVE Not available<br />

Web Server .mdb File Remote Information Disclosure<br />

<strong>PVS</strong> ID: 1597 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote web server has a publicly downloadable .mdb file (%P). These database files<br />

usually contain sensitive information such as usernames and passwords.<br />

Solution: Restrict remote access to .mdb files on the remote server.<br />

CVE Not available<br />

myPHPnuke displayCategory.php Remote Command Execution<br />

<strong>PVS</strong> ID: 1598 FAMILY: CGI RISK: HIGH NESSUS ID:11836<br />

Description: myPHPnuke versions 1.8.8_7 and below suffer from a vulnerability in displayCategory.php<br />

which allows an attacker to execute system commands on the web server.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

Wireless Access Point (WAP) Detection (HTTP)<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 410


<strong>PVS</strong> ID: 1599 FAMILY: Web Servers RISK: INFO NESSUS ID:11026<br />

Description: The remote host is a wireless access point (WAP).<br />

Solution: Ensure that the proper physical and logical controls exist around the WAP.<br />

CVE Not available<br />

D-Link Wireless Access Point (WAP) Detection (HTTP)<br />

<strong>PVS</strong> ID: 1600 FAMILY: Web Servers RISK: INFO NESSUS ID:11026<br />

Description: The remote host is a wireless access point (WAP).<br />

Solution: Ensure that the proper physical and logical controls exist around the WAP.<br />

CVE Not available<br />

Cisco Wireless Access Point (WAP) Detection (HTTP)<br />

<strong>PVS</strong> ID: 1601 FAMILY: Web Servers RISK: INFO NESSUS ID:11026<br />

Description: The remote host is a wireless access point (WAP).<br />

Solution: Ensure that the proper physical and logical controls exist around the WAP.<br />

CVE Not available<br />

Cisco Wireless Access Point (WAP) Detection (HTTP)<br />

<strong>PVS</strong> ID: 1602 FAMILY: Web Servers RISK: INFO NESSUS ID:11026<br />

Description: The remote host is a wireless access point (WAP).<br />

Solution: Ensure that the proper physical and logical controls exist around the WAP.<br />

CVE Not available<br />

Linksys Wireless Access Point (WAP) Detection (HTTP)<br />

<strong>PVS</strong> ID: 1603 FAMILY: Web Servers RISK: INFO NESSUS ID:11026<br />

Description: The remote host is a wireless access point (WAP).<br />

Solution: Ensure that the proper physical and logical controls exist around the AP. <strong>PVS</strong> made this<br />

determination based on the following banner:\n%L<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Linksys WRT Wireless Access Point (WAP) Detection (HTTP)<br />

Family Internet Services 411


<strong>PVS</strong> ID: 1604 FAMILY: Web Servers RISK: INFO NESSUS ID:11026<br />

Description: The remote host is a wireless access point (WAP).<br />

Solution: Ensure that the proper physical and logical controls exist around the WAP.<br />

CVE Not available<br />

Linksys BEFW Wireless Access Point (WAP) Detection (HTTP)<br />

<strong>PVS</strong> ID: 1605 FAMILY: Web Servers RISK: INFO NESSUS ID:11026<br />

Description: The remote host is a wireless access point (WAP).<br />

Solution: Ensure that the proper physical and logical controls exist around the WAP.<br />

CVE Not available<br />

Linksys WPG Wireless Access Point (WAP) Detection (HTTP)<br />

<strong>PVS</strong> ID: 1606 FAMILY: Web Servers RISK: INFO NESSUS ID:11026<br />

Description: The remote host is a wireless access point (WAP).<br />

Solution: Ensure that the proper physical and logical controls exist around the WAP.<br />

CVE Not available<br />

SOHO Wireless Access Point (WAP) Detection (HTTP)<br />

<strong>PVS</strong> ID: 1607 FAMILY: Web Servers RISK: INFO NESSUS ID:11026<br />

Description: The remote host is a wireless access point (WAP).<br />

Solution: Ensure that the proper physical and logical controls exist around the WAP.<br />

CVE Not available<br />

Buffalo WBR-G54 Wireless Access Point (WAP) Detection (HTTP)<br />

<strong>PVS</strong> ID: 1608 FAMILY: Web Servers RISK: INFO NESSUS ID:11026<br />

Description: The remote host is a wireless access point (WAP).<br />

Solution: Ensure that the proper physical and logical controls exist around the WAP.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

R2 Wireless Access Point (WAP) Detection (HTTP)<br />

<strong>PVS</strong> ID: 1609 FAMILY: Web Servers RISK: INFO NESSUS ID:11026<br />

Family Internet Services 412


Description: The remote host is a wireless access point (WAP).<br />

Solution: Ensure that the proper physical and logical controls exist around the WAP.<br />

CVE Not available<br />

Wireless Access Point (WAP) Detection (HTTP)<br />

<strong>PVS</strong> ID: 1610 FAMILY: Web Servers RISK: INFO NESSUS ID:11026<br />

Description: The remote host is a wireless access point (WAP).<br />

Solution: Ensure that the proper physical and logical controls exist around the WAP.<br />

CVE Not available<br />

Wireless Access Point (WAP) Detection (HTTP)<br />

<strong>PVS</strong> ID: 1611 FAMILY: Web Servers RISK: INFO NESSUS ID:11026<br />

Description: The remote host is a wireless access point (WAP).<br />

Solution: Ensure that the proper physical and logical controls exist around the WAP.<br />

CVE Not available<br />

Wireless Access Point (WAP) Detection (HTTP)<br />

<strong>PVS</strong> ID: 1612 FAMILY: Web Servers RISK: INFO NESSUS ID:11026<br />

Description: The remote host is a wireless access point (WAP).<br />

Solution: Ensure that the proper physical and logical controls exist around the WAP.<br />

CVE Not available<br />

Wireless Access Point (WAP) Detection (HTTP)<br />

<strong>PVS</strong> ID: 1613 FAMILY: Web Servers RISK: INFO NESSUS ID:11026<br />

Description: The remote host is a wireless access point (WAP).<br />

Solution: Ensure that the proper physical and logical controls exist around the WAP.<br />

CVE Not available<br />

Wireless Access Point (WAP) Detection (HTTP)<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1614 FAMILY: Web Servers RISK: INFO NESSUS ID:11026<br />

Family Internet Services 413


Description: The remote host is a wireless access point (WAP).<br />

Solution: Ensure that the proper physical and logical controls exist around the WAP.<br />

CVE Not available<br />

Wireless Access Point (WAP) Detection (HTTP)<br />

<strong>PVS</strong> ID: 1615 FAMILY: Web Servers RISK: INFO NESSUS ID:11026<br />

Description: The remote host is a wireless access point (WAP).<br />

Solution: Ensure that the proper physical and logical controls exist around the WAP.<br />

CVE Not available<br />

Wireless Access Point (WAP) Detection (HTTP)<br />

<strong>PVS</strong> ID: 1616 FAMILY: Web Servers RISK: INFO NESSUS ID:11026<br />

Description: The remote host is a wireless access point (WAP).<br />

Solution: Ensure that the proper physical and logical controls exist around the WAP.<br />

CVE Not available<br />

Wireless Access Point (WAP) Detection (HTTP)<br />

<strong>PVS</strong> ID: 1617 FAMILY: Web Servers RISK: INFO NESSUS ID:11026<br />

Description: The remote host is a wireless access point (WAP).<br />

Solution: You should Ensure that the proper physical and logical controls exist around the WAP.<br />

CVE Not available<br />

Wireless Access Point (WAP) Detection (HTTP)<br />

<strong>PVS</strong> ID: 1618 FAMILY: Web Servers RISK: INFO NESSUS ID:11026<br />

Description: The remote host is a wireless access point (WAP).<br />

Solution: Ensure that the proper physical and logical controls exist around the WAP.<br />

CVE Not available<br />

Wireless Access Point (WAP) Detection (HTTP)<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1619 FAMILY: Web Servers RISK: INFO NESSUS ID:11026<br />

Family Internet Services 414


Description: The remote host is a wireless access point (WAP).<br />

Solution: Ensure that the proper physical and logical controls exist around the WAP.<br />

CVE Not available<br />

Wireless Access Point (WAP) Detection (HTTP)<br />

<strong>PVS</strong> ID: 1620 FAMILY: Web Servers RISK: INFO NESSUS ID:11026<br />

Description: The remote host is a wireless access point (WAP).<br />

Solution: Ensure that the proper physical and logical controls exist around the WAP.<br />

CVE Not available<br />

Wireless Access Point (WAP) Detection (HTTP)<br />

<strong>PVS</strong> ID: 1621 FAMILY: Web Servers RISK: INFO NESSUS ID:11026<br />

Description: The remote host is a wireless access point (WAP).<br />

Solution: Ensure that the proper physical and logical controls exist around the WAP.<br />

CVE Not available<br />

NETGEAR Wireless Access Point (WAP) Detection (HTTP)<br />

<strong>PVS</strong> ID: 1622 FAMILY: Web Servers RISK: INFO NESSUS ID:11026<br />

Description: The remote host is a wireless access point (WAP).<br />

Solution: Ensure that the proper physical and logical controls exist around the WAP.<br />

CVE Not available<br />

NETGEAR Wireless Access Point (WAP) Detection (HTTP)<br />

<strong>PVS</strong> ID: 1623 FAMILY: Web Servers RISK: INFO NESSUS ID:11026<br />

Description: The remote host is a wireless access point (WAP).<br />

Solution: Ensure that the proper physical and logical controls exist around the WAP.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Broadcom Wireless Access Point (WAP) Detection (HTTP)<br />

<strong>PVS</strong> ID: 1624 FAMILY: Web Servers RISK: INFO NESSUS ID:11026<br />

Family Internet Services 415


Description: The remote host is a wireless access point.<br />

Solution: Ensure that the proper physical and logical controls exist around the WAP.<br />

CVE Not available<br />

Apache < 1.3.14 Multiple Forward Slash Directory Listing<br />

<strong>PVS</strong> ID: 1625 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10440<br />

Description: Synopsis :\n\nThe web server allows the listing of directory contents.\n\nThe Apache<br />

server is running a version which allows directory indexing by sending many / characters<br />

into the web request<br />

Solution: Upgrade to version 1.3.14 or higher.<br />

CVE-2000-0505<br />

Stalkerlab Mailers CGIMail.exe Arbitrary File Retrieval<br />

<strong>PVS</strong> ID: 1626 FAMILY: Web Servers RISK: LOW NESSUS ID:11721<br />

Description: The script CgiMail.exe exists on the remote web server. Some versions of this script are<br />

vulnerable to a remote exploit.<br />

Solution: Upgrade CgiMail.exe<br />

CVE-2000-0726<br />

Trend Micro Virus Buster cgiWebupdate.exe Arbitrary File Access<br />

<strong>PVS</strong> ID: 1627 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11722<br />

Description: The script CgiWebupdate.exe exists on the remote web server. Some versions of this script<br />

are vulnerable to a remote exploit.<br />

Solution: Upgrade or patch CgiWebupdate.exe<br />

CVE-2001-1150<br />

PDGSoft Shopping Cart redirect.exe Remote Overflow<br />

<strong>PVS</strong> ID: 1628 FAMILY: Web Servers RISK: HIGH NESSUS ID:11723<br />

Description: The executable redirect.exe exists on the remote web server. Some versions of this script<br />

are vulnerable to a remote exploit.<br />

Solution: Apply vendor patches<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 416


CVE-2000-0401<br />

PDGSoft Shopping Cart changepw.exe Remote Overflow<br />

<strong>PVS</strong> ID: 1629 FAMILY: Web Servers RISK: HIGH NESSUS ID:11723<br />

Description: The executable changepw.exe exists on the remote web server. Some versions of this script<br />

are vulnerable to a remote exploit.<br />

Solution: Apply vendor patches<br />

counter.exe Detection<br />

CVE-2000-0401<br />

<strong>PVS</strong> ID: 1630 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11725<br />

Description: The executable counter.exe appears to exist on the remote web server. This may be part of<br />

an old package simply called "Counter.exe", or part of the Behold! Software Web Page<br />

Counter package. Some versions of this script are vulnerable to remote exploits.<br />

Solution: No solution is known at this time.<br />

CVE-1999-1031<br />

WebLogic FileServlet Source Code Disclosure<br />

<strong>PVS</strong> ID: 1631 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11724<br />

Description: By inserting a /ConsoleHelp/ into a URL, critical source code files may be viewed.<br />

Solution: Upgrade to versions recommended by the vendor.<br />

CVE-2000-0682<br />

CSNews.cgi Arbitrary File Access<br />

<strong>PVS</strong> ID: 1632 FAMILY: Web Servers RISK: HIGH NESSUS ID:11726<br />

Description: The CSNews.cgi seems to exist on this web server. Some versions of this file are<br />

vulnerable to a remote exploit.<br />

Solution: No solution is known at this time.<br />

CVE-2002-0923<br />

NetWin CWMail.exe < 2.8a Remote Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 417


<strong>PVS</strong> ID: 1633 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11727<br />

Description: The executable CWMail.exe exists on this web server. Some versions of this file are<br />

vulnerable to a remote exploit.<br />

Solution: Upgrade to version 2.8a or higher.<br />

CVE-2002-0273<br />

Excite for Web Servers (EWS) AT-admin.cgi Remote Password Disclosure<br />

<strong>PVS</strong> ID: 1634 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: The AT-admin.cgi file exists on this web server. This CGI is part of the Excite for Web<br />

Servers (EWS) package. Some versions of this file may allow a local attacker to gain<br />

access to the Architext.conf file, allowing privilege escalation.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-1999-1072<br />

CSMailto.cgi Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1635 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The CSMailto.cgi file exists on this web server. Some versions of this file are vulnerable to<br />

multiple remote issues.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-0749<br />

UltraBoard UltraBoard.cgi Arbitrary File Access<br />

<strong>PVS</strong> ID: 1636 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The UltraBoard.cgi file exists on this web server. This CGI can be used to access arbitrary<br />

files on the server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2000-0332<br />

UltraBoard UltraBoard.pl Arbitrary File Access<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1637 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: The UltraBoard.pl file exists on this web server. This CGI can be used to access arbitrary<br />

files on the server.<br />

Family Internet Services 418


Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2000-0332<br />

YaBB YaBB.cgi num Parameter XSS<br />

<strong>PVS</strong> ID: 1638 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: The YaBB.cgi file exists on this web server. Some versions of the YaBB installation are<br />

vulnerable to a cross-site scripting vulnerability.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-0955<br />

Drummond Miles A1Statistics a1disp4.cgi Traversal Arbitrary File Read<br />

<strong>PVS</strong> ID: 1639 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: The Drummond Miles A1Statistics a1disp4.cgi file exists on this web server. Some<br />

versions of this file are vulnerable to a remote traversal attack that allows read access to<br />

arbitrary files.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2001-0561<br />

Cobalt RAQ alert.cgi XSS<br />

<strong>PVS</strong> ID: 1640 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: The alert.cgi file exists on this web server. Some versions of this file are vulnerable to a<br />

cross-site scripting exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-0346<br />

Aplio Internet Phone authenticate.cgi Arbitrary Command Execution<br />

<strong>PVS</strong> ID: 1641 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: The authenticate.cgi script exists on this web server. Some versions of this file may allow a<br />

remote attacker to execute arbitrary commands on the host with the same privileges as the<br />

web server.<br />

Solution: Update or patch according to vendor recommendations.<br />

CVE-2000-0923<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Extropia WebBBS bbs_forum.cgi Remote Command Execution<br />

Family Internet Services 419


<strong>PVS</strong> ID: 1642 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: The bbs_forum.cgi script exists on this web server. Some versions of this file may allow a<br />

remote attacker to execute arbitrary commands with the same privileges as the web server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2001-0123<br />

BNBForm bnbform.cgi Automessage Arbitrary File Retrieval<br />

<strong>PVS</strong> ID: 1643 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: The bnbform.cgi script exists on this web server. Some versions of this file may<br />

allow an attacker to access arbitrary files on the server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-1999-0937<br />

bsguest.cgi Guestbook Email Address Variable Arbitrary Command Execution<br />

<strong>PVS</strong> ID: 1644 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: The bsguest.cgi script exists on this web server. Some versions of this file may allow a<br />

remote attacker to execute arbitrary commands with the same privileges as the web server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2001-0099<br />

bslist.cgi Email Address Variable Arbitrary Command Execution<br />

<strong>PVS</strong> ID: 1645 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: The bslist.cgi script exists on this web server. Some versions of this file may allow a<br />

remote attacker to execute arbitrary commands with the same privileges as the web server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2001-0100<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Aktivate Shopping System catgy.cgi desc Parameter XSS<br />

<strong>PVS</strong> ID: 1646 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: The catgy.cgi script exists on this web server. Some versions of this file are vulnerable to a<br />

cross-site scripting vulnerability.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

Family Internet Services 420


CVE-2001-1212<br />

cgforum.cgi Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1647 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The cgforum.cgi script exists on this web server. Some versions of this file are vulnerable<br />

to a remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-1334<br />

classifieds.cgi Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1648 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: The classifieds.cgi script exists on this web server. Some versions of this file are vulnerable<br />

to remote exploits such as arbitrary command execution, arbitrary file overwrite, and<br />

arbitrary file access.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-1600<br />

csPassword.cgi Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1649 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The csPassword.cgi script exists on this web server. Some versions of this file are<br />

vulnerable to a remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-1334<br />

cvsview2.cgi Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1650 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The cvsview2.cgi script exists on this web server. Some versions of this file are vulnerable<br />

to a remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2003-0153<br />

cvslog.cgi Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1651 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Family Internet Services 421


Description: The cvslog.cgi script exists on this web server. Some versions of this file are vulnerable to<br />

a remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-0955<br />

multidiff.cgi Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1652 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The multidiff.cgi script exists on this web server. Some versions of this file are vulnerable<br />

to a remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2003-0153<br />

dnewsweb.cgi Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1653 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The dnewsweb.cgi script exists on this web server. Some versions of this file are vulnerable<br />

to a remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-1334<br />

download.cgi Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1654 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The download.cgi script exists on this web server. Some versions of this file are vulnerable<br />

to a remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-1334<br />

edit_action.cgi Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1655 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The edit_action.cgi script exists on this web server. Some versions of this file are<br />

vulnerable to a remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-1334<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 422


emumail.cgi Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1656 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The emumail.cgi script exists on this web server. Some versions of this file are vulnerable<br />

to a remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-1334<br />

everythingform.cgi Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1657 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The everythingform.cgi script exists on this web server. Some versions of this file are<br />

vulnerable to a remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-1334<br />

ezadmin.cgi Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1658 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The ezadmin.cgi script exists on this web server. Some versions of this file are vulnerable<br />

to a remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-1334<br />

ezboard.cgi Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1659 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The ezboard.cgi script exists on this web server. Some versions of this file are vulnerable to<br />

a remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-1334<br />

ezman.cgi Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1660 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The ezman.cgi script exists on this web server. Some versions of this file are vulnerable to<br />

a remote exploit.<br />

Family Internet Services 423


Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-0955<br />

ezadmin.cgi Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1661 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The ezadmin.cgi script exists on this web server. Some versions of this file are vulnerable<br />

to a remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-0955<br />

FileSeek.cgi Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1662 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The FileSeek.cgi script exists on this web server. Some versions of this file are vulnerable<br />

to a remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-1334<br />

fom.cgi Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1663 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The fom.cgi script exists on this web server. Some versions of this file are vulnerable to a<br />

remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2001-0561<br />

gbook.cgi Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1664 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The gbook.cgi script exists on this webserver. Some versions of this file are vulnerable to a<br />

remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-1334<br />

getdoc.cgi Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1665 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Family Internet Services 424


Description: The getdoc.cgi scripts exists on this web server. Some versions of this file are vulnerable to<br />

a remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2001-0561<br />

global.cgi Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1666 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The global.cgi scripts exists on this webserver. Some versions of this file are vulnerable to<br />

a remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2001-0561<br />

guestserver.cgi Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1667 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The guestserver.cgi script exists on this web server. Some versions of this file are<br />

vulnerable to a remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2001-0561<br />

imageFolio.cgi Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1668 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The imageFolio.cgi script exists on this web server. Some versions of this file are<br />

vulnerable to a remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-0955<br />

lastlines.cgi Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1669 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The lastlines.cgi script exists on this web server. Some versions of this file are vulnerable to<br />

a remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2001-0561<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 425


mailfile.cgi Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1670 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The mailfile.cgi status exists on this web server. Some versions of this file are vulnerable to<br />

a remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-1334<br />

mailview.cgi Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1671 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The mailview.cgi script exists on this web server. Some versions of this file are vulnerable<br />

to a remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-0955<br />

sendmessage.cgi Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1672 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The sendmessage.cgi script exists on this web server. Some versions of this file are<br />

vulnerable to a remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-0955<br />

nsManager.cgi Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1673 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The nsManager.cgi script exists on this web server. Some versions of this file are<br />

vulnerable to a remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-0955<br />

perlshop.cgi Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1674 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The perlshop.cgi script exists on this web server. Some versions of this file are vulnerable<br />

to a remote exploit.<br />

Family Internet Services 426


Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-0955<br />

readmail.cgi Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1675 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The readmail.cgi script exists on this web server. Some versions of this file are vulnerable<br />

to a remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-0955<br />

printmail.cgi Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1676 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The printmail.cgi script exists on this web server. Some versions of this file are vulnerable<br />

to a remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2001-0561<br />

register.cgi Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1677 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The register.cgi script exists on this web server. Some versions of this file are vulnerable to<br />

a remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-0955<br />

sendform.cgi Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1678 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The sendform.cgi script exists on this web server. Some versions of this file are vulnerable<br />

to a remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-0955<br />

sendmessage.cgi Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1679 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Family Internet Services 427


Description: The sendmessage.cgi script exists on this web server. Some versions of this file are<br />

vulnerable to a remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-1334<br />

service.cgi Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1680 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The service.cgi script exists on this web server. Some versions of this file are vulnerable to<br />

a remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-0955<br />

setpasswd.cgi Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1681 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The setpasswd.cgi script exists on this web server. Some versions of this file are vulnerable<br />

to a remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-0955<br />

simplestmail.cgi Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1682 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The simplestmail.cgi script exists on this web server. Some versions of this file are<br />

vulnerable to a remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-1334<br />

simplestguest.cgi Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1683 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The simplestguest.cgi script exists on this web server. Some versions of this file are<br />

vulnerable to a remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-1334<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 428


talkback.cgi Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1684 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The talkback.cgi script exists on this web server. Some versions of this file are vulnerable<br />

to a remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-0955<br />

ttawebtop.cgi Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1685 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The ttawebtop.cgi script exists on this web server. Some versions of this file are vulnerable<br />

to a remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-1334<br />

ws_mail.cgi Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1686 FAMILY: Web Servers RISK: HIGH NESSUS ID:11748<br />

Description: The ws_mail.cgi script exists on this web server. Some versions of this file are vulnerable<br />

to a remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-0955<br />

ddicgi.exe Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1687 FAMILY: CGI RISK: HIGH NESSUS ID:11728<br />

Description: The ddicgi.exe script exists on this web server. Some versions of this file are vulnerable to<br />

a remote exploit.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2000-0828<br />

Microsoft FrontPage Extensions Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1688 FAMILY: Web Servers RISK: NONE NESSUS ID:10077<br />

Description: The remote web server appears to be running FrontPage extensions. Check the server<br />

configuration since multiple security issues have been found with FrontPage when the<br />

configuration file is not configured correctly.<br />

Family Internet Services 429


Solution: If not required, disable FrontPage extensions. Otherwise, disable anonymous access to the<br />

resource.<br />

CVE-2000-0114<br />

Microsoft FrontPage Extensions Detection<br />

<strong>PVS</strong> ID: 1689 FAMILY: Web Servers RISK: NONE NESSUS ID:10077<br />

Description: The remote web server appears to be running FrontPage extensions. Check the server<br />

configuration since multiple security issues have been found with FrontPage when the<br />

server is not configured correctly.<br />

Solution: If not required, disable FrontPage extensions. Otherwise, disable anonymous access to the<br />

resource.<br />

CVE-2000-0114<br />

Microsoft FrontPage Extensions Detection<br />

<strong>PVS</strong> ID: 1690 FAMILY: Web Servers RISK: NONE NESSUS ID:10077<br />

Description: The remote web server appears to be running FrontPage extensions. Check the server<br />

configuration since multiple security issues have been found with FrontPage when the<br />

server is not configured correctly.<br />

Solution: If not required, disable FrontPage extensions. Otherwise, disable anonymous access to the<br />

resource.<br />

CVE-2000-0114<br />

Microsoft IIS FrontPage Visual Studio RAD Support fp30reg.dll Overflow<br />

<strong>PVS</strong> ID: 1691 FAMILY: Web Servers RISK: HIGH NESSUS ID:10699<br />

Description: Microsoft IIS, running FrontPage extensions with Visual Studio RAD support, is<br />

vulnerable to a remote code execution.<br />

Solution: See http://www.microsoft.com/technet/security/bulletin/MS01-035.asp for a patch<br />

CVE-2001-0341<br />

Hosting Controller Multiple Script Arbitrary Directory Browsing<br />

<strong>PVS</strong> ID: 1692 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11745<br />

Description: The Hosting Controller application resides on this server. This version is vulnerable to<br />

multiple remote exploits. See<br />

http://archives.neohapsis.com/archives/bugtraq/2002-01/0039.html for more information<br />

Family Internet Services 430


Solution: No solution is known at this time.<br />

CVE-2002-0466<br />

Hosting Controller Multiple Script Arbitrary Directory Browsing<br />

<strong>PVS</strong> ID: 1693 FAMILY: Web Servers RISK: HIGH NESSUS ID:11746<br />

Description: The Hosting Controller application resides on this server. This version is vulnerable to<br />

multiple remote exploits. See<br />

http://archives.neohapsis.com/archives/bugtraq/2002-01/0039.html for more information<br />

Solution: No solution is known at this time.<br />

CVE-2001-0938<br />

Hosting Controller Multiple Script Arbitrary Directory Browsing<br />

<strong>PVS</strong> ID: 1694 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11745<br />

Description: The Hosting Controller application resides on this server. This version is vulnerable to<br />

multiple remote exploits. See<br />

http://archives.neohapsis.com/archives/bugtraq/2002-01/0039.html for more information<br />

Solution: No solution is known at this time.<br />

CVE-2002-0466<br />

Hosting Controller Multiple Script Arbitrary Directory Browsing<br />

<strong>PVS</strong> ID: 1695 FAMILY: Web Servers RISK: HIGH NESSUS ID:11746<br />

Description: The Hosting Controller application resides on this server. This version is vulnerable to<br />

multiple remote exploits. See<br />

http://archives.neohapsis.com/archives/bugtraq/2002-01/0039.html for more information<br />

Solution: No solution is known at this time.<br />

CVE-2001-0938<br />

Hosting Controller Multiple Script Arbitrary Directory Browsing<br />

<strong>PVS</strong> ID: 1696 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11745<br />

Description: The Hosting Controller application resides on this server. This version is vulnerable to<br />

multiple remote exploits. See<br />

http://archives.neohapsis.com/archives/bugtraq/2002-01/0039.html for more information<br />

Family Internet Services 431


Solution: No solution is known at this time.<br />

CVE-2002-0466<br />

Hosting Controller Multiple Script Arbitrary Directory Browsing<br />

<strong>PVS</strong> ID: 1697 FAMILY: Web Servers RISK: HIGH NESSUS ID:11746<br />

Description: The Hosting Controller application resides on this server. This version is vulnerable to<br />

multiple remote exploits. See<br />

http://archives.neohapsis.com/archives/bugtraq/2002-01/0039.html for more information<br />

Solution: No solution is known at this time.<br />

CVE-2001-0938<br />

Hosting Controller Multiple Script Arbitrary Directory Browsing<br />

<strong>PVS</strong> ID: 1698 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11745<br />

Description: The Hosting Controller application resides on this server. This version is vulnerable to<br />

multiple remote exploits. See<br />

http://archives.neohapsis.com/archives/bugtraq/2002-01/0039.html for more information<br />

Solution: No solution is known at this time.<br />

CVE-2002-0466<br />

Hosting Controller Multiple Script Arbitrary Directory Browsing<br />

<strong>PVS</strong> ID: 1699 FAMILY: Web Servers RISK: HIGH NESSUS ID:11746<br />

Description: The Hosting Controller application resides on this server. This version is vulnerable to<br />

multiple remote exploits. See<br />

http://archives.neohapsis.com/archives/bugtraq/2002-01/0039.html for more information<br />

Solution: No solution is known at this time.<br />

CVE-2001-0938<br />

Hosting Controller Multiple Script Arbitrary Directory Browsing<br />

<strong>PVS</strong> ID: 1700 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11745<br />

Description: The Hosting Controller application resides on this server. This version is vulnerable to<br />

multiple remote exploits. See<br />

http://archives.neohapsis.com/archives/bugtraq/2002-01/0039.html for more information<br />

Solution: No solution is known at this time.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 432


CVE-2002-0466<br />

Hosting Controller Multiple Script Arbitrary Directory Browsing<br />

<strong>PVS</strong> ID: 1701 FAMILY: Web Servers RISK: HIGH NESSUS ID:11746<br />

Description: The Hosting Controller application resides on this server. This version is vulnerable to<br />

multiple remote exploits. See<br />

http://archives.neohapsis.com/archives/bugtraq/2002-01/0039.html for more information<br />

Solution: No solution is known at this time.<br />

CVE-2001-0938<br />

Microsoft IIS bdir.htr Directory Listing<br />

<strong>PVS</strong> ID: 1702 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10577<br />

Description: The file bdir.htr is a default IIS file which can give a malicious user information about your<br />

file system.<br />

Solution: Obtain patch from Microsoft. If not required, delete the file.<br />

CVE Not available<br />

Microsoft IIS 5.0 PROPFIND Remote DoS<br />

<strong>PVS</strong> ID: 1703 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10667<br />

Description: The remote IIS web server has PROPFIND enabled. There is at least one exploit which<br />

utilizes the PROPFIND vector in order to compromise IIS web servers.<br />

Solution: Use URLSCAN to disable PROPFIND requests. In addition, ensure that your system has<br />

installed all relevant IIS patches.<br />

CVE-2001-0151<br />

Microsoft IIS viewcode.asp Arbitrary File Access<br />

<strong>PVS</strong> ID: 1704 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10576<br />

Description: The file viewcode.asp is a default IIS file which can give a malicious user a information<br />

about your file system or source files. Specifically, viewcode.asp can allow a remote user to<br />

potentially read any file on a web server's hard drive.<br />

Solution: Delete the file if not needed, or use suitable access control lists to ensure that the file is not<br />

world-readable.<br />

Family Internet Services 433


CVE-1999-0737<br />

Microsoft IIS viewcode.asp Arbitrary File Access<br />

<strong>PVS</strong> ID: 1705 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10576<br />

Description: The file viewcode.asp is a default IIS file which can give a malicious user information<br />

about your file system or source files. Specifically, viewcode.asp can allow a remote user to<br />

potentially read any file on a web server's hard drive.<br />

Solution: Delete the file if not needed or use suitable access control lists to ensure that the file is not<br />

world readable.<br />

CVE-1999-0737<br />

Microsoft IIS viewcode.asp Arbitrary File Access<br />

<strong>PVS</strong> ID: 1706 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10576<br />

Description: The file viewcode.asp is a default IIS file that can give a malicious user information about<br />

your file system or source files. Specifically, viewcode.asp can allow a remote user to<br />

potentially read any file on a web server's hard drive.<br />

Solution: Delete the file if not needed or use suitable access control lists to ensure that the file is not<br />

world readable.<br />

CVE-1999-0737<br />

Microsoft IIS viewcode.asp Arbitrary File Access<br />

<strong>PVS</strong> ID: 1707 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10576<br />

Description: The file viewcode.asp is a default IIS file that can give a malicious user information about<br />

your file system or source files. Specifically, viewcode.asp can allow a remote user to<br />

potentially read any file on a web server's hard drive.<br />

Solution: Delete the file if not needed or use suitable access control lists to ensure that the file is not<br />

world readable.<br />

CVE-1999-0737<br />

Microsoft IIS viewcode.asp Arbitrary File Access<br />

<strong>PVS</strong> ID: 1708 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10576<br />

Family Internet Services 434


Description: The file viewcode.asp is a default IIS file that can give a malicious user information about<br />

your file system or source files. Specifically, viewcode.asp can allow a remote user to<br />

potentially read any file on a web server's hard drive.<br />

Solution: Delete the file if not needed or use suitable access control lists to ensure that the file is not<br />

world readable.<br />

CVE-1999-0737<br />

Microsoft IIS viewcode.asp Arbitrary File Access<br />

<strong>PVS</strong> ID: 1709 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10576<br />

Description: The file viewcode.asp is a default IIS file that can give a malicious user information about<br />

your file system or source files. Specifically, viewcode.asp can allow a remote user to<br />

potentially read any file on a web server's hard drive.<br />

Solution: Delete the file if not needed or use suitable access control lists to ensure that the files are<br />

not world readable.<br />

CVE-1999-0737<br />

Microsoft IIS viewcode.asp Arbitrary File Access<br />

<strong>PVS</strong> ID: 1710 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10576<br />

Description: The file viewcode.asp is a default IIS files that can give a malicious user information about<br />

your file system or source files. Specifically, viewcode.asp can allow a remote user to<br />

potentially read any file on a web server's hard drive.<br />

Solution: Delete the file if not needed or use suitable access control lists to ensure that the files are<br />

not accessible without credentials.<br />

CVE-1999-0737<br />

ION ion-p.exe Traversal File Access<br />

<strong>PVS</strong> ID: 1711 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11729<br />

Description: The ion-p.exe file exists on this web server. Some versions of this file are vulnerable to<br />

remote exploit.<br />

Solution: No solution is known at this time.<br />

CVE-2002-1559<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Netdynamics ndcgi.exe Previous User Session Replay<br />

Family Internet Services 435


<strong>PVS</strong> ID: 1712 FAMILY: Web Servers RISK: HIGH NESSUS ID:11730<br />

Description: The Netdynamics ndcgi.exe CGI exists on this web server. Some versions of this file are<br />

vulnerable to remote session replay exploit.<br />

Solution: No solution is known at this time.<br />

CVE-2001-0922<br />

TrendMicro eManager Detection<br />

<strong>PVS</strong> ID: 1713 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11747<br />

Description: TrendMicro's eManager software resides on this server. Some versions of this software<br />

have DLL files that are vulnerable to remote overflows.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2001-0958<br />

AspUpload Multiple Script File Upload / Directory Traversal<br />

<strong>PVS</strong> ID: 1714 FAMILY: Web Servers RISK: HIGH NESSUS ID:11746<br />

Description: The AspUpload software resides on this server. Some versions of this software are<br />

vulnerable to remote exploit.<br />

Solution: No solution is known at this time.<br />

CVE-2001-0938<br />

Lucent VitalNet VsSetCookie.exe Direct Request Authentication Bypass<br />

<strong>PVS</strong> ID: 1715 FAMILY: Web Servers RISK: HIGH NESSUS ID:11731<br />

Description: The VsSetCookie.exe exists on this web server. Some versions of this file are vulnerable to<br />

a remote authentication bypass vulnerability.<br />

Solution: Patch or upgrade according to vendor recommendations.<br />

CVE-2002-0236<br />

Netwin WebNews Webnews.exe Remote Overflow<br />

<strong>PVS</strong> ID: 1716 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11732<br />

Description: Webnews.exe exists on this web server. Some versions of this file are vulnerable to a<br />

remote overflow vulnerability.<br />

Family Internet Services 436


Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-0290<br />

Microsoft IIS Patch Level Detection (English versions only)<br />

<strong>PVS</strong> ID: 1717 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

Description: The remote IIS server appears to be running - IIS 4 ServicePack 0.<br />

Solution: Ensure that you are running the latest version of IIS.<br />

CVE Not available<br />

Microsoft IIS Patch Level Detection (English versions only)<br />

<strong>PVS</strong> ID: 1718 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

NESSUS ID:<br />

Description: The remote IIS server appears to be running - IIS 4.0 ServicePack 6.<br />

Solution: Ensure that you are running the latest version of IIS.<br />

CVE Not available<br />

Microsoft IIS Patch Level Detection (English versions only)<br />

<strong>PVS</strong> ID: 1719 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

Description: The remote IIS server appears to be running - IIS 5.0 ServicePack 0 or 1.<br />

Solution: Ensure that you are running the latest version of IIS.<br />

CVE Not available<br />

Microsoft IIS Patch Level Detection (English versions only)<br />

<strong>PVS</strong> ID: 1720 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

NESSUS ID:Not Available<br />

Description: The remote IIS server appears to be running - IIS 5.0 ServicePack 2 or SP2srp1.<br />

Solution: Ensure that you are running the latest version of IIS.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Microsoft IIS Patch Level Detection (English versions only)<br />

<strong>PVS</strong> ID: 1721 FAMILY: Web Servers NESSUS ID:Not Available<br />

Family Internet Services 437


RISK:<br />

MEDIUM<br />

Description: The remote IIS server appears to be running - IIS 5.0 ServicePack 3.<br />

Solution: Ensure that you are running the latest version of IIS.<br />

CVE Not available<br />

Microsoft IIS Patch Level Detection (English versions only)<br />

<strong>PVS</strong> ID: 1722 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

Description: The remote IIS server appears to be running - IIS 5.0 ServicePack 4.<br />

Solution: Ensure that you are running the latest version of IIS.<br />

CVE Not available<br />

Apache Web Server Detection<br />

NESSUS ID:Not Available<br />

<strong>PVS</strong> ID: 1723 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running an Apache web server.<br />

Solution: N/A<br />

CVE Not available<br />

Microsoft Web Server Detection<br />

<strong>PVS</strong> ID: 1724 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running a Microsoft IIS web server.<br />

Solution: N/A<br />

CVE Not available<br />

Kerio Mailserver Embedded HTTP Server Multiple Unspecified Vulnerabilities<br />

<strong>PVS</strong> ID: 1725 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is running a vulnerable version of Kerio MailServer. Kerio MailServer is a<br />

mail server designed for use with Microsoft Windows, Linux and Unix operating systems.<br />

Kerio MailServer versions prior to 6.0.1 are reported to have multiple unspecified<br />

vulnerabilities.<br />

Solution: Upgrade to Kerio MailServer 6.0.1 or higher<br />

Family Internet Services 438


CVE Not available<br />

CuteNews show_archives.php XSS<br />

<strong>PVS</strong> ID: 1726 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host is running CuteNews, a news management system implemented in PHP. It<br />

is reported that this version of CuteNews is affected by a cross-site scripting (XSS)<br />

vulnerability. This issue is due to a failure of the application to properly sanitize<br />

user-supplied URI input. An attacker may execute malicious code in a victim's browser and<br />

steal credentials on this site.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

QuiXplorer < 2.3.1 item Parameter Directory Traversal File Access<br />

<strong>PVS</strong> ID: 1727 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host may be running a vulnerable version of QuiXplorer, a Web based<br />

application implemented in PHP that allows users to browse files and directories on a Web<br />

server. QuiXplorer versions up to 2.3 are prone to a directory traversal vulnerability. An<br />

attacker may access arbitrary files on a vulnerable computer in the context of the affected<br />

server.<br />

Solution: Upgrade QuiXplorer to version 2.3.1 or higher.<br />

CVE Not available<br />

AWStats Rawlog Plugin Logfile Parameter Arbitrary Command Execution<br />

<strong>PVS</strong> ID: 1728 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host is running AWStats, a CGI log analyzer that generates statistic reports<br />

based on HTTP, SMTP or FTP logs. AWStats Rawlog Plugin is reported prone to an input<br />

validation vulnerability. A remote attacker may supply shell metacharacters and commands<br />

as a value for the 'logfile' URI parameter. These commands and metacharacters will be<br />

processed by the underlying shell, resulting in the execution of commands in the context of<br />

the hosting web server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

phpBB < 2.0 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1729 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 439


Description: Synopsis :\n\nThe remote web server contains a script which is vulnerable to a SQL<br />

injection attack.\n\nThe remote host is running an old version of phpBB, a bulletin board<br />

application implemented in PHP. It is reported that phpBB versions prior 2.0 are vulnerable<br />

to multiple security issues including SQL injection, arbitrary command execution, database<br />

corruption and denial of service.<br />

Solution: Upgrade to phpBB 2.0 or higher.<br />

CVE-2002-0533<br />

WackoWiki < R4.0 TextSearch XSS<br />

<strong>PVS</strong> ID: 1730 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a cross-site scripting (XSS) attack.\n\nThe<br />

remote host is running a vulnerable WackoWiki, a lightweight Wiki-clone implemented in<br />

PHP. It is reported that WackoWiki R3.5 is susceptible to a cross-site scripting<br />

vulnerability in its textsearch form. This may allow for theft of cookie-based authentication<br />

credentials or other attacks.<br />

Solution: Upgrate to WackoWiki R4.0 or higher.<br />

CVE-2004-2624<br />

PScript PForum < 1.26 User Profile XSS<br />

<strong>PVS</strong> ID: 1731 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is running a vulnerable version of PForum, a web forum software<br />

implemented in PHP. It is reported that versions prior 1.26 are vulnerable to cross-site<br />

scripting (XSS). An attacker may include malicious HTML in the 'AIM ID' and 'IRC<br />

Server' fields of his profile. This malicious code may be rendered by a victim's browser<br />

displaying the attacker profile. It may permit the attacker to steal cookie-based<br />

authentication credentials or to exploit latent security flaws in web browsers.<br />

Solution: Upgrade to PScript PForum 1.26 or higher.<br />

CVE-2004-1716<br />

Powie PHP Forum < 1.15 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1732 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script which is vulnerable to a SQL<br />

injection attack.\n\nThe remote host is running an old version of Powie PHP Forum, a web<br />

forum software implemented in PHP. It is reported that version prior 1.15 are vulnerable to<br />

multiple security issue including cross-site scripting and SQL injection. An attacker may<br />

gain access on the forum as a specific user or as an administrator or steal a victim's<br />

cookie-based authentication credentials using malicious HTML code.<br />

Family Internet Services 440


Solution: Upgrade to Powie PHP Forum 1.15 or higher.<br />

CVE-2002-0319<br />

Sympa < 4.1.2 List Creation Authentication Bypass<br />

<strong>PVS</strong> ID: 1733 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is running wwsympa.fcgi, a web interface for the Sympa mailing list<br />

manager. It is reported that this version of Sympa may permit an attacker to bypass the list<br />

master authentication in order to create unauthorized mailing list.<br />

Solution: Upgrade to version 4.1.2 or higher.<br />

HTTP Proxy Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 1734 FAMILY: Web Clients RISK: NONE NESSUS ID:Not Available<br />

Description: The remote host is a proxy server. <strong>PVS</strong> has determined this due to the manner of header<br />

values: \n%L<br />

Solution: N/A<br />

Web Client Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 1735 FAMILY: Web Clients RISK: NONE NESSUS ID:Not Available<br />

Description: The remote host is using the following web client : \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Lynx Command Line URL CRLF Injection<br />

<strong>PVS</strong> ID: 1736 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is using Lynx as a web browser. The version used is vulnerable to a<br />

command line header injection which may allow an attacker to use Lynx to send potentially<br />

harmful requests. An attacker may use this flaw to attack third party hosts even from a<br />

limited (ie: lynx-only) environment. The version used on the remote host is : \n%L<br />

Solution: No solution is known at this time.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 441


CVE-2002-1405<br />

Lynx < 2.8.5 dev 6 Syslog URI Format String<br />

<strong>PVS</strong> ID: 1737 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host is using Lynx as a web browser. The version used is vulnerable to a format<br />

string vulnerability (present only when the syslog() is activated for URIs). An attacker may<br />

use this flaw by setting up a rogue web server with a malformed URI that contains a format<br />

string. The attacker would then be able to execute commands with the privileges of the<br />

user. The version used on the remote host is : \n %L<br />

Solution: Upgrade to Lynx 2.8.5 dev 6 or higher.<br />

CVE Not available<br />

Lynx < 2.8.3pre5 Long URL Buffer Overflow<br />

<strong>PVS</strong> ID: 1738 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host is using Lynx as a web browser. The version used is vulnerable to several<br />

buffer overflow conditions which may allow an attacker to execute arbitrary code on this<br />

host by setting up a rogue web server and have a user of this host visit it. The version used<br />

on the remote host is : \n %L<br />

Solution: Upgrade to Lynx 2.8.3pre5 or higher.<br />

CVE-2000-0209<br />

Lynx Internal URL Verification Code Execution<br />

<strong>PVS</strong> ID: 1739 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host is using Lynx as a web browser. The version used is vulnerable to a bug<br />

which may allow a rogue web site to be considered as a local page. An attacker may<br />

eventually use this flaw to execute arbitrary code on this host, with the privileges of the<br />

user running lynx. The version used on the remote host is : \n %L<br />

Solution: No solution is known at this time.<br />

CVE-1999-1549<br />

Lynx < 2.8.1dev 10 Mailer Buffer Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1740 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: There is a buffer overflow in Lynx's mailer which may allow an attacker to execute<br />

arbitrary code on this host, provided he can lure a lynx user to visit a rogue website and<br />

click on a relevant link. The version used on the remote host is : \n %L<br />

Solution: Upgrade to version 2.8.1dev 10 or higher.<br />

Family Internet Services 442


CVE Not available<br />

Konqueror < 3.1.x Sub-Frames XSS<br />

<strong>PVS</strong> ID: 1741 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host is using KDE Konqueror as a web client. There is a bug in the version<br />

used which may allow a rogue web server to execute JavaScript code in the context of a<br />

trusted domain. It was determined that this host is using : \n %L<br />

Solution: Upgrade to Konqueror 3.1.x or higher.<br />

CVE-2002-1151<br />

Konqueror < 3.0.3 Image Handling Overflow DoS<br />

<strong>PVS</strong> ID: 1742 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is using KDE Konqueror as a web browser. There is a vulnerability in this<br />

version which may allow a rogue site to crash this browser by specifying too large of a<br />

width for the images it displays. It was determined that this host is using : \n %L<br />

Solution: Upgrade to Konqueror 3.0.3 or higher.<br />

CVE-2002-2333<br />

Wget < 1.5.4 Symlink Permission Modification<br />

<strong>PVS</strong> ID: 1743 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is using a version of wget that contains a bug that may make it chmod<br />

downloaded symlinks when the option -N is used. An attacker may use this flaw by setting<br />

up a rogue FTP server with a symlink pointing to sensitive files. It was determined that the<br />

remote host is using : \n%L<br />

Solution: Upgrade to Wget 1.5.4 or higher.<br />

CVE Not available<br />

Wget < 1.8.3 Rogue FTP Site File Deletion<br />

<strong>PVS</strong> ID: 1744 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host is using a version of wget that contains a bug that may allow a rogue FTP<br />

site being mirrored to delete arbitrary files on this host. It was determined that the remote<br />

host is using : \n%L<br />

Solution: Upgrade to version 1.8.3 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 443


CVE-2002-1565<br />

Curl < 7.4.1 Long Error Message Buffer Overflow<br />

<strong>PVS</strong> ID: 1745 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host is using a version of curl (or libcurl) which is vulnerable to a remote buffer<br />

overflow. To exploit it, an attacker would have to set up a rogue web server which would<br />

reply with maliciously-formed error messages. It was determined the remote host is using :<br />

\n%L<br />

Solution: Upgrade to curl 7.4.1 or higher.<br />

CVE-2000-0973<br />

Mozilla < 0.9 Predictable Temporary File Name File Deletion<br />

<strong>PVS</strong> ID: 1746 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host is using a version of the Mozilla web browser that uses predictable<br />

temporary file names. A local attacker may use this flaw to delete arbitrary files on this<br />

host. It was determined the remote host is using : \n%L<br />

Solution: Upgrade to Mozilla 0.9 or higher.<br />

CVE Not available<br />

Mozilla < 0.9.7 Null Byte Cookie Disclosure<br />

<strong>PVS</strong> ID: 1747 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host is using a version of the Mozilla web browser that may allow an attacker<br />

to steal the cookies of the users because of the way Mozilla handles null characters in its<br />

URLs. It was determined the remote host is running : \n%L<br />

Solution: Upgrade to Mozilla 0.9.7 or higher.<br />

CVE-2002-2013<br />

Mozilla < 1.0rc2 Local File Detection<br />

<strong>PVS</strong> ID: 1748 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is using a version of the Mozilla web browser that may allow a rogue web<br />

server to determine the existence of files on the side of the client.<br />

Solution: Upgrade to Mozilla 1.0rc2 or higher.<br />

CVE-2002-0594<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 444


Netscape < 6.2.3 Local File Detection<br />

<strong>PVS</strong> ID: 1749 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is using a version of the Netscape web browser that may allow a rogue<br />

web server to determine the existence of files on the side of the client.<br />

Solution: Upgrade to Netscape 6.2.3 or higher.<br />

CVE-2002-1126<br />

Galeon < 1.2.2 Local File Detection<br />

<strong>PVS</strong> ID: 1750 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is using a version of the Galeon web browser that may allow a rogue web<br />

server to determine the existence of files on the side of the client.<br />

Solution: Upgrade to Galeon 1.2.2 or higher.<br />

CVE-2002-0594<br />

Mozilla < 1.0rc2 IRC Client Buffer Overflow<br />

<strong>PVS</strong> ID: 1751 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is using the Mozilla web browser, which contains a built-in IRC client.<br />

There is a flaw in this version that may allow an attacker to execute arbitrary code on this<br />

host, provided the user uses it to go on IRC.<br />

Solution: Upgrade to Mozilla 1.0rc2 or higher.<br />

CVE-2002-0593<br />

Netscape < 6.2.3 IRC Client Buffer Overflow<br />

<strong>PVS</strong> ID: 1752 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is using the Netscape web browser, which contains a built-in IRC client.<br />

There is a flaw in this version that may allow an attacker to execute arbitrary code on this<br />

host, provided the user uses it to go on IRC.<br />

Solution: Upgrade to Netscape 6.2.3 or higher.<br />

CVE-2002-0593<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla < 1.0rc2 XMLHttpRequest File / Directory Disclosure<br />

<strong>PVS</strong> ID: 1753 FAMILY: Web Clients NESSUS ID:Not Available<br />

Family Internet Services 445


RISK:<br />

MEDIUM<br />

Description: The remote host is using the Mozilla web browser. This version contains a flaw that may<br />

allow a rogue web server to determine the presence of a file or even the listing of<br />

directories to be sent back to a rogue web server.<br />

Solution: Upgrade to Mozilla 1.0rc2 or higher.<br />

CVE-2002-0354<br />

Galeon < 1.2.2 XMLHttpRequest File / Directory Disclosure<br />

<strong>PVS</strong> ID: 1754 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is using the Galeon web browser. This version contains a flaw that may<br />

allow a rogue web server to determine the presence of a file or even the listing of<br />

directories to be sent back to a rogue web server.<br />

Solution: Upgrade to Galeon 1.2.2 or higher.<br />

CVE-2002-0354<br />

Netscape < 6.2.3 XMLHttpRequest File / Directory Disclosure<br />

<strong>PVS</strong> ID: 1755 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is using the Netscape web browser. This version contains a flaw that may<br />

allow a rogue web server to determine the presence of a file or even the listing of<br />

directories to be sent back to a rogue web server.<br />

Solution: Upgrade to Netscape 6.2.3 or higher.<br />

CVE-2002-0354<br />

Mozilla < 1.0.1 XMLSerializer Cross-domain Policy Access<br />

<strong>PVS</strong> ID: 1756 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is using the Mozilla web browser. The version used (%L) contains a flaw<br />

that may allow an attacker to set up a rogue web server which will gain access to the<br />

properties of other domains displayed in a frame or iframe.<br />

Solution: Upgrade to Mozilla 1.0.1, 1.1 or higher.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Galeon < 1.2.7 XMLSerializer Cross-domain Policy Access<br />

Family Internet Services 446


<strong>PVS</strong> ID: 1757 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is using the Galeon web browser. The version used (%L) contains a flaw<br />

that may allow an attacker to set up a rogue web server which will gain access to the<br />

properties of other domains displayed in a frame or iframe.<br />

Solution: Upgrade to Galeon 1.2.7 or higher.<br />

CVE Not available<br />

Mozilla < 1.1 POP3 Client Malformed Email DoS<br />

<strong>PVS</strong> ID: 1758 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is using the Mozilla web browser, which has the ability to act as a mail<br />

client. A vulnerability exists in the remote version (%L) which may allow an attacker to<br />

send a malformed email which will make Mozilla crash each time it attempts to fetch it by<br />

POP3.<br />

Solution: Upgrade to Mozilla 1.1 or higher.<br />

CVE-2002-2338<br />

Netscape < 4.78 POP3 Client Malformed Email DoS<br />

<strong>PVS</strong> ID: 1759 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is using the Netscape web browser, which has the ability to act as a mail<br />

client. A vulnerability exists in the remote version (%L) that may allow an attacker to send<br />

a malformed email which will make Netscape crash each time it attempts to fetch it by<br />

POP3.<br />

Solution: Upgrade to Netscape 4.78 or higher.<br />

CVE-2002-2338<br />

Netscape < 6.2.3 POP3 Client Malformed Email DoS<br />

<strong>PVS</strong> ID: 1760 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is using the Netscape web browser, which has the ability to act as a mail<br />

client. A vulnerability exists in the remote version (%L) that may allow an attacker to send<br />

a malformed email that will make Netscape crash each time it attempts to fetch it by POP3.<br />

Solution: Upgrade to Netscape 6.2.3 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 447


CVE-2002-2338<br />

Mozilla < 1.0.1 Plugin Path Disclosure<br />

<strong>PVS</strong> ID: 1761 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is using a version of Mozilla which is vulnerable to a path disclosure issue<br />

which may allow a rogue web server to retrieve the full path to the remote plugins.<br />

Solution: Upgrade to Mozilla 1.0.1 or higher.<br />

CVE Not available<br />

Web Server JavaScript File (.js) Copyright Information<br />

<strong>PVS</strong> ID: 1762 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server was observed responding to a web request with JavaScript code<br />

which consisted of a the following copyright information. If this JavaScript is part of an<br />

open source or third party project, you will need to ensure that your SDL covers this code<br />

as well as all code written 'in house'. The observed copyright information was: \n %L<br />

\n\nThe script code is located at: \n%P<br />

Solution: Ensure that there is code coverage within the corporate SDL.<br />

CVE Not available<br />

Opera < 7.11 Filename Extension Handling Overflow<br />

<strong>PVS</strong> ID: 1763 FAMILY: Web Clients RISK: HIGH NESSUS ID:11578<br />

Description: The remote host is using Opera as a web browser. The version installed has a buffer<br />

overflow in the portion of its code that handles the filename extensions of the web pages.<br />

An attacker may execute arbitrary code on this host by setting up a rogue web server which<br />

bogus file extensions containing a shell code.<br />

Solution: Upgrade to version 7.11 or higher.<br />

CVE-2003-1396<br />

Opera < 7.0.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1764 FAMILY: Web Clients RISK: HIGH NESSUS ID:11404<br />

Description: The remote host is using Opera. The version installed is vulnerable to various security<br />

flaws, ranging from cross-site scripting to buffer overflows. To exploit them, an attacker<br />

would need to set up a rogue web site, then lure a user of this host visit it using Opera. An<br />

attacker would then be able to execute arbitrary code on this host.<br />

Solution: Install Opera 7.0.3 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 448


CVE-2003-1397<br />

MailMax/Web Remote Installation Path Disclosure<br />

<strong>PVS</strong> ID: 1765 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: MailMax/WEB software sets a cookie that contains the full installation path of the<br />

software. A remote user with the ability to sniff the network between a user and the target<br />

server can determine the installation path.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

DeskNow Web Mail Cleartext Authentication<br />

<strong>PVS</strong> ID: 1766 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: DeskNow Web Mail login requires the username and password to be sent over the<br />

network without encryption. A remote user with access to the target user's or target<br />

server's traffic stream can view passwords.<br />

Solution: Use SSL to protect your login information.<br />

MPlayer Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 1767 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is using MPlayer. MPlayer is a software which can be used to watch<br />

movies either locally or across the Internet.<br />

Solution: Ensure that use of the software reflects the company policy.<br />

CVE Not available<br />

MPlayer < 0.92.0 ASX Header Parsing Buffer Overflow<br />

<strong>PVS</strong> ID: 1768 FAMILY: Web Clients RISK: HIGH NESSUS ID:14079<br />

Description: The remote host is using a version of MPlayer which is vulnerable to a buffer overflow. If<br />

MPlayer connects to a rogue web server, the server may send a malicious reply which will<br />

be executed on this host.\nTo exploit this vulnerability, an attacker would have to lure the<br />

user of this system to visit his website with MPlayer. The attacker then would need to have<br />

the web site send malformed replies to this host.<br />

Solution: Upgrade to MPlayer 0.92.0 or higher.<br />

CVE-2003-0835<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 449


Mozilla Web Client Detection<br />

<strong>PVS</strong> ID: 1769 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is using a Mozilla web client.<br />

Solution: N/A<br />

CVE Not available<br />

Mozilla < 1.7.1 SSL Redirect Spoofing<br />

<strong>PVS</strong> ID: 1770 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is using a version of Mozilla that is vulnerable to a SSL redirect spoofing<br />

issue which may allow a rogue web server to impersonate a legitimate SSL-enabled web<br />

site.<br />

Solution: Upgrade to Mozilla 1.7.1 or higher.<br />

CVE-2004-0761<br />

Mozilla Browser < 1.7.2 Non-FQDN SSL Certificate Spoofing<br />

<strong>PVS</strong> ID: 1771 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is using a version of Mozilla that is vulnerable to a SSL spoofing issue that<br />

may allow a rogue web server to spoof a trusted certificate from a third party web site using<br />

non-fully qualified domain name.<br />

Solution: Upgrade to version 1.7.2 or higher.<br />

CVE-2004-0761<br />

Mozilla < 1.7.1 Cross-Domain Frame Loading Vulnerability<br />

<strong>PVS</strong> ID: 1772 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is using a version of Mozilla that is vulnerable to cross-domain frame<br />

loading. It may allow an attacker to spoof the interface of a trusted web site. To exploit this<br />

vulnerability a victim will need to visit a web site operated by an attacker.<br />

Solution: Upgrade to version 1.7.1 or higher.<br />

CVE-2004-0718<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Browser


<strong>PVS</strong> ID: 1773 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is using a version of Mozilla or Mozilla Thunderbird that is vulnerable to a<br />

heap overflow vulnerability. A heap overflow has been reported for the Mozilla POP3 mail<br />

handler routines. An attacker controlled POP3 server may be able to execute arbitrary code<br />

on the client machine.<br />

Solution: Upgrade to Mozilla 1.7.1 / Thunderbird 0.7.1 or higher.<br />

CVE-2004-0757<br />

Opera < 7.54.0 Remote Location Object XSS<br />

<strong>PVS</strong> ID: 1774 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a cross-site scripting (XSS) attack.\n\nThe<br />

remote host is using Opera, which is affected by a remote location object cross-domain<br />

scripting issue. An attacker may gain access to directory contents, files and email messages<br />

that are read using Opera's email utilities.<br />

Solution: Install Opera 7.54.0 or higher.<br />

CVE-2004-2570<br />

Mozilla XML User Interface Language Browser Interface Spoofing<br />

<strong>PVS</strong> ID: 1775 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is using a version of Mozilla that is vulnerable to multiple user interface<br />

spoofing issues that may allow a rogue web server to mimic the interface of a trusted web<br />

site and prompt users to submit sensitive or private information.<br />

Solution: Upgrade to the newest version.<br />

CVE-2004-0763<br />

Pavuk < 0.928r3 Digest Authentication Remote Overflow<br />

<strong>PVS</strong> ID: 1776 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is using a version of Pavuk, a web spider, that is vulnerable to an<br />

authentication buffer overflow. An attacker can construct a malicious website that is<br />

designed to trigger the vulnerability and run arbitrary code on the client machine.<br />

Solution: Upgrade to 0.928r3 or higher.<br />

CVE-2004-1437<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 451


Real<strong>Network</strong> RealPlayer Unspecified Remote Vulnerability<br />

<strong>PVS</strong> ID: 1777 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running a vulnerable version of RealPlayer. An attacker may execute<br />

arbitrary code on a computer running the player.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-1437<br />

Neon < 0.23.8 Status Response Control Character Inclusion Vulnerability<br />

<strong>PVS</strong> ID: 1778 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is using software based on a vulnerable version of the Neon Library, an<br />

open-source HTTP and WebDAV client library. Applications that use this version of the<br />

Neon library may disclose sensitive information to an attacker.<br />

Solution: Upgrade to Neon library 0.23.8 or higher.<br />

CVE Not available<br />

Neon < 0.24.5 WebDAV Client Library Format String Vulnerabilities<br />

<strong>PVS</strong> ID: 1779 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host is using software based on a vulnerable version of the Neon Library, an<br />

open-source HTTP and WebDAV client library. An attacker running a malicious WebDAV<br />

server may execute arbitrary code on the host.<br />

Solution: Upgrade to Neon library 0.24.5 or higher.<br />

CVE-2004-0179<br />

Neon < 0.24.6 WebDAV Client Library ne_rfc1036_parse Function Heap Overflow<br />

<strong>PVS</strong> ID: 1780 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using software based on a vulnerable version of the Neon Library, an open-source HTTP<br />

and WebDAV client library. Depending of the application using the library, an attacker<br />

running a malicious WebDAV server may execute arbitrary code on the host or create a<br />

denial of service.<br />

Solution: Upgrade to Neon library 0.24.6 or higher.<br />

CVE-2004-0398<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Neon < 0.24.7 WebDAV Client Library Unspecified Vulnerability<br />

Family Internet Services 452


<strong>PVS</strong> ID: 1781 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is using software based on a vulnerable version of the Neon Library, an<br />

open-source HTTP and WebDAV client library. It is reported that versions prior 0.24.7<br />

contains an unspecified vulnerability. Due to the nature of the library, it is likely that this is<br />

a remotely exploitable vulnerability.<br />

Solution: Upgrade to Neon library 0.24.7 or higher.<br />

CVE Not available<br />

Opera < 7.54u1 Web Browser Resource Detection Weakness<br />

<strong>PVS</strong> ID: 1782 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw which allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is using Opera, which is affected by a security<br />

weakness which may permit an attacker to determine the existence of a resources on the<br />

vulnerable computer.<br />

Solution: Install Opera 7.54u1 or higher.<br />

CVE-2004-1490<br />

ipop2d fold Command Arbitrary File Access<br />

<strong>PVS</strong> ID: 1783 FAMILY: POP Server<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10469<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote pop2 server allows the reading of arbitrary files for<br />

authenticated users, using the 'fold' command.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

qpopper < 3.0.1b2 EIUDL Arbitrary Command Execution<br />

<strong>PVS</strong> ID: 1784 FAMILY: POP Server<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10423<br />

Description: Synopsis :\n\nAn attacker can gain an unprivileged shell on the remote system.\n\nThe<br />

system is using qpopper 2.53 (or newer in the 2.5x series). There is a problem in this server<br />

that allows users who have a pop account to gain a shell with the gid 'mail' by sending to<br />

themselves a specially crafted mail.<br />

Solution: Upgrade to version 3.0.1b2 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 453


CVE-2000-0320<br />

qpopper < 4.0 PASS Command Remote Overflow<br />

<strong>PVS</strong> ID: 1785 FAMILY: POP Server RISK: HIGH NESSUS ID:10196<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThere is a<br />

vulnerability in some versions of qpopper which allows a remote user to become root using<br />

a buffer overflow.<br />

Solution: Upgrade to version 4.0 or higher.<br />

CVE-1999-0006<br />

qpopper < 4.0.5fc2 Qvsnprintf Remote Overflow<br />

<strong>PVS</strong> ID: 1786 FAMILY: POP Server<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11376<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote qpopper<br />

server, according to its banner, is vulnerable to a one-byte overflow in the function<br />

Qvsnprintf(). An attacker may use this flaw to gain a (non-root) shell on this host, provided<br />

that the attacker has a valid POP account to log in with.<br />

Solution: Upgrade to version 4.0.5fc2 or higher.<br />

CVE-2003-0143<br />

ipop2d < 4.5 FOLD Command Remote Overflow<br />

<strong>PVS</strong> ID: 1787 FAMILY: POP Server RISK: HIGH NESSUS ID:10130<br />

Description: Synopsis :\n\nThe remote server allows attackers to gain an unprivileged shell.\n\nThere is<br />

a buffer overflow in the imap suite provided with Debian GNU/Linux 2.1 that has a<br />

vulnerability in its POP-2 daemon found in the ipopd package. This vulnerability allows an<br />

attacker to gain a shell as user 'nobody', but requires the attacker to have a valid pop2<br />

account.<br />

Solution: Upgrade to version 4.5 or higher.<br />

CVE-1999-0920<br />

Netscape Messenging Server User Account Enumeration<br />

<strong>PVS</strong> ID: 1788 FAMILY: POP Server<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10681<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote POP server allows an attacker to obtain a list of valid logins on the<br />

remote host via a brute force attack. If the user connects to this port and issues the<br />

commands : USER 'someusername' PASS 'whatever' a different response will be generated<br />

Family Internet Services 454


if the account 'someusername' exists or not.<br />

Solution: No solution is known at this time.<br />

CVE-2000-0960<br />

qpopper Options File Buffer Overflow<br />

<strong>PVS</strong> ID: 1789 FAMILY: POP Server RISK: HIGH NESSUS ID:10948<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote qpopper<br />

server, according to its banner, is running version 4.0.3 or version 4.0.4. These versions are<br />

vulnerable to a buffer overflow if they are configured to allow the processing of a user's<br />

~/.qpopper-options file. A local user can cause a buffer overflow by setting the bulldir<br />

variable to something longer than 256 characters. *** This test could not confirm the<br />

existence of the problem - it relied on the banner being returned. ***<br />

Solution: Upgrade to the latest version, or disable processing of user option files.<br />

ZetaMail Remote DoS<br />

CVE-2001-1046<br />

<strong>PVS</strong> ID: 1790 FAMILY: POP Server RISK: HIGH NESSUS ID:10184<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

ZetaMail server will crash if a username/password pair longer than 3500 characters is<br />

supplied by the client.<br />

Solution: Upgrade to the latest version.<br />

CVE-2002-0799<br />

Delegate Multiple Function Remote Overflows<br />

<strong>PVS</strong> ID: 1791 FAMILY: POP Server RISK: HIGH NESSUS ID:10184<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nDelegate is reportedly<br />

vulnerable to a stack-based buffer overflow that may allow for the execution of arbitrary<br />

code. The condition exists if the argument to the 'USER' command is of excessive length.<br />

Solution: Contact the vendor for a patch or upgrade.<br />

CVE-2002-0799<br />

Qualcomm Qpopper Remote Overflow DoS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1792 FAMILY: POP Server RISK: HIGH NESSUS ID:10184<br />

Family Internet Services 455


Description: The remote qpopper service may be vulnerable to a denial of service (DoS) attack. If a<br />

string of longer than approximately 2048 characters is sent to the qpopper process, a denial<br />

of service condition will occur.<br />

Solution: Upgrade to the newest version.<br />

CVE-2002-0454<br />

Qualcomm Qpopper Remote Overflows<br />

<strong>PVS</strong> ID: 1793 FAMILY: POP Server RISK: HIGH NESSUS ID:10184<br />

Description: There are buffer overflow vulnerabilities present in 3.x versions of the Qualcomm popper<br />

daemon. These vulnerabilities are remotely executable and since the daemons run as root,<br />

the host running qpopper can be completely compromised anonymously.<br />

Solution: Upgrade to the newest version.<br />

CVE-2002-1781<br />

Qualcomm Qpopper Username Remote Overflow<br />

<strong>PVS</strong> ID: 1794 FAMILY: POP Server RISK: HIGH NESSUS ID:10184<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nIn version 4, a buffer<br />

overflow was introduced into the qpopper source tree. This buffer overflow is related to the<br />

handling of the client-supplied username and is present when a POP3 session is being<br />

initiated. It is believed that the overflow occurs before authentication, so it may not be<br />

required that users have valid POP accounts. This vulnerability can lead to a compromise of<br />

root privileges to remote attackers.<br />

Solution: Upgrade to the latest version.<br />

CVE-2001-1046<br />

Computalynx CMail POP3 Server DELE Function DoS<br />

<strong>PVS</strong> ID: 1795 FAMILY: POP Server<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a denial of service (DoS) attack.\n\nIt has<br />

been reported that a memory corruption vulnerability exists in CMail. The POP3 server<br />

included with CMAIL does not properly handle some types of requests. By submitting a<br />

maliciously crafted request to the POP3 server, an attacker could crash the system, resulting<br />

in a denial of service.<br />

Solution: Upgrade to the latest version.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 456


Computalynx CMail < 2.4.10 HELO Command Overflow<br />

<strong>PVS</strong> ID: 1796 FAMILY: POP Server RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nA security<br />

vulnerability in CMail 2.4.9 allows remote attackers to overflow one of CMail's internal<br />

buffers causing it to crash. If shellcode is provided in the overflowing buffer it may be<br />

possible to execute arbitrary code.<br />

Solution: Upgrade to 2.4.10 or higher.<br />

CVE-2001-0742<br />

ALT-N MDaemon < 6.5.0 POP Server Overflow DoS<br />

<strong>PVS</strong> ID: 1797 FAMILY: POP Server<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nA<br />

buffer overflow vulnerability has been reported for MDaemon. The vulnerability is due to<br />

inadequate bounds checking one some POP server commands. An attacker can exploit this<br />

vulnerability by submitting a very large integer value to some commands on the POP<br />

server. This will cause the MDaemon service to crash when attempting to process the<br />

command.<br />

Solution: Upgrade to MDaemon 6.5.0 or higher.<br />

CVE-2002-1539<br />

Xtramail < 1.12 POP3 Overflow<br />

<strong>PVS</strong> ID: 1798 FAMILY: POP Server RISK: HIGH NESSUS ID:10325<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote Xtramail<br />

POP server is vulnerable to a buffer overflow when the user supplies a long password<br />

string. An attacker may use this flaw to execute arbitrary code on this host with the<br />

privileges of the Xtramail server (typically, SYSTEM).<br />

Solution: Upgrade to version 1.12 or higher.<br />

CVE-1999-1511<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Xtramail < 1.12 Control Server Overflow Denial of Service<br />

<strong>PVS</strong> ID: 1799 FAMILY: POP Server RISK: HIGH NESSUS ID:10323<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote Xtramail<br />

Control Server is vulnerable to a buffer overflow when a user supplies a too long argument<br />

to as its username. An attacker may use this flaw to disable this service remotely or to<br />

execute arbitrary code on this host, with the privileges of the Xtramail server (typically,<br />

SYSTEM).<br />

Family Internet Services 457


Solution: Upgrade to Xtramail version 1.12 or higher.<br />

CVE-1999-1511<br />

XMail < 0.59 APOP Overflow DoS<br />

<strong>PVS</strong> ID: 1800 FAMILY: POP Server RISK: HIGH NESSUS ID:10559<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote XMail<br />

POP server is vulnerable to a buffer overflow when it receives two long arguments for the<br />

APOP command. This problem may allow an attacker to disable this POP server remotely<br />

or even to execute arbitrary commands with its privileges (typically, root).<br />

Solution: Upgrade to XMail 0.59 or higher.<br />

CVE-2000-0841<br />

XMail < 2.4 (Build 0530) APOP Remote Format String<br />

<strong>PVS</strong> ID: 1801 FAMILY: POP Server RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host is running a version of Magic Winmail Server that is vulnerable to a<br />

format string flaw. An attacker may exploit this vulnerability by connection to the<br />

vulnerable mail server and issuing the USER command with malicious format string<br />

specifiers. This may result in the crashing of the remote host and/or execution of arbitrary<br />

code on the remote host.<br />

Solution: Upgrade to version 2.4 (Build 0530) or higher.<br />

POP Server Detection<br />

CVE-2003-0391<br />

<strong>PVS</strong> ID: 1802 FAMILY: POP Server RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the following POP server : %L<br />

Solution: N/A<br />

FTP Server Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 1803 FAMILY: FTP Servers RISK: NONE NESSUS ID:10092<br />

Description: A FTP server is running on this port. Its banner is :\n %L<br />

Solution: N/A<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 458


CVE Not available<br />

FTP Server Detection (Port 21)<br />

<strong>PVS</strong> ID: 1804 FAMILY: FTP Servers RISK: NONE NESSUS ID:10092<br />

Description: A FTP server is running on this port. Its banner is :\n %L<br />

Solution: N/A<br />

CVE Not available<br />

Eserv FTP Memory Leak DoS<br />

<strong>PVS</strong> ID: 1805 FAMILY: FTP Servers RISK: HIGH NESSUS ID:11619<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote FTP server is running Eserv. There is a memory leak in this software which may be<br />

abused by an attacker to disable this service remotely.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

Novell FTP Malformed Input Remote DoS<br />

<strong>PVS</strong> ID: 1806 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11614<br />

Description: The remote host is running a Novell FTP server. Older versions of this server can be<br />

disabled remotely by an attacker by sending a couple of NULL characters to the FTP<br />

administrative port.<br />

Solution: Upgrade to the latest version of Novell FTP Server.<br />

CVE Not available<br />

WU-FTPD < 2.6.0 "SITE NEWER" Command Memory Exhaustion DoS<br />

<strong>PVS</strong> ID: 1807 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10319<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote WU-FTPD server might be vulnerable to a resource exhaustion attack. To perform<br />

such an attack, one would have to log into this FTP server and issue bogus SITE NEWER<br />

commands.<br />

Solution: Upgrade to WU-FTPD 2.6.0 or higher.<br />

CVE-1999-0880<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 459


WU-FTPD < 2.6.1 "SITE EXEC" Command Overflow<br />

<strong>PVS</strong> ID: 1808 FAMILY: FTP Servers RISK: HIGH NESSUS ID:10452<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote WU-FTP<br />

server is vulnerable to a flaw which may allow an attacker to execute arbitrary code with its<br />

privileges (typically root) by sending a malformed argument to the SITE EXEC command.<br />

Solution: Upgrade to wu-ftpd 2.6.1 or higher.<br />

CVE-1999-0997<br />

WU-FTPD < 2.6.2 PASV Command Format String Arbitrary Code Execution<br />

<strong>PVS</strong> ID: 1809 FAMILY: FTP Servers RISK: HIGH NESSUS ID:11331<br />

Description: The remote WU-FTPD server is vulnerable to a format string flaw when it is run in debug<br />

mode. An attacker may use this flaw to execute arbitrary code on this host by sending a<br />

PASV command with a specially crafted argument.<br />

Solution: Upgrade to WU-FTPD 2.6.2 or higher.<br />

CVE-2001-0187<br />

WU-FTPD < 2.4.3 Directory Structure Processing Overflow<br />

<strong>PVS</strong> ID: 1810 FAMILY: FTP Servers RISK: HIGH NESSUS ID:10318<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote<br />

WU-FTPD server is vulnerable to a buffer overflow bug when it processes directories<br />

structure names. An attacker may use this flaw by creating a huge directory structure with<br />

specially malformed names, and may be able to execute arbitrary commands on this host<br />

with the privileges of the FTP daemon (typically, root)<br />

Solution: Upgrade to WU-FTPD 2.4.3 or higher.<br />

CVE-1999-0950<br />

WU-FTPD < 2.6.1 Glob Command Overflow<br />

<strong>PVS</strong> ID: 1811 FAMILY: FTP Servers RISK: HIGH NESSUS ID:11332<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote WU-FTP<br />

server is vulnerable to a buffer overflow when it receives a malformed glob command. An<br />

attacker may use this flaw to execute arbitrary code on this host.<br />

Solution: Upgrade to WU-FTPD 2.6.1 or higher.<br />

CVE-2001-0935<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

WS_FTP < 2.0.3 Multiple Command Long Argument Overflows<br />

Family Internet Services 460


<strong>PVS</strong> ID: 1812 FAMILY: FTP Servers RISK: HIGH NESSUS ID:11094<br />

Description: The remote WS_FTP server is vulnerable to various buffer overflows which may allow an<br />

attacker to execute arbitrary commands on this host.<br />

Solution: Upgrade to WS_FTP 2.0.3 or higher.<br />

CVE-2001-1021<br />

WFTP < 2.41 RNTO Command Handling DoS<br />

<strong>PVS</strong> ID: 1813 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10466<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote WFTP server crashes when it receives the command "RNTO x" right after the login.<br />

An attacker may use this flaw to prevent this host from publishing anything using FTP.<br />

Solution: Upgrade to WFTP 2.41 or higher.<br />

CVE-2000-0648<br />

VXWorks ftpd CEL Command Overflow DoS<br />

<strong>PVS</strong> ID: 1814 FAMILY: FTP Servers RISK: HIGH NESSUS ID:11185<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote VXWorks host can be brought down entirely if a user issues a too long argument to<br />

the CEL ftp command.<br />

Solution: Contact your vendor and reference WindRiver field patch TSR 296292.<br />

CVE-2002-2300<br />

SunFTP Directory Traversal / Overflow<br />

<strong>PVS</strong> ID: 1815 FAMILY: FTP Servers RISK: HIGH NESSUS ID:11373<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote FTP<br />

server (SunFTP) allows a remote attacker to read arbitrary files on the remote host by<br />

adding a double dot in front of their name. In addition to this, it is vulnerable to a buffer<br />

overflow which may allow an attacker to execute arbitrary commands on the remote host.<br />

Solution: The product has been discontinued by the vendor.<br />

CVE-2000-0856<br />

WebWeaver FTP RETR Command Remote DoS<br />

<strong>PVS</strong> ID: 1816 FAMILY: FTP Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11584<br />

Family Internet Services 461


Description: The remote FTP server is running WebWeaver FTPd. There is a flaw in this server which<br />

may allow anyone to crash it remotely by requesting a non-existing file.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

Debian proftpd root Privilege Escalation<br />

<strong>PVS</strong> ID: 1817 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11450<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors\n\nThe remote FTP<br />

server is subject to two flaws:\n- There is a configuration error in the postinst script, when<br />

the user enters 'yes', when asked if anonymous access should be enabled. The postinst script<br />

wrongly leaves the 'run as uid/gid root' configuration option in /etc/proftpd.conf, and adds a<br />

'run as uid/gid nobody' option that has no effect.\n There is a bug that comes up when /var<br />

is a symlink, and proftpd is restarted. When stopping proftpd, the /var symlink is removed;<br />

when it's started again a file named /var is created.<br />

Solution: Upgrade proftpd to proftpd-1.2.0pre10-2.0potato1 or higher.<br />

CVE-2001-0456<br />

ProFTPD cwd Command Format String<br />

<strong>PVS</strong> ID: 1818 FAMILY: FTP Servers RISK: HIGH NESSUS ID:11407<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote 'format string' flaw.\n\nThe remote<br />

ProFTPd server is as old or older than 1.2.0rc2. There is a format string vulnerability in this<br />

version that might allow an attacker to execute arbitrary code on this host.<br />

Solution: Upgrade to the latest version of ProFTPd.<br />

CVE-2001-0318<br />

HP-UX ftpd glob() Expansion STAT Command Remote Overflow<br />

<strong>PVS</strong> ID: 1819 FAMILY: FTP Servers RISK: HIGH NESSUS ID:11372<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nA buffer overflow in<br />

FTP server in HPUX 11 and previous allows remote attackers to execute arbitrary<br />

commands by creating a long pathname and calling the STAT command, which uses glob<br />

to generate long strings.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2001-0248<br />

Anonymous FTP Detection (login: ftp)<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 462


<strong>PVS</strong> ID: 1820 FAMILY: FTP Servers<br />

RISK: Risk<br />

not available<br />

Description: The remote server supports anonymous FTP with the login of 'ftp'.<br />

Solution: N/A<br />

CVE Not available<br />

Anonymous FTP Enabled<br />

NESSUS ID:Not Available<br />

<strong>PVS</strong> ID: 1821 FAMILY: FTP Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote FTP server has anonymous access enabled.<br />

Solution: N/A<br />

CVE Not available<br />

Anonymous FTP Detection (login: anonymous)<br />

<strong>PVS</strong> ID: 1822 FAMILY: FTP Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote FTP server has anonymous access enabled.<br />

Solution: N/A<br />

CVE Not available<br />

Anonymous FTP Enabled<br />

<strong>PVS</strong> ID: 1823 FAMILY: FTP Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote FTP server has anonymous access enabled.<br />

Solution: N/A<br />

CVE Not available<br />

SmallFTPD < 1.0.3 CWD Command Traversal Directory Listing<br />

<strong>PVS</strong> ID: 1824 FAMILY: FTP Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw which allows attackers to<br />

retrieve sensitive files or data.\n\nThe remote FTP server (smallftpd) is vulnerable to<br />

a flaw which allows users to access files outside of the FTP server root.<br />

Solution: Upgrade to version 1.0.3 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 463


CVE Not available<br />

Platinum FTP server Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1825 FAMILY: FTP Servers RISK: HIGH NESSUS ID:11200<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nPlatinum FTP<br />

server for Win32 has several vulnerabilities in the way it checks the format of command<br />

strings passed to it. This leads to the following vulnerabilities in the server: The 'dir'<br />

command can be used to examine the filesystem of the machine and gather further<br />

information about the host by using relative directory listings (I.E. '../../../' or '\..\..\..'). The<br />

'delete' command can be used to delete any file on the server that the Platinum FTP server<br />

has permissions to. Issuing the command 'cd @/..@/..' will cause the Platinum FTP server<br />

to crash and consume all available CPU time on the server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

NiteServer < 1.85 FTP Server Traversal Directory Listing<br />

<strong>PVS</strong> ID: 1826 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11466<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw which allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote FTP server allows anybody to switch to the root<br />

directory and read potentially sensitive files.<br />

Solution: Upgrade to version 1.85 or higher.<br />

CVE-2003-1349<br />

AIX FTPd libc Library Remote Overflow<br />

<strong>PVS</strong> ID: 1827 FAMILY: FTP Servers RISK: HIGH NESSUS ID:10009<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nIt is possible to make<br />

the remote FTP server crash by issuing this command : CEL aaaa[...]aaaa. This problem is<br />

known as the 'AIX FTPd' overflow and may allow the remote user to easily gain access to<br />

the root (super-user) account on the remote system.<br />

Solution: See IBM's advisory number ERS-SVA-E01-1999:004.1 or contact your vendor for a patch.<br />

CVE-1999-0789<br />

bftpd < 1.0.14 chown Command Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1828 FAMILY: FTP Servers RISK: HIGH NESSUS ID:10579<br />

Family Internet Services 464


Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote ftp server<br />

is vulnerable to a buffer overflow when issued too long arguments to the chown command.<br />

This vulnerability may make it possible for a remote attacker to gain root access.<br />

Solution: Upgrade to version 1.0.14 or disable the option ENABLE_SITE in bftpd.conf<br />

CVE-2000-0943<br />

bftpd < 1.0.13 Format String Overflow<br />

<strong>PVS</strong> ID: 1829 FAMILY: FTP Servers RISK: HIGH NESSUS ID:10568<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote ftp server<br />

does not properly sanitize output from the NLST command. It may be possible for remote<br />

attackers to gain root access if they can write in any directory served by this ftp daemon.<br />

Solution: Upgrade to version 1.0.13 or higher.<br />

CVE Not available<br />

War FTP Daemon < 1.66x4 USER/PASS Command Overflow<br />

<strong>PVS</strong> ID: 1830 FAMILY: FTP Servers RISK: HIGH NESSUS ID:11207<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe version of War<br />

FTP Daemon running on this host contains a buffer overflow in the code that handles the<br />

USER and PASS commands. A potential intruder could use this vulnerability to crash the<br />

server or run arbitrary commands on the system.<br />

Solution: Upgrade to version 1.66x4 or higher.<br />

CVE-1999-0256<br />

War FTP Daemon < 1.67b5 Traversal Arbitrary Directory Access<br />

<strong>PVS</strong> ID: 1831 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11206<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw which allows attackers to retrieve<br />

sensitive files or data.\n\nThe version of WarFTPd running on this host contains a<br />

vulnerability that may allow a potential intruder to gain read access to directories and files<br />

outside of the ftp root. By sending a specially crafted 'dir' command, the server may<br />

disclose an arbitrary directory.<br />

Solution: Upgrade to version 1.67b5 or higher.<br />

CVE-2001-0295<br />

WS_FTP < 3.1.2 SITE CPWD Buffer Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1832 FAMILY: FTP Servers RISK: HIGH NESSUS ID:11098<br />

Family Internet Services 465


Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThis host is running a<br />

version of WS_FTP FTP server prior to 3.1.2. Versions earlier than 3.1.2 contain an<br />

unchecked buffer in routines that handle the 'CPWD' command arguments. The 'CPWD'<br />

command allows remote users to change their password. By issuing a malformed argument<br />

to the CPWD command, a user could overflow a buffer and execute arbitrary code on this<br />

host. Note that a local user account is required.<br />

Solution: Upgrade to version 3.1.2 or higher.<br />

CVE-2002-0826<br />

EFTP .lnk File Upload Overflow DoS<br />

<strong>PVS</strong> ID: 1833 FAMILY: FTP Servers RISK: HIGH NESSUS ID:10928<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nIt was<br />

possible to crash the EFTP service by uploading a *.lnk file containing too much data. An<br />

attacker may use this to make this service crash continuously or run arbitrary code on your<br />

system.<br />

Solution: No solution is known at this time.<br />

CVE-2001-1112<br />

EFTP < 2.0.8.348 File Enumeration<br />

<strong>PVS</strong> ID: 1834 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10933<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote FTP server can be used to determine if a given file exists on the<br />

remote host by adding dot-dot-slashes in front of the filename.<br />

Solution: Upgrade to version 2.0.8.348 or higher.<br />

CVE-2001-1109<br />

FTP Server 'glob' Function Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1835 FAMILY: FTP Servers RISK: HIGH NESSUS ID:10648<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a globbing attack.\n\nIt is possible to make<br />

the remote FTP server crash by creating a large directory structure and then attempting to<br />

list it using wildcards. This is usually known as the 'ftp glob overflow' attack. An attacker<br />

can use this flaw to execute arbitrary code on the remote server, which may lead to remote<br />

shell access.<br />

Solution: Upgrade your FTP server and/or libc. Consider removing directories writable by<br />

'anonymous'.<br />

Family Internet Services 466


CVE-2001-0247<br />

FTP Server 'glob' Function Overflow<br />

<strong>PVS</strong> ID: 1836 FAMILY: FTP Servers RISK: HIGH NESSUS ID:10648<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a globbing overflow.\n\nIt may be possible<br />

to make the remote FTP server crash by creating a large directory structure and then<br />

attempting to list it using wildcards. This is usually known as the 'ftp glob overflow' attack.<br />

An attacker can use this flaw to execute arbitrary code on the remote server, which could<br />

lead to remote shell access.<br />

Solution: Upgrade your FTP server and/or libc. Consider removing directories writable by<br />

'anonymous'.<br />

CVE-2001-0247<br />

Serv-U < 2.5e CWD Command Path Disclosure<br />

<strong>PVS</strong> ID: 1837 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11392<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote FTP server discloses the full path to its root through a CWD<br />

command done to a non-existant directory.<br />

Solution: Upgrade to Serv-U 2.5e or higher.<br />

CVE-1999-0838<br />

Serv-U < 2.5i CD Command Traversal Directory / File Access<br />

<strong>PVS</strong> ID: 1838 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10565<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw which allows attackers to retrieve<br />

sensitive files or data.\n\nIt is possible to break out of the remote FTP chroot by appending<br />

%20s in the CWD command, as in : CWD %20.. This problem allows an attacker to browse<br />

the entire remote file system.<br />

Solution: Upgrade to Serv-U 2.5i or higher.<br />

CVE-2001-0054<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

GuildFTPd Directory Traversal Arbitrary File Access<br />

<strong>PVS</strong> ID: 1839 FAMILY: FTP Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw which allows attackers to retrieve<br />

sensitive files or data.\n\nVersion 0.97 of GuildFTPd was detected. A security vulnerability<br />

in this product allows anyone with a valid FTP login to read arbitrary files on the system.<br />

Family Internet Services 467


Solution: No solution is known at this time.<br />

CVE-2001-0767<br />

GuildFTPd Traversal Arbitrary File Enumeration<br />

<strong>PVS</strong> ID: 1840 FAMILY: FTP Servers RISK: HIGH NESSUS ID:10471<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote FTP server (GuildFTPD) can be used to determine if a given file<br />

exists on the remote host by adding dot-dot-slashes in front of the filename.<br />

Solution: Upgrade according to vendor recommendations.<br />

CVE-2000-0640<br />

Microsoft IIS FTP Status Request DoS<br />

<strong>PVS</strong> ID: 1841 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10934<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nIt may<br />

be possible to make the remote FTP server crash by sending the command 'STAT<br />

*?AAAAA....AAAAA' An attacker may use this flaw to prevent your FTP server from<br />

working properly.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-0073<br />

WarFTPd Multiple Command CPU Consumption DoS<br />

<strong>PVS</strong> ID: 1842 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10822<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote WarFTPd server is running a 1.71 version. It is possible for a remote user to cause a<br />

denial of service on a host running Serv-U FTP Server, G6 FTP Server or WarFTPd Server.<br />

Repeatedly submitting an 'a:/' GET or RETR request, appended with arbitrary data, will<br />

cause the CPU usage to spike to 100%.<br />

Solution: Upgrade to the latest version of WarFTPd.<br />

CVE Not available<br />

ProFTPd < 1.2.0pre6 mkdir Command Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1843 FAMILY: FTP Servers RISK: HIGH NESSUS ID:10189<br />

Family Internet Services 468


Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote ProFTPd<br />

server is vulnerable to a buffer overflow when issued a too long mkdir command. An<br />

attacker may use this flaw to execute arbitrary commands on the remote host.<br />

Solution: Upgrade to version 1.2.0pre6 or higher.<br />

CVE-1999-0911<br />

ProFTPd ASCII Newline Character Overflow<br />

<strong>PVS</strong> ID: 1844 FAMILY: FTP Servers RISK: HIGH NESSUS ID:11849<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of ProFTPd which seems to be vulnerable to a buffer overflow when a<br />

user downloads a malformed ASCII file.\nAn attacker with upload privileges on this host<br />

may abuse this flaw to gain a root shell on this host.<br />

Solution: Upgrade to ProFTPd 1.2.9 or 1.2.8p or higher.<br />

CVE-2003-0831<br />

wzdftp < 0.1rc5 Mutliple DoS<br />

<strong>PVS</strong> ID: 1845 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is running wzdftpd. Versions of this software prior to 0.1rc5 contain a<br />

number of denial of service (DoS) vulnerabilities. However, this may be a false positive as<br />

wzdftpd does not display its version number in the 220 banner.<br />

Solution: Upgrade to version 0.1rc5 or higher.<br />

CVE Not available<br />

Access Point Detection via FTP Server Version<br />

<strong>PVS</strong> ID: 1846 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

Description: The remote host is a Wireless Access Point (WAP).<br />

NESSUS ID:11026<br />

Solution: Ensure that the proper physical and logical controls exist around the WAP.<br />

CVE Not available<br />

Access Point Detection via FTP Server Version<br />

<strong>PVS</strong> ID: 1847 FAMILY: FTP Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11026<br />

Family Internet Services 469


Description: The remote host is a Wireless Access Point (WAP).<br />

Solution: Ensure that the proper physical and logical controls exist around the WAP.<br />

CVE Not available<br />

Access Point Detection via FTP Server Version<br />

<strong>PVS</strong> ID: 1848 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

Description: The remote host is a Wireless Access Point (WAP).<br />

NESSUS ID:11026<br />

Solution: Ensure that the proper physical and logical controls exist around the WAP.<br />

CVE Not available<br />

War FTP Daemon CWD/MKD Overflow DoS<br />

<strong>PVS</strong> ID: 1849 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11205<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe version of the<br />

War FTP Daemon running on this host is vulnerable to a buffer overflow attack. This is due<br />

to improper bounds checking within the code that handles both the CWD and MKD<br />

commands. By exploiting this vulnerability, it is possible to crash the server, and<br />

potentially run arbitrary commands on this system.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2000-0131<br />

WU-FTPD Server Detection<br />

<strong>PVS</strong> ID: 1850 FAMILY: FTP Servers RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running a version of WU-FTPD server.<br />

Solution: N/A<br />

CVE Not available<br />

Debian ProFTPD Server Detection<br />

<strong>PVS</strong> ID: 1851 FAMILY: FTP Servers RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running a ProFTPD FTP server.<br />

Solution: N/A<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 470


CVE Not available<br />

War FTP Daemon Detection<br />

<strong>PVS</strong> ID: 1852 FAMILY: FTP Servers RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running a version of War FTP Daemon.<br />

Solution: N/A<br />

CVE Not available<br />

Serv-U FTP Server Detection<br />

<strong>PVS</strong> ID: 1853 FAMILY: FTP Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nAn FTP Server is running on this port\n\nThe remote host is running a<br />

version of the Serv-U FTP server.<br />

Solution: N/A<br />

CVE Not available<br />

TNFTPD Multiple Signal Handler Remote Superuser Privilege Escalation<br />

<strong>PVS</strong> ID: 1854 FAMILY: FTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running TNFTPD, a port of the NetBSD FTP daemon. It is reported that this version of<br />

TNFTPD is vulnerable to multiple vulnerabilities in the signal handling functions. An<br />

attacker may remotely gain superuser privileges on the remote host. TNFTPD was formerly<br />

named lukemftpd.<br />

Solution: Upgrade to tnftpd 20040810 or higher.<br />

CVE-2004-0794<br />

BitchX IRC Client "/INVITE" Command Format String DoS<br />

<strong>PVS</strong> ID: 1855 FAMILY: IRC Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote 'format string' flaw.\n\nThe remote<br />

host is running a version of the BitchX IRC client that may be vulnerable to a format string<br />

attack. BitchX IRC clients, versions 75 up to and including 1.0c16, are vulnerable to a<br />

Denial of Service attack and possible remote execution of code. By /invite-ing someone to<br />

a channel name containing formatting characters an IRC user can cause the targeted user's<br />

BitchX client to seg-fault.<br />

Solution: Upgrade according to vendor recommendations.<br />

CVE-2000-0594<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 471


BitchX IRC Clent DNS Response Remote Overflow<br />

<strong>PVS</strong> ID: 1856 FAMILY: IRC Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running a version of the BitchX IRC client that may be<br />

vulnerable to a buffer overflow. \n\nA buffer overflow within the DNS resolver code makes<br />

it possible to overwrite stack variables by generating a malformed DNS packet. A<br />

malicious attacker may use this vulnerability to execute arbitrary code in the context of the<br />

BitchX client. Note that it is necessary for an attacker to control a DNS server to exploit<br />

this bug.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2001-0050<br />

BitchX IRC Client Malformed RPL_NAMEREPLY Message DoS<br />

<strong>PVS</strong> ID: 1857 FAMILY: IRC Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running a version of the BitchX IRC client (version 75p3, 1.0c16, 1.0c19, or<br />

1.0c20cvs) that may be vulnerable to a Denial of Service attack. If a remote attacker sends<br />

a malformed RPL_NAMEREPLY numeric 353 message to a BitchX IRC client, the<br />

attacker can cause the client to crash.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2003-1450<br />

Multiple ircii-based Clients Remote Overflows<br />

<strong>PVS</strong> ID: 1858 FAMILY: IRC Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running a version of the BitchX IRC client that may<br />

contain buffer overflows. \n\nMultiple vendor ircii-based client, including BitchX version<br />

1.0c19 and possibly earlier, are vulnerable to multiple buffer overflows. A remote attacker<br />

could overflow a buffer to cause the corruption of heap memory, allowing the attacker to<br />

execute arbitrary code on the system or possibly cause the client to crash.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2003-0321<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

BitchX Trojaned Distribution Authentication Bypass<br />

<strong>PVS</strong> ID: 1859 FAMILY: IRC Clients RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 472


Description: Synopsis :\n\nThe remote host is vulnerable to a flaw which allows for the<br />

bypassing of authentication.\n\nThe remote host is running the BitchX IRC<br />

client that may contain a backdoor. BitchX, if downloaded between<br />

12-Apr-2003 and 13-Apr-2003, could cause a backdoor to be installed on the<br />

victim's computer. One of the FTP sites that was linked from the BitchX<br />

website was a false FTP site, and the BitchX IRC Client 1.0 c19 was modified<br />

to include a Trojan Horse. Once the Trojan Horse is executed it attempts to<br />

connect to 207.178.61.5 on port 6667. This could allow a remote attacker to<br />

gain access to systems that have installed the compromised BitchX distributions<br />

and execute commands with the privledges of the user that installed the affected<br />

package.<br />

Solution: Upgrade according to vendor recommendations.<br />

CVE Not available<br />

BitchX IRC Client Channel Mode Change DoS<br />

<strong>PVS</strong> ID: 1860 FAMILY: IRC Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running the BitchX IRC client that may contain a Denial<br />

of Service (DoS) vulnerability.\n\n It may be possible to crash the BitchX client when<br />

certain mode changes are made. All version up to 1.0cvs20 are affected.<br />

Solution: Upgrade according to vendor recommendations.<br />

CVE-2003-0334<br />

mIRC < 6.0 Long Nickname Buffer Overflow<br />

<strong>PVS</strong> ID: 1861 FAMILY: IRC Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running a version of mIRC that is vulnerable to a buffer<br />

overflow attack.\n\nThis issue is due to improper bounds checking of nicknames sent by<br />

the server. An excessively long nickname (200+) is capable of overwriting the stack. This<br />

issue is also exploitable via a webpage that can instruct the client to launch and to make a<br />

connection to the malicious web server. This may lead to full compromise of the host<br />

running the client software on some Windows systems.<br />

Solution: Upgrade to version 6.0 or higher.<br />

CVE-2002-0231<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

mIRC < 6.1 DCC Server Protocol Nickname Disclosure<br />

<strong>PVS</strong> ID: 1862 FAMILY: IRC Clients RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 473


Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running the mIRC chat client. A vulnerability has been<br />

reported in the mIRC implementation of the DCC protocol. Reportedly, when a DCC<br />

connection is initiated, the command '100 testing' will cause the mIRC server to respond<br />

with the user's current nick. Exploitation of this vulnerability may aid an attack in further<br />

intelligent attacks, or help an attempt at social engineering.<br />

Solution: Upgrade to version 6.1 or higher.<br />

CVE-2002-0425<br />

mIRC < 6.03 Scripting $asctime Overflow<br />

<strong>PVS</strong> ID: 1863 FAMILY: IRC Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the mIRC chat client. A buffer overflow has been reported in the $asctime<br />

identifier, a function in the mIRC scripting language. The error lies in the handling of<br />

oversized format specifier strings. Exploitation relies on a script passing untrusted input<br />

into this function. Reportedly, no such script is included in the default installation of mIRC.<br />

Solution: Upgrade to version 6.03 or higher.<br />

CVE-2002-1456<br />

mIRC DCC Get Dialog File Spoofing Weakness<br />

<strong>PVS</strong> ID: 1864 FAMILY: IRC Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may be tricked into running an executable file.\n\nThe<br />

remote host is running the mIRC chat client. It has been reported that it is possible to spoof<br />

file extensions in mIRC's DCC Get dialog. This could be exploited to trick a user into<br />

thinking a malicious file is safe, which may create a false sense of security and cause the<br />

user to open the file.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Trillian IRC PART Message Remote DoS<br />

<strong>PVS</strong> ID: 1865 FAMILY: IRC Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running the Trillian IRC client. Reportedly, Trillian is prone to a Denial of<br />

Service attack when it receives messages about a user leaving a non-specified channel or a<br />

channel that the user is not currently in. It is possible to exploit this issue using a malicious<br />

server.<br />

Family Internet Services 474


Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-1488<br />

Trillian IRC User Mode Numeric Remote Overflow<br />

<strong>PVS</strong> ID: 1866 FAMILY: IRC Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the Trillian IRC client. Trillian versions 0.73, 0.74, and possibly other versions are<br />

vulnerable to a buffer overflow, caused by improper validation of Internet Relay Chat<br />

(IRC) raw 221 user mode requests. By sending a raw 221 request with a mode of more than<br />

251 bytes, a remote attacker in control of a malicious IRC server could overflow a buffer<br />

and cause the victim's Trillian client to crash or execute code on the system.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-1486<br />

Trillian IRC Module DCC Length Remote Overflow<br />

<strong>PVS</strong> ID: 1867 FAMILY: IRC Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the Trillian IRC client. Trillian versions 0.725 and 0.73 are vulnerable to a buffer<br />

overflow in the IRC module. By sending an overly long DCC chat message containing<br />

4282 or more to another user, a remote attacker can overflow a buffer and cause the Trillian<br />

client to crash or possibly execute code on the system.<br />

Solution: No solution is known at this time.<br />

CVE-2002-2173<br />

Trillian IRC Oversized Data Block Remote Overflow DoS<br />

<strong>PVS</strong> ID: 1868 FAMILY: IRC Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running the Trillian IRC client. Trillian version 0.74 and possibly other<br />

versions are vulnerable to a Denial of Service attack, caused by a buffer overflow. By<br />

sending more than 4095 characters to a vulnerable Trillian client, a remote attacker in<br />

control of a malicious IRC server could overflow a buffer and cause the victim's Trillian<br />

client to crash.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-1486<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 475


Trillian IRC Raw Message DoS<br />

<strong>PVS</strong> ID: 1869 FAMILY: IRC Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running the Trillian IRC client. Trillian version 0.74 and possibly other<br />

versions are vulnerable to a Denial of Service attack, caused by improper validation of IRC<br />

raw messages. By sending one of the following raw requests: 206, 211, 213, 214, 215, 217,<br />

218, 243, 302, 317, 324, 332, 333, 352, or 367, a remote attacker in control of a malicious<br />

IRC server could cause the victim's Trillian client to crash.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-1487<br />

Trillian IRC Module Channel Name Format String<br />

<strong>PVS</strong> ID: 1870 FAMILY: IRC Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote 'format string' flaw.\n\nThe remote<br />

host is running the Trillian IRC client. Trillian versions 0.725 and 0.73 are vulnerable to a<br />

format string attack in the IRC module. A remote attacker operating a malicious IRC server<br />

can deceive another user into joining a channel with a specially crafted name where<br />

malicious code can be stored. The malicious code could then be executed on the user's<br />

system, once the user joins the channel.<br />

Solution: No solution is known at this time.<br />

CVE-2002-2155<br />

Trillian IRC Server Response Remote Overflow<br />

<strong>PVS</strong> ID: 1871 FAMILY: IRC Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the Trillian IRC client. Trillian version 0.73 and earlier are vulnerable to a buffer<br />

overflow in the IRC module. By operating a malicious IRC server and sending malformed<br />

responses, a remote attacker can overflow a buffer and execute code on the server.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

Trillian IRC JOIN Remote Overflow<br />

<strong>PVS</strong> ID: 1872 FAMILY: IRC Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 476


Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the Trillian IRC client. Trillian versions 0.73, 0.74 and possibly other versions are<br />

vulnerable to a buffer overflow, caused by improper validation of JOIN commands<br />

received from an IRC server. If a Trillian client connects to an attacker-controlled IRC<br />

server and joins a channel with a name containing more than 206 characters, the attacker<br />

could overflow a buffer and cause the victim's Trillian client to crash or execute code on<br />

the system.<br />

Solution: No solution is known at this time.<br />

CVE-2002-1486<br />

XChat Malformed Nickname Remote Format String<br />

<strong>PVS</strong> ID: 1873 FAMILY: IRC Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote 'format string' flaw.\n\nThe remote<br />

host is running the XChat IRC client. XChat IRC client version 1.2.x is vulnerable to a<br />

format string attack. A remote attacker can create a specially crafted nickname that would<br />

cause arbitrary code to be executed on the system once a connection is established.<br />

Solution: No solution is known at this time.<br />

CVE-2001-0792<br />

XChat /dns Reverse Lookup Response Arbitrary Command Execution<br />

<strong>PVS</strong> ID: 1874 FAMILY: IRC Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an flaw which allows attackers to execute<br />

arbitrary commands.\n\nThe remote host is running the XChat IRC client. X-Chat versions<br />

1.8.8 and earlier could allow a remote attacker to execute arbitrary commands on the<br />

X-Chat client. A vulnerability regarding the lack of filtering in the EXECL command could<br />

allow an attacker to send a specially crafted /dns query that would return a malformed<br />

response from the server to execute arbitrary commands on the X-Chat client.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-0382<br />

XChat CTCP Ping Arbitrary Remote IRC Command Execution<br />

<strong>PVS</strong> ID: 1875 FAMILY: IRC Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an flaw which allows attackers to execute<br />

arbitrary commands.\n\nThe remote host is running the XChat IRC client. X-Chat versions<br />

1.4.2 and 1.4.3 could allow a remote attacker to execute IRC commands. A remote attacker<br />

can send a specially crafted CTCP ping request to execute IRC commands on the IRC<br />

server and gain elevated privileges.<br />

Family Internet Services 477


Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-0006<br />

XChat Client URL Metacharacter Command Execution<br />

<strong>PVS</strong> ID: 1876 FAMILY: IRC Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an flaw which allows attackers to execute<br />

arbitrary commands.\n\nThe remote host is running the XChat IRC client. XChat IRC<br />

client versions 1.3.9 and later could allow an attacker to execute arbitrary shell commands.<br />

By embedding commands enclosed in backticks in URLs sent to XChat, a remote attacker<br />

can execute commands as the user.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2000-0787<br />

mIRC Minimized Dialogue Window DoS<br />

<strong>PVS</strong> ID: 1877 FAMILY: IRC Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running a version of mIRC that be vulnerable to a remote Denial of Service<br />

attack. Specifically version 6.12 may be crashed if a person minimizes the DCC get<br />

dialogue windows, and then reopens those windows to get a file with an excessively long<br />

filename.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

IRC Client Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 1878 FAMILY: IRC Clients RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running an IRC client.<br />

Solution: N/A<br />

CVE Not available<br />

Password File Obtained by HTTP (GET)<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1879 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 478


Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nIt seems that a Unix password file was sent by the remote web server when the<br />

following request was made :\n%P\nWe saw : \n%L<br />

Solution: N/A<br />

CVE Not available<br />

KaZaa or Morpheus Detection<br />

<strong>PVS</strong> ID: 1880 FAMILY: Policy RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that may not be authorized by corporate<br />

policy.\n\nThe remote host is running KaZaa or Morpheus, which are P2P file sharing<br />

software packages. In addition to the potential illegal use of this software (which can be<br />

used to download copyrighted material), this type of software tends to be bandwidth<br />

intensive and may eventually degrade network performance.<br />

Solution: Ensure that the software is being used for a legitimate purpose.<br />

MLdonkey Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 1881 FAMILY: Policy RISK: LOW NESSUS ID:11125<br />

Description: Synopsis :\n\nThe remote host is running software that may not be authorized by corporate<br />

policy\n\nThe remote host is running MLdonkey, a P2P file sharing software. In addition to<br />

the potential illegal use of this software (which can be used to download copyright<br />

protected material), this kind of software tend to be bandwidth intensive and may<br />

eventually degrade network performance.<br />

Solution: Ensure that the software is being used for a legitimate purpose.<br />

VNC Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 1882 FAMILY: Generic RISK: LOW NESSUS ID:10342<br />

Description: VNC (Virtual <strong>Network</strong> Computing) is installed on this host on this port. Disable this<br />

service if it is not used actively and for a legitimate purpose.<br />

Solution: N/A<br />

CVE Not available<br />

Trojan/Backdoor - 4553 Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1883 FAMILY: Backdoors RISK: HIGH NESSUS ID:11187<br />

Family Internet Services 479


Description: Synopsis :\n\nThe remote host has a backdoor installed.\n\nThe remote host has<br />

the backdoor '4553' installed. This implies that this host has probably been<br />

compromised.<br />

Solution: Complete reinstallation of host.<br />

CVE Not available<br />

RemotelyAnywhere SSH Detection<br />

<strong>PVS</strong> ID: 1884 FAMILY: Backdoors RISK: LOW NESSUS ID:10921<br />

Description: The remote host is running a RemotelyAnywhere SSH server on this port. Make sure this<br />

software has been installed legitimately, as it is a tool of choice to many attackers,<br />

according to NAVCIRT.<br />

Solution: N/A<br />

CVE Not available<br />

RemotelyAnywhere WWW Detection<br />

<strong>PVS</strong> ID: 1885 FAMILY: Backdoors RISK: LOW NESSUS ID:10920<br />

Description: The remote host is running a RemotelyAnywhere web server on this port. Make sure this<br />

software has been installed legitimately, as it is a tool of choice to many attackers,<br />

according to NAVCIRT.<br />

Solution: N/A<br />

CVE Not available<br />

Apple Airport Administrative Port Credential Encryption Weakness<br />

<strong>PVS</strong> ID: 1886 FAMILY: Generic RISK: HIGH NESSUS ID:11620<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nThe remote host is an Apple Airport Wireless Access Point, which can be<br />

administrated on top of port 5009. There is a flaw in the administration protocol of this<br />

device which makes its password to be transmitted in cleartext over the network. An<br />

attacker could sniff this information, recover the password, and use it to gain administrative<br />

privileges on this host.<br />

Solution: Block incoming traffic to this port, and only administer this device via a cross-over cable.<br />

CVE-2003-0270<br />

LeafNode < 1.9.30 Resource Exhaustion DoS<br />

<strong>PVS</strong> ID: 1887 FAMILY: Generic<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 480


Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS)<br />

attack.\n\nThe remote host is running the LeafNode NNTP server. The version of<br />

LeafNode that is installed is vulnerable to a denial of service attack that may be<br />

abused by an attacker to cause this system to fail.<br />

Solution: Upgrade to LeafNode 1.9.30 or higher.<br />

CVE-2002-1661<br />

NNTP Server Type and Version<br />

<strong>PVS</strong> ID: 1888 FAMILY: Generic RISK: LOW NESSUS ID:10159<br />

Description: The remote host is running a NNTP server. Its banner is : \n%L<br />

Solution: N/A<br />

CVE Not available<br />

tanned < 0.7.2 Remote Format String<br />

<strong>PVS</strong> ID: 1889 FAMILY: Generic RISK: HIGH NESSUS ID:11495<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote format string flaw.\n\nThe remote<br />

host is running tanned. Some versions of this software are vulnerable to a format string<br />

attack which may allow an attacker to get a root shell on this host.<br />

Solution: Upgrade to tanned 0.7.2 or higher.<br />

apcupsd Detection<br />

CVE-2003-1236<br />

<strong>PVS</strong> ID: 1890 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running apcupsd, a APC battery manager backup unit manager.<br />

The remote host is running the following version of this software : \n%L<br />

Solution: N/A<br />

apcupsd Overflow<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1891 FAMILY: Generic RISK: HIGH NESSUS ID:11484<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of apcupsd which is vulnerable to a buffer overflow. An attacker could<br />

exploit this flaw to gain a root shell on this host.<br />

Family Internet Services 481


Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2003-0099<br />

PostgreSQL < 7.2.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1892 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11456<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw which allows for the bypassing of<br />

authentication.\n\nThe remote PostgreSQL server is vulnerable to various flaws which may<br />

allow an attacker who has the right to query the remote database to obtain a shell on this<br />

host.<br />

Solution: Upgrade to PostgreSQL 7.2.3 or higher.<br />

CVE-2002-1399<br />

PostgreSQL < 7.2.3 Multiple Vulnerabilities (2)<br />

<strong>PVS</strong> ID: 1893 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11456<br />

Description: Synopsis :\n\nThe remote host can be tricked into giving a user a shell.\n\nThe remote<br />

PostgreSQL server is vulnerable to various flaws which may allow an attacker who has the<br />

right to query the remote database to obtain a shell on this host.<br />

Solution: Upgrade to PostgreSQL 7.2.3 or higher.<br />

CVE-2002-1398<br />

Oracle 9iAS Administrative Web Interface Authentication Weakness<br />

<strong>PVS</strong> ID: 1894 FAMILY: Web Servers RISK: HIGH NESSUS ID:11452<br />

Description: The remote Oracle 9i Application Server administrative interface runs on this port. Make<br />

sure that the access to this interface is restricted to the persons who are in charge of this<br />

server.<br />

Solution: Impose Access Control Lists (ACLs) on the administrative interface.<br />

CVE-2002-0561<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

McAfee ePolicy Orchestrator Remote Format String<br />

<strong>PVS</strong> ID: 1895 FAMILY: Generic RISK: HIGH NESSUS ID:11409<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote 'format string' flaw.\n\nThe remote<br />

server is running McAfee ePolicy Orchestrator. This service *might* be vulnerable to a<br />

format string attack which may allow an attacker to execute arbitrary commands with the<br />

SYSTEM privileges.<br />

Family Internet Services 482


Solution: Upgrade or patch according to vendor recommendations.<br />

rsync Detection<br />

CVE-2002-0690<br />

<strong>PVS</strong> ID: 1896 FAMILY: Generic RISK: LOW NESSUS ID:11389<br />

Description: The remote host is running rsync on this port.<br />

Solution: N/A<br />

CVE Not available<br />

rsync < 2.5.2 Signedness Error Array Overflow<br />

<strong>PVS</strong> ID: 1897 FAMILY: Generic RISK: HIGH NESSUS ID:11390<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote rsync<br />

server might be vulnerable to an array index overflow. An attacker may use this flaw to<br />

gain a shell on this host.<br />

Solution: Upgrade to rsync 2.5.2 or higher.<br />

CVS Server Detection<br />

CVE-2002-0048<br />

<strong>PVS</strong> ID: 1898 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote server is running the CVS daemon. The server is being used as a central file<br />

repository for maintenance of file or package version.<br />

Solution: Ensure that the server is operating under the guidelines as set forth by corporate and<br />

security policies. Examine the possibility of securing the CVS session by using CVS over<br />

SSH.<br />

CVE Not available<br />

CVS < 1.11.5 pserver Directory Request Double Free() Privilege Escalation<br />

<strong>PVS</strong> ID: 1899 FAMILY: Generic RISK: HIGH NESSUS ID:11385<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote CVS<br />

server is vulnerable to a double free() vulnerability that may allow an attacker to gain a<br />

shell on this host.<br />

Solution: Upgrade to CVS 1.11.5 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 483


CVE-2003-0015<br />

MySQL < 3.23.56 Local Privilege Escalation<br />

<strong>PVS</strong> ID: 1900 FAMILY: Database RISK: HIGH NESSUS ID:11378<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a local 'privilege escalation' flaw.\n\nThe<br />

remote host is running a version of MySQL which is older than version 3.23.56. A<br />

vulnerability exists that may allow the mysqld service to start with elevated privileges. An<br />

attacker can exploit this vulnerability by creating a DATADIR/my.cnf that includes the line<br />

'user'.<br />

Solution: Upgrade to version 3.23.56 or higher.<br />

CVE-2003-0150<br />

UUCP Server Detection<br />

<strong>PVS</strong> ID: 1901 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: A UUCP server is running on this port.<br />

Solution: N/A<br />

Time Server Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 1902 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: A time server is running on this port.<br />

Solution: N/A<br />

Telnet Server Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 1903 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: A telnet server is running on this port.<br />

Solution: N/A<br />

CVE Not available<br />

Chargen Server Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1904 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 484


Description: A chargen server is running on this port.<br />

Solution: N/A<br />

CVE Not available<br />

Chargen Server Detection (UDP)<br />

<strong>PVS</strong> ID: 1905 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may be used to attack other hosts.\n\nA chargen server is<br />

running on this port on top of UDP. An attacker may use spoofed UDP packets to use this<br />

server to set up a 'ping pong' attack that would use this service to attack a third party host.<br />

Solution: Disable the service.<br />

DHCP Server Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 1906 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: A DHCP server is running on this host.<br />

Solution: N/A<br />

CVE Not available<br />

DHCP Server Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1907 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a DHCP server. If it is ISC-DHCP, there might be several flaws<br />

in it that may allow an attacker to gain a root shell on this host.<br />

Solution: Upgrade to latest version of ISC-DHCP.<br />

CVE-2004-1006<br />

MySQL < 3.23.55 Double Free() Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1908 FAMILY: Database RISK: HIGH NESSUS ID:11299<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of MySQL which is older than version 3.23.55. If you have not patched<br />

this version, then any attacker with a valid username may crash this service remotely by<br />

exploiting a double free bug.\n Further exploitation to gain a shell on the host may also be<br />

possible.<br />

Family Internet Services 485


Solution: Upgrade to MySQL 3.23.55 or higher.<br />

CVE-2003-0073<br />

ClarkConnect Linux clarkconnectd Information Disclosure<br />

<strong>PVS</strong> ID: 1909 FAMILY: Backdoors<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11277<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw which allows attackers to retrieve<br />

sensitive files or data.\n\nThe daemon 'clarkconnectd' seems to be running on this port.<br />

This daemon can provide sensitive information to attackers, such as the list of running<br />

processes, the content of /var/log/messages, the snort log file and more. An attacker may<br />

use it to gain more knowledge about this host.<br />

Solution: No solution is known at this time.<br />

CVE-2003-1379<br />

Trojan/Backdoor - DeepThroat Detection<br />

<strong>PVS</strong> ID: 1910 FAMILY: Backdoors RISK: HIGH NESSUS ID:10053<br />

Description: Synopsis :\n\nThe remote host has a backdoor installed.\n\nDeepThroat is installed on the<br />

remote host. This backdoor allows anyone to partially take the control of the remote<br />

system. An attacker may use it to steal your password or prevent your computer from<br />

working properly.<br />

Solution: Use RegEdit, and find 'SystemDLL32' in<br />

HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Run. The value's data is the path<br />

of the file. If you are infected by DeepThroat 2 or 3, then the registry value is named<br />

'SystemTray'.<br />

CVE Not available<br />

Trojan/Backdoor - NetSphere Detection<br />

<strong>PVS</strong> ID: 1911 FAMILY: Backdoors RISK: HIGH NESSUS ID:10005<br />

Description: Synopsis :\n\nThe remote host has a backdoor installed.\n\nNetSphere is installed. This<br />

backdoor allows anyone to partially take control of the remote system. An attacker may use<br />

this vulnerability to steal your password or prevent your system from working properly.<br />

Solution: Telnet to this computer on TCP port 30100 and type : '', without the quotes,<br />

and press Enter. This will stop the NetSphere service. Manually inspect and repair this<br />

system.<br />

CVE Not available<br />

Trojan/Backdoor - GateCrasher Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 486


<strong>PVS</strong> ID: 1912 FAMILY: Backdoors RISK: HIGH NESSUS ID:10093<br />

Description: Synopsis :\n\nThe remote host has a backdoor installed.\n\nGateCrasher is installed. This<br />

backdoor allows anyone to partially take the control of the remote system. An attacker may<br />

use it to steal your password or prevent your system from working properly.<br />

Solution: Telnet to this host on port 6969, then type 'gatecrasher;', without the quotes, and press<br />

Enter. Then type 'uninstall;' and press Enter, it will be uninstalled. Manually inspect and<br />

repair this system<br />

CVE Not available<br />

Trojan/Backdoor - Portal of Doom Detection<br />

<strong>PVS</strong> ID: 1913 FAMILY: Backdoors RISK: HIGH NESSUS ID:10186<br />

Description: Synopsis :\n\nThe remote host has a backdoor installed.\n\nPortal of Doom is installed.<br />

This backdoor allows anyone to partially take the control of the remote system. An attacker<br />

may use it to steal your password or prevent your system from working properly.<br />

Solution: Open the registry to HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices<br />

and look for the value named 'String' with the data 'c:\windows\system\ljsgz.exe'. Boot into<br />

DOS mode and delete the c:\windows\system\ljsgz.exe file, then boot into Windows and<br />

delete the 'String' value from the registry. If you are running Windows NT and are infected,<br />

you can kill the process with Task Manager, and then remove the 'String' registry value.<br />

Manually inspect and repair this system.<br />

CVE Not available<br />

Trojan/Backdoor - GirlFriend Detection<br />

<strong>PVS</strong> ID: 1914 FAMILY: Backdoors RISK: HIGH NESSUS ID:10094<br />

Description: Synopsis :\n\nThe remote host has a backdoor installed.\n\nGirlFriend is installed. This<br />

backdoor allows anyone to partially take the control of the remote system. An attacker may<br />

use it to steal your password or prevent your system from working properly.<br />

Solution: To remove GirlFriend from your machine, open regedit to<br />

HKLM\Software\Microsoft\Windows\CurrentVersion\Run and look for a value named<br />

'Windll.exe' with the data 'c:\windows\windll.exe'. Reboot to DOS and delete the<br />

C:\windows\windll.exe file, then boot to Windows and remove the 'Windll.exe' registry<br />

value. Manually inspect and repair this system<br />

CVE Not available<br />

Trojan/Backdoor - EvilFTP Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1915 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 487


Description: Synopsis :\n\nThe remote host has a backdoor installed\n\nThe remote host is running<br />

EvilFTP. EvilFTP is a backdoor that sets up an FTP server on your machine.<br />

Solution: To remove this backdoor on Windows 95 and 98, delete the line "Run<br />

CVE Not available<br />

Trojan/Backdoor - Phase Zero Detection<br />

<strong>PVS</strong> ID: 1916 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has a backdoor installed.\n\nPhase Zero is installed. This<br />

backdoor allows anyone to partially take the control of the remote system. An attacker may<br />

use it to steal your password or prevent your system from working properly.<br />

Solution: Look for the registry key MsgServ in<br />

HKLM\Software\Microsoft\Windows\CurrentVersion\Run with value msgsvr32.exe.<br />

Search for any suspicious files in the run key, and if found locate the file, open it and<br />

search for the text string "phAse Zero". If found, then delete that file and delete the registry<br />

value from the registry. Manually inspect and repair this system<br />

CVE Not available<br />

Trojan/Backdoor - SubSeven Detection<br />

<strong>PVS</strong> ID: 1917 FAMILY: Backdoors RISK: HIGH NESSUS ID:10409<br />

Description: Synopsis :\n\nThe remote host has a backdoor installed.\n\nThis host seems to be running<br />

SubSeven on this port. SubSeven is trojan which allows an intruder to take the control of<br />

the remote computer. An attacker may use it to steal your passwords, modify your data, and<br />

prevent your system from working properly.<br />

Solution: Use an up-to-date virus scanner to remove SubSeven or reinstall your system.<br />

CVE Not available<br />

Trojan/Backdoor - SyGate Detection<br />

<strong>PVS</strong> ID: 1918 FAMILY: Backdoors RISK: HIGH NESSUS ID:10274<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nThe SyGate engine remote controller seems to be running on this port. It<br />

may be used by malicious users which are on the same subnet as yours to reconfigure this<br />

SyGate engine.<br />

Solution: Uninstall the engine if not necessary.<br />

CVE-2000-0113<br />

SETI@HOME Client Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 488


<strong>PVS</strong> ID: 1919 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software which should be authorized by corporate<br />

policy.\n\nA SETI@HOME client appears to be running on this port. This program may be<br />

used by malicious users to get your system information (processor type and the operating<br />

system). SETI@HOME client versions prior to 3.08 are vulnerable to a buffer overflow<br />

attack.<br />

Solution: Uninstall the program if it is not necessary.<br />

CVE Not available<br />

WinGate Telnet Proxy Server Detection<br />

<strong>PVS</strong> ID: 1920 FAMILY: Backdoors<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nThe remote host is running a Wingate Telnet Proxy server. If not configured<br />

securely, a Wingate Telnet Proxy server may be used by hackers to conceal their true<br />

origins by bouncing conections through these proxies.<br />

Solution: Uninstall the server if not necessary; otherwise ensure connections to the proxy are only<br />

made by trusted hosts.<br />

CVE-1999-0441<br />

GnoCatan Remote Overflow<br />

<strong>PVS</strong> ID: 1921 FAMILY: Backdoors RISK: HIGH NESSUS ID:11736<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running GnoCatan, a game server for the GNOME environment. There is a buffer overflow<br />

in this service that may allow a remote attacker to gain a shell on this host.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

NetBIOS Name Service Reply Information Disclosure<br />

<strong>PVS</strong> ID: 1922 FAMILY: Generic<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11830<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to disclose<br />

memory.\n\nThe remote host is running a version of the NetBT name service which suffers<br />

from a memory disclosure problem.\nAn attacker may send a special packet to the remote<br />

NetBT name service, and the reply will contain random arbitrary data from the remote host<br />

memory. This arbitrary data may be a fragment from the web page the remote user is<br />

viewing, or something more serious like a cleartext password.\nAn attacker may use this<br />

flaw to continuously 'poll' the content of the memory of the remote host and might be able<br />

Family Internet Services 489


to obtain sensitive information.<br />

Solution: Contact the vendor for a patch or disable NetBIOS over TCP if it is not required.<br />

CVE-2003-0661<br />

TLSv1 Negotiation Detection<br />

<strong>PVS</strong> ID: 1923 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The server on this port is tunneling traffic through TLSv1.<br />

Solution: N/A<br />

Citrix Server Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 1924 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10942<br />

Description: A Citrix server is running on this machine. Citrix servers allow a Windows user to remotely<br />

obtain a graphical login (and therefore act as a local user on the remote host). If an attacker<br />

gains a valid login and password, he may be able to use this service to gain further access<br />

on the remote host.<br />

Solution: Disable this service if you do not use it. Ensure that strong encryption is being used.<br />

CVE Not available<br />

Windows Update Traffic Detection<br />

<strong>PVS</strong> ID: 1925 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is enabled and utilizing Microsoft Windows Update. This service<br />

allows users to check for missing updates and initiate remediation via the Microsoft<br />

update site. Depending on your individual policy, this may or may not be a desirable<br />

action.<br />

Solution: Ensure that Windows Update utilization is a valid use of company resources.<br />

CVE Not available<br />

Generic Shell Detection (HP-UX Telnet)<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1926 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nAn HP-UX shell server was noted on the host. Typically, shells are used by<br />

remote users to manage operating systems. Shells that pass traffic in plaintext introduce a<br />

risk to confidentiality and privacy. In addition, many shells are used by malicious<br />

Family Internet Services 490


individuals as part of a Trojan program or remote buffer overflow exploit.<br />

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid, approved<br />

means of managing the remote machine.<br />

CVE Not available<br />

Generic Shell Detection (Linux Telnet)<br />

<strong>PVS</strong> ID: 1927 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nA Linux telnet shell server was noted on the host. Typically, shells are used<br />

by remote users to manage operating systems. Shells that pass traffic in plaintext introduce<br />

a risk to confidentiality and privacy. In addition, many shells are used by malicious<br />

individuals as part of a Trojan program or remote buffer overflow exploit.<br />

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid, approved<br />

means of managing the remote machine.<br />

CVE Not available<br />

Generic Shell Detection (HP-UX High Port)<br />

<strong>PVS</strong> ID: 1928 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nAn HP-UX shell server was noted on the host. Typically, shells are used by<br />

remote users to manage operating systems. Shells that pass traffic in plaintext introduce a<br />

risk to confidentiality and privacy. In addition, many shells are used by malicious<br />

individuals as part of a Trojan program or remote buffer overflow exploit.<br />

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid, approved<br />

means of managing the remote machine.<br />

CVE Not available<br />

Generic Shell Detection (Cisco Telnet)<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1929 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nA Cisco shell server was noted on the host. Typically, shells are used by<br />

remote users to manage operating systems. Shells that pass traffic in plaintext introduce a<br />

risk to confidentiality and privacy. In addition, many shells are used by malicious<br />

individuals as part of a Trojan program or remote buffer overflow exploit.<br />

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid, approved<br />

means of managing the remote machine.<br />

Family Internet Services 491


CVE Not available<br />

Generic Shell Detection (HP JetDirect)<br />

<strong>PVS</strong> ID: 1930 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nA HP JetDirect shell server was noted on the host. Typically, shells are used<br />

by remote users to manage operating systems. Shells that pass traffic in plaintext introduce<br />

a risk to confidentiality and privacy. In addition, many shells are used by malicious<br />

individuals as part of a Trojan program or remote buffer overflow exploit.<br />

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid, approved<br />

means of managing the remote machine.<br />

CVE Not available<br />

Generic Shell Detection (HP JetDirect)<br />

<strong>PVS</strong> ID: 1931 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nAn unpassworded HP JetDirect shell server was noted on the host.<br />

Typically, shells are used by remote users to manage operating systems. Shells that pass<br />

traffic in plaintext introduce a risk to confidentiality and privacy. In addition, many shells<br />

are used by malicious individuals as part of a Trojan program or remote buffer overflow<br />

exploit.<br />

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid, approved<br />

means of managing the remote machine.<br />

CVE Not available<br />

Generic Shell Detection (SunOS)<br />

<strong>PVS</strong> ID: 1932 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nA SunOS shell server was noted on the host. Typically, shells are used by<br />

remote users to manage operating systems. Shells that pass traffic in plaintext introduce a<br />

risk to confidentiality and privacy. In addition, many shells are used by malicious<br />

individuals as part of a Trojan program or remote buffer overflow exploit.<br />

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid, approved<br />

means of managing the remote machine.<br />

CVE Not available<br />

Generic Shell Detection (Windows NT Telnet)<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1933 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 492


Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nA Windows shell server was noted on the host. Typically, shells are used by<br />

remote users to manage operating systems. Shells that pass traffic in plaintext introduce a<br />

risk to confidentiality and privacy. In addition, many shells are used by malicious<br />

individuals as part of a Trojan program or remote buffer overflow exploit.<br />

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid, approved<br />

means of managing the remote machine.<br />

CVE Not available<br />

Generic Shell Detection (Sys V Telnet)<br />

<strong>PVS</strong> ID: 1934 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nA shell server was noted on the host. Typically, shells are used by remote<br />

users to manage operating systems. Shells that pass traffic in plaintext introduce a risk to<br />

confidentiality and privacy. In addition, many shells are used by malicious individuals as<br />

part of a Trojan program or remote buffer overflow exploit.<br />

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid, approved<br />

means of managing the remote machine.<br />

CVE Not available<br />

Generic Shell Detection (Printer Telnet)<br />

<strong>PVS</strong> ID: 1935 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nA printer shell server was noted on the host. Typically, shells are used by<br />

remote users to manage operating systems. Shells that pass traffic in plaintext introduce a<br />

risk to confidentiality and privacy. In addition, many shells are used by malicious<br />

individuals as part of a Trojan program or remote buffer overflow exploit.<br />

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid, approved<br />

means of managing the remote machine.<br />

CVE Not available<br />

Generic Shell Detection (RedHat Telnet)<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1936 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nA RedHat Linux shell server was noted on the host. Typically, shells are<br />

used by remote users to manage operating systems. Shells that pass traffic in plaintext<br />

introduce a risk to confidentiality and privacy. In addition, many shells are used by<br />

malicious individuals as part of a Trojan program or remote buffer overflow exploit.<br />

Family Internet Services 493


Solution: Ensure that the remote shell is secured against data leakage and that it is a valid, approved<br />

means of managing the remote machine.<br />

CVE Not available<br />

Generic Shell Detection (AXIS Telnet)<br />

<strong>PVS</strong> ID: 1937 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nA shell server was noted on the host. Typically, shells are used by remote<br />

users to manage operating systems. Shells that pass traffic in plaintext introduce a risk to<br />

confidentiality and privacy. In addition, many shells are used by malicious individuals as<br />

part of a Trojan program or remote buffer overflow exploit.<br />

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid, approved<br />

means of managing the remote machine.<br />

CVE Not available<br />

Generic Shell Detection (SCO Telnet)<br />

<strong>PVS</strong> ID: 1938 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nA SCO shell server was noted on the host. Typically, shells are used by<br />

remote users to manage operating systems. Shells that pass traffic in plaintext introduce a<br />

risk to confidentiality and privacy. In addition, many shells are used by malicious<br />

individuals as part of a Trojan program or remote buffer overflow exploit.<br />

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid, approved<br />

means of managing the remote machine.<br />

CVE Not available<br />

Generic Shell Detection (Informix UniVerse Telnet)<br />

<strong>PVS</strong> ID: 1939 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nAn Informix shell server was noted on the host. Typically, shells are used<br />

by remote users to manage operating systems. Shells which pass traffic in plaintext<br />

introduce a risk to confidentiality and privacy. In addition, many shells are used by<br />

malicious individuals as part of a Trojan program or remote buffer overflow exploit.<br />

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid, approved<br />

means of managing the remote machine.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 494


Generic Shell Detection (AIX Telnet)<br />

<strong>PVS</strong> ID: 1940 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nAn AIX shell server ( %L ) was noted on the host. Typically, shells are used<br />

by remote users to manage operating systems. Shells that pass traffic in plaintext introduce<br />

a risk to confidentiality and privacy. In addition, many shells are used by malicious<br />

individuals as part of a Trojan program or remote buffer overflow exploit.<br />

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid, approved<br />

means of managing the remote machine.<br />

CVE Not available<br />

Generic Shell Detection (Cisco Telnet)<br />

<strong>PVS</strong> ID: 1941 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nA shell server was noted on the host. Typically, shells are used by remote<br />

users to manage operating systems. Shells that pass traffic in plaintext introduce a risk to<br />

confidentiality and privacy. In addition, many shells are used by malicious individuals as<br />

part of a Trojan program or remote buffer overflow exploit.<br />

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid, approved<br />

means of managing the remote machine.<br />

CVE Not available<br />

Generic Shell Detection (MESA Telnet)<br />

<strong>PVS</strong> ID: 1942 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nA shell server was noted on the host. Typically, shells are used by remote<br />

users to manage operating systems. Shells that pass traffic in plaintext introduce a risk to<br />

confidentiality and privacy. In addition, many shells are used by malicious individuals as<br />

part of a Trojan program or remote buffer overflow exploit.<br />

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid, approved<br />

means of managing the remote machine.<br />

CVE Not available<br />

Generic Shell Detection (Cisco Catalyst)<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1943 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 495


Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nA Cisco shell server was noted on the host. Typically, shells are used by<br />

remote users to manage operating systems. Shells that pass traffic in plaintext introduce a<br />

risk to confidentiality and privacy. In addition, many shells are used by malicious<br />

individuals as part of a Trojan program or remote buffer overflow exploit.<br />

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid, approved<br />

means of managing the remote machine.<br />

CVE Not available<br />

Generic Shell Detection (MV/9600)<br />

<strong>PVS</strong> ID: 1944 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: A shell server was noted on the host. Typically, shells are used by remote users to manage<br />

operating systems. Shells which pass traffic in plaintext introduce a risk to confidentiality<br />

and privacy. In addition, many shells are used by malicious individuals as part of a Trojan<br />

program or remote buffer overflow exploit.<br />

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid, approved<br />

means of managing the remote machine.<br />

CVE Not available<br />

Citrix MetaFrame Published Application Enumeration<br />

<strong>PVS</strong> ID: 1945 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11138<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote Citrix server is configured in such a way as to allow anonymous<br />

remote users to enumerate services.<br />

Solution: Contact Citrix for a workaround, patch, or configuration option to mitigate this risk<br />

CVE Not available<br />

LDAP NULL Base Connection<br />

<strong>PVS</strong> ID: 1946 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10722<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nImproperly configured LDAP servers will allow the directory BASE to be set to<br />

NULL. This allows information to be obtained without any prior knowledge of the<br />

directory structure. Coupled with a NULL BIND, an anonymous user can query your<br />

LDAP server using a tool such as LdapMiner<br />

Solution: Disable NULL base connections.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 496


CVE Not available<br />

LDAP Server NULL Bind Connection Information Disclosure<br />

<strong>PVS</strong> ID: 1947 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10723<br />

Description: The remote host is an LDAP server. The LDAP server is configured to accept NULL 'bind'<br />

requests which will allow any user to connect to the server and query for information.<br />

Solution: Disable anonymous bind connections.<br />

CVE-1999-0385<br />

UPNP Traffic Detection<br />

<strong>PVS</strong> ID: 1948 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

Description: Microsoft Universal Plug n Play is running on this machine.<br />

Solution: Disable the Universal Plug n Play functionality unless required.<br />

CVE-2001-0876<br />

LDAP Server NULL Bind Connection Information Disclosure<br />

<strong>PVS</strong> ID: 1949 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10829<br />

NESSUS ID:10723<br />

Description: The remote host is an LDAP server. The LDAP server is configured to accept NULL 'bind'<br />

requests that will allow any user to connect to the server and query for information.<br />

Solution: Disable anonymous bind connections.<br />

CVE-1999-0385<br />

UPNP Traffic Detection<br />

<strong>PVS</strong> ID: 1950 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

Description: Microsoft Universal Plug n Play is running on this machine.<br />

Solution: Disable the Universal Plug n Play functionality unless required.<br />

CVE-2001-0877<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Speak Freely Malformed GIF Image Handling DoS<br />

NESSUS ID:10829<br />

Family Internet Services 497


<strong>PVS</strong> ID: 1951 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running a version of Speak Freely that is vulnerable to a Denial of Service<br />

attack that may be exploited by an attacker by sending a malformed GIF (using the "show<br />

your face feature") to the vulnerable host.<br />

Solution: The vendor has discontinued this product.<br />

CVE Not available<br />

Winamp MIDI Plugin Track Size Overflow<br />

<strong>PVS</strong> ID: 1952 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nWinamp versions 2.91<br />

and below suffer from a vulnerability which allows an attacker to overflow the client with a<br />

specially crafted MIDI file. Mass exploitation of this vulnerability would be relatively easy<br />

for an attacker with a streaming media server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Citrix MetaFrame Service Enumeration<br />

<strong>PVS</strong> ID: 1953 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11138<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote Citrix server is configured in such a way as to allow anonymous<br />

remote users to enumerate services.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

LDAP NULL Base Connection<br />

<strong>PVS</strong> ID: 1954 FAMILY: Generic<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10722<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nImproperly configured LDAP servers will allow the directory BASE to be set to<br />

NULL. This allows information to be gathered without any prior knowledge of the<br />

directory structure. Coupled with a NULL BIND, an anonymous user can query your<br />

LDAP server using a tool such as LdapMiner.<br />

Family Internet Services 498


Solution: Disable NULL base connections.<br />

CVE Not available<br />

Checkpoint Firewall-1 Detection<br />

<strong>PVS</strong> ID: 1955 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is a Checkpoint Firewall version 4.1 with no service packs. The firewall is vulnerable to<br />

multiple remote buffer overflows, format string attacks, and other miscellaneous<br />

vulnerabilities.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Checkpoint Firewall-1 Detection<br />

<strong>PVS</strong> ID: 1956 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is a Checkpoint Firewall version 4.1 SP1. The firewall is vulnerable to multiple remote<br />

buffer overflows, format string attacks, and other miscellaneous vulnerabilities.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Checkpoint Firewall-1 Detection<br />

<strong>PVS</strong> ID: 1957 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is a Checkpoint Firewall version 4.1 SP2 - SP6. There are known<br />

vulnerabilities within these versions.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Checkpoint Firewall-1 Detection<br />

<strong>PVS</strong> ID: 1958 FAMILY: Generic<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is a Checkpoint Firewall version NG with no service packs. There are known<br />

vulnerabilities within this version.<br />

Family Internet Services 499


Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Checkpoint Firewall-1 Detection<br />

<strong>PVS</strong> ID: 1959 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is a Checkpoint Firewall version NG with FP1. There are known vulnerabilities<br />

with this version.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Checkpoint Firewall-1 Detection<br />

<strong>PVS</strong> ID: 1960 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

Description: The remote host is a Checkpoint Firewall version NG with FP2.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Checkpoint Firewall-1 Detection<br />

NESSUS ID:Not Available<br />

<strong>PVS</strong> ID: 1961 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is a Checkpoint Firewall version NG with FP3.<br />

Solution: Ensure that the firewall is configured in a manner consistent with corporate security<br />

policies.<br />

CVE Not available<br />

Checkpoint Firewall-1 Detection<br />

<strong>PVS</strong> ID: 1962 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is a Checkpoint Firewall version AI R54.<br />

Solution: Ensure that the firewall is configured in a manner consistent with corporate security<br />

policies.<br />

CVE Not available<br />

Generic Shell Detection (Avaya Telnet)<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 500


<strong>PVS</strong> ID: 1963 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: A shell server was noted on the host. Typically, shells are used by remote users to manage<br />

operating systems. Shells that pass traffic in plaintext introduce a risk to confidentiality and<br />

privacy. In addition, many shells are used by malicious individuals as part of a Trojan<br />

program or remote buffer overflow exploit.<br />

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid, approved<br />

means of managing the remote machine.<br />

CVE Not available<br />

Subversion (SVN) < 1.0.6 Module File Restriction Bypass<br />

<strong>PVS</strong> ID: 1964 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:13848<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve and<br />

modify sensitive files or data.\n\nThe remote host is running a version of Subversion which<br />

is older than 1.0.6. A flaw exists in the apache module mod_authz_svn in older versions.<br />

An attacker can access to any file in a given Subversion repository despite restrictions set<br />

by the administrator.<br />

Solution: Upgrade to Subversion 1.0.6 or higher.<br />

CVE-2004-1438<br />

Rsync < 2.6.3 Sanitize_path Function Module Path Escaping<br />

<strong>PVS</strong> ID: 1965 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw which allows attackers to retrieve and<br />

modify sensitive files or data.\n\nThe remote host is running a rsync server, a program to<br />

synchronize files and directories structure across a network. The version running on the<br />

host may be vulnerable to a path escaping issue. An attacker may be able to write and read<br />

files in the context of the server.<br />

Solution: Upgrade to rsync 2.6.3 or higher.<br />

CVE-2004-0792<br />

F-Secure SSH Password Authentication Policy Evasion<br />

<strong>PVS</strong> ID: 1966 FAMILY: SSH<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:12099<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running F-Secure SSH. This version contains a bug which<br />

may allow a user to log in using a password even though the server policy disallows it. An<br />

attacker may exploit this flaw to set up a dictionary attack against the remote SSH server<br />

Family Internet Services 501


and eventually get access to this host.<br />

Solution: Upgrade F-Secure SSH to a version greater than 3.1.<br />

SSH Server Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 1967 FAMILY: SSH RISK: NONE NESSUS ID:10267<br />

Description: The remote host is running a SSH server : \n %L<br />

Solution: N/A<br />

SSH Client Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 1968 FAMILY: SSH RISK: NONE NESSUS ID:Not Available<br />

Description: The remote host is running a SSH client: %L<br />

Solution: N/A<br />

CVE Not available<br />

SSH < 3.1.5 / 3.2.2 setsid() Privilege Escalation<br />

<strong>PVS</strong> ID: 1969 FAMILY: SSH RISK: HIGH NESSUS ID:11169<br />

Description: Synopsis :\n\nThe remote host may allow users to escalate privileges.\n\nThe remote host is<br />

running a version of the SSH server which is older than version 3.1.5 or 3.2.2. There is a<br />

vulnerability in this version which may allow a user to obtain higher privileges due to a<br />

flaw in the way setsid() is used. The remote host is running : %L<br />

Solution: Upgrade to version 3.1.5, 3.2.2 or higher.<br />

CVE-2002-1644<br />

scp < 2.1 Traversal File Create/Overwrite<br />

<strong>PVS</strong> ID: 1970 FAMILY: SSH<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11339<br />

Description: Synopsis :\n\nThe remote server may allow attackers to retrieve or modify sensitive<br />

files.\n\nThe remote host is running SSH 1.2.3 or 1.2 (as a client). There is a vulnerability<br />

in this version that allows a malicious scp server to overwrite arbitrary files via a directory<br />

traversal bug. An attacker may use this flaw to compromise this host. To exploit it, the<br />

attacker would have to compromise a host to which users of this host are SSH'ing into, and<br />

then to set up a trojaned version of scp which would overwrite files on this host<br />

Family Internet Services 502


Solution: Upgrade to version 2.1 or higher.<br />

CVE-2000-0992<br />

PKCS#1 Version 1.5 Session Key Retrieval<br />

<strong>PVS</strong> ID: 1971 FAMILY: SSH<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw which allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is using version 1.5 of the SSH protocol. This<br />

version allows a remote attacker to decrypt and/or alter traffic via an attack against<br />

PKCS#1 version 1.5, called the 'Bleichenbacher' attack. OpenSSH up to version 2.3.0,<br />

AppGate and SSH Communications <strong>Security</strong> ssh1 update to version 1.2.31 are vulnerable<br />

to this attack.<br />

Solution: Upgrade to the latest version of OpenSSH/SSH.<br />

CVE-2001-0361<br />

SSH RSAREF Library Multiple Overflows<br />

<strong>PVS</strong> ID: 1972 FAMILY: SSH RISK: HIGH NESSUS ID:10269<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of SSH which is older (or as old as) 1.2.27. If this version was compiled<br />

against the RSAREF library (which can not be determined remotely), then it is very likely<br />

to be vulnerable to a buffer overflow that may allow an attacker to obtain a root shell on<br />

this host. To determine if SSH has been compiled against the RSAREF library, log into the<br />

remote host and type 'ssh -V'<br />

Solution: Upgrade to SSH 2.x or do not use the RSAREF library.<br />

CVE-1999-0834<br />

SSH Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1973 FAMILY: SSH RISK: HIGH NESSUS ID:11195<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote SSH<br />

server is vulnerable to various vulnerabilities that may allow an attacker to obtain a root<br />

shell on this host.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-1360<br />

SSH Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1974 FAMILY: SSH RISK: HIGH NESSUS ID:11195<br />

Family Internet Services 503


Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote SSH<br />

server (or client) is vulnerable to various vulnerabilities that may allow an attacker to<br />

obtain a root shell on this host.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-1360<br />

SSH Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1975 FAMILY: SSH RISK: HIGH NESSUS ID:11195<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote SSH<br />

server (or client) is vulnerable to various vulnerabilities that may allow an attacker to<br />

obtain a root shell on this host.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-1360<br />

SSH Secure-RPC Weak Encrypted Authentication Key Recovery<br />

<strong>PVS</strong> ID: 1976 FAMILY: SSH RISK: LOW NESSUS ID:11340<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running SSH Communication <strong>Security</strong>'s SSH<br />

1.2.27 to 1.2.30. With Secure-RPC, this version may allow local attackers to recover a<br />

SUN-DES-1 magic phrase generated by another user that the attacker can use to decrypt the<br />

private key file of the user.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2001-0259<br />

SSH < 1.2.28 Kerberos NFS Share Ticket Disclosure<br />

<strong>PVS</strong> ID: 1977 FAMILY: SSH RISK: LOW NESSUS ID:10472<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running a version of SSH which is older (or as<br />

old as) version 1.2.27. If it was compiled with Kerberos support, an attacker may exploit a<br />

bug in the Kerberos implementation and may eavesdrop the ticket cache of the users.<br />

Solution: Use SSH-1.2.28 or higher.<br />

CVE-2000-0575<br />

SSH < 1.2.25 CBC/CFB Data Stream Injection<br />

<strong>PVS</strong> ID: 1978 FAMILY: SSH<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10268<br />

Family Internet Services 504


Description: Synopsis :\n\nThe remote host is vulnerable to an flaw that allows attackers to execute<br />

arbitrary commands.\n\nThe remote host is running a version of SSH which is older than<br />

(or as old as) 1.2.23. This version is vulnerable to a known plaintext attack that may allow<br />

an attacker to insert encrypted packets in the client - server stream that will be deciphered<br />

by the server, thus allowing an attacker to execute arbitrary commands on the remote<br />

server.<br />

Solution: Upgrade to SSH-1.2.25 or higher.<br />

CVE-1999-1085<br />

OpenSSH Client < 2.3.0 X11 Unauthorized Remote Forwarding<br />

<strong>PVS</strong> ID: 1979 FAMILY: SSH RISK: HIGH NESSUS ID:11343<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running OpenSSH SSH client older than 2.3.0.<br />

This version does not properly disable X11 or agent forwarding, which could allow a rogue<br />

SSH server to gain access to the X11 display of the client and eavesdrop X11 events.<br />

Solution: Upgrade to version 2.3.0 or higher.<br />

CVE-2000-1169<br />

SSH1 CRC-32 detect_attack Function Overflow<br />

<strong>PVS</strong> ID: 1980 FAMILY: SSH RISK: HIGH NESSUS ID:10607<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using a version of SSH.com's SSH older than version 1.2.32 or a version of OpenSSH older<br />

than 2.3.0. These versions are vulnerable to a buffer overflow that may allow an attacker to<br />

obtain a root shell on this host.<br />

Solution: Upgrade to SSH.com's SSH 1.2.32 or OpenSSH 2.3.0 or higher.<br />

CVE-2001-0144<br />

SSH-1 < 1.2.31 SSH Daemon Account Login Attempt Logging Failure<br />

<strong>PVS</strong> ID: 1981 FAMILY: SSH RISK: HIGH NESSUS ID:11341<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote SSH daemon does not log repeated login attempts, which allows an<br />

attacker to set up a brute force attack to guess the user accounts/passwords of on this host.<br />

Solution: Upgrade to SSH 1.2.31 or higher.<br />

CVE-2001-0471<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

SSH < 3.1.2 AllowedAuthentications Remote Bypass<br />

Family Internet Services 505


<strong>PVS</strong> ID: 1982 FAMILY: SSH RISK: LOW NESSUS ID:10965<br />

Description: Synopsis : \n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running a version of the SSH daemon older than 3.1.2 or<br />

equal to 3.0.0. There is a vulnerability in this release that may, under some circumstances,<br />

allow users to authenticate using a password whereas it is not explicitly listed as a valid<br />

authentication mechanism. An attacker may use this flaw to brute force a password using a<br />

dictionary attack (if the password used is weak). The remote server is running SSH version:<br />

\n %L<br />

Solution: Upgrade to SSH 3.1.2 or higher.<br />

CVE-2002-1646<br />

SSH < 3.0.1 Locked Account Remote Authentication Bypass<br />

<strong>PVS</strong> ID: 1983 FAMILY: SSH<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10708<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw which allows for the bypassing of<br />

authentication.\n\nThe remote host is running SSH 3.0.0. There is a vulnerability in this<br />

release which allows any user to log into accounts that have passwords of two characters<br />

long or less. An attacker may gain root privileges using this flaw.<br />

Solution: Upgrade to SSH 3.0.1 or higher.<br />

CVE-2001-0553<br />

Portable OpenSSH < 3.6.1p2 PAM Timing Side-Channel Weakness<br />

<strong>PVS</strong> ID: 1984 FAMILY: SSH<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11574<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is using a version of Portable OpenSSH that may allow an<br />

attacker to determine if an account exists or not by a timing analysis.<br />

Solution: Upgrade to OpenSSH-portable 3.6.1p2 or higher.<br />

CVE-2003-0190<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

OpenSSH < 2.3.2 SSHv2 Public Key Authentication Bypass<br />

<strong>PVS</strong> ID: 1985 FAMILY: SSH RISK: HIGH NESSUS ID:10608<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running OpenSSH 2.3.1. This version is vulnerable to<br />

a flaw that allows any attacker who can obtain the public key of a valid SSH user to log<br />

into this host without any authentication.<br />

Family Internet Services 506


Solution: Upgrade to OpenSSH 2.3.2 or higher.<br />

CVE-2001-1585<br />

OpenSSH < 3.0.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1986 FAMILY: SSH RISK: HIGH NESSUS ID:10802<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running a version of OpenSSH that is older than<br />

3.0.1. Versions older than 3.0.1 are vulnerable to a flaw in which an attacker may<br />

authenticate, provided that Kerberos V support has been enabled (which is not the case by<br />

default). It is also vulnerable to an excessive memory clearing bug, believed to be<br />

unexploitable. *** You may ignore this warning if this host is not using Kerberos V<br />

Solution: Upgrade to OpenSSH 3.0.1 or higher.<br />

CVE-2002-0083<br />

OpenSSH < 3.4 Multiple Remote Overflows<br />

<strong>PVS</strong> ID: 1987 FAMILY: SSH RISK: HIGH NESSUS ID:11031<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of OpenSSH which is older than 3.4. There is a flaw in this version that<br />

can be exploited remotely to give an attacker a shell on this host. Note that several<br />

distributions patched this hole without changing the version number of OpenSSH. Note:<br />

<strong>PVS</strong> solely relied on the banner of the remote SSH server to perform this check. If you are<br />

running a RedHat host, make sure that the command :\nrpm -q openssh-server\n Returns :<br />

openssh-server-3.1p1-6.<br />

Solution: Upgrade to OpenSSH 3.4 or contact your vendor for a patch.<br />

CVE-2002-0640<br />

OpenSSH < 2.9.9 Multiple Key Type ACL Bypass<br />

<strong>PVS</strong> ID: 1988 FAMILY: SSH<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10771<br />

Description: Synopsis :\n\nRemote users may be able to circumvent system policy.\n\nThe remote host<br />

is running a version of OpenSSH between 2.5.x and 2.9.x. Depending on the order of the<br />

user keys in ~/.ssh/authorized_keys2, sshd might fail to apply the source IP based access<br />

control restriction to the correct key. This problem allows users to circumvent the system<br />

policy and login from disallowed source IP address.<br />

Solution: Upgrade to OpenSSH 2.9.9 or higher.<br />

CVE-2001-1380<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

OpenSSH < 3.2.1 AFS/Kerberos Ticket/Token Passing Overflow<br />

Family Internet Services 507


<strong>PVS</strong> ID: 1989 FAMILY: SSH RISK: HIGH NESSUS ID:10954<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of OpenSSH older than OpenSSH 3.2.1. A buffer overflow exists in the<br />

daemon if AFS is enabled on your system, or if the options KerberosTgtPassing or<br />

AFSTokenPassing are enabled. Even in this scenario, the vulnerability may be avoided by<br />

enabling UsePrivilegeSeparation. Versions prior to 2.9.9 are vulnerable to a remote root<br />

exploit. Versions prior to 3.2.1 are vulnerable to a local root exploit.<br />

Solution: Upgrade to version 3.2.1 or higher.<br />

CVE-2002-0575<br />

OpenSSH < 3.1 Channel Code Off by One Privilege Escalation<br />

<strong>PVS</strong> ID: 1990 FAMILY: SSH RISK: HIGH NESSUS ID:10883<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of OpenSSH which is older than 3.1. Versions prior than 3.1 are<br />

vulnerable to an off by one error that allows local users to gain root access, and it may be<br />

possible for remote users to similarly compromise the daemon for remote access. In<br />

addition, a vulnerable SSH client may be compromised by connecting to a malicious SSH<br />

daemon that exploits this vulnerability in the client code, thus compromising the client<br />

system.<br />

Solution: Upgrade to OpenSSH 3.1 or higher.<br />

CVE-2002-0083<br />

OpenSSH < 2.1.1 UseLogin Local Privilege Escalation<br />

<strong>PVS</strong> ID: 1991 FAMILY: SSH RISK: HIGH NESSUS ID:10439<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication\n\nThe remote host is running a version of OpenSSH which is older than<br />

2.1.1. If the UseLogin option is enabled, then sshd does not switch to the uid of the user<br />

logging in. Instead, sshd relies on login(1) to do the job. However, if the user specifies a<br />

command for remote execution, login(1) cannot be used and sshd fails to set the correct<br />

user id, so the command is run with the same privileges as sshd (usually root privileges).<br />

Solution: Upgrade to OpenSSH 2.1.1 or higher.<br />

CVE-2000-0525<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

OpenSSH < 3.0.2 UseLogin Environment Variable Local Command Execution<br />

<strong>PVS</strong> ID: 1992 FAMILY: SSH RISK: HIGH NESSUS ID:10823<br />

Family Internet Services 508


Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running a version of OpenSSH that is older than<br />

3.0.2. Versions prior than 3.0.2 are vulnerable to an environment variables export that can<br />

allow a local user to execute command with root privileges. This problem affects only<br />

versions prior than 3.0.2 when the UseLogin feature is enabled (usually disabled by<br />

default).<br />

Solution: Upgrade to OpenSSH 3.0.2 or higher.<br />

CVE-2001-0872<br />

Dropbear SSH Server Format String<br />

<strong>PVS</strong> ID: 1993 FAMILY: SSH RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a 'format string' flaw\n\nThe remote host is<br />

running a version of the Dropbear SSH server that is vulnerable to a format string attack.<br />

An attacker may use this vulnerability to execute arbitrary code on the SSH server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

OpenSSH < 3.7 buffer_append_space Function Overflow<br />

<strong>PVS</strong> ID: 1994 FAMILY: SSH RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an flaw that allows attackers to execute<br />

arbitrary commands.\n\nThe remote host is running a version of OpenSSH that is<br />

vulnerable to a flaw in the buffer handling functions which may possibly leading to<br />

command execution.<br />

Solution: Upgrade to OpenSSH 3.7 or higher.<br />

CVE-2003-0695<br />

LSH < 1.5 lshd Daemon Remote Overflow<br />

<strong>PVS</strong> ID: 1995 FAMILY: SSH RISK: HIGH NESSUS ID:11843<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of LSH that is vulnerable to a buffer overflow that allows an attacker to<br />

gain a shell on this host.<br />

Solution: Upgrade to LSH 1.5 or higher.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Portable OpenSSH < 3.7.1p2 Multiple PAM Vulnerabilities<br />

<strong>PVS</strong> ID: 1996 FAMILY: SSH RISK: HIGH NESSUS ID:11848<br />

Family Internet Services 509


Description: Synopsis : \n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is portable OpenSSH 3.7p1 or 3.7.1p1.\nVersions older<br />

than 3.7.1p2 are vulnerable to a flaws that handle PAM authentication and may allow an<br />

attacker to gain a shell on this host. For your information, the version of OpenSSH is: \n<br />

%L<br />

Solution: Upgrade to OpenSSH 3.7.1p2 or higher or disable PAM support in sshd_config.<br />

OpenSSH Detection<br />

CVE-2003-0786<br />

<strong>PVS</strong> ID: 1997 FAMILY: SSH RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running an OpenSSH server.<br />

Solution: N/A<br />

CVE Not available<br />

PuTTY < 0.55 modpow Function Arbitrary Code Execution<br />

<strong>PVS</strong> ID: 1998 FAMILY: SSH<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using a vulnerable version of PuTTY or of a PuTTY-based software (eg. PSCP or<br />

WinSCP). PuTTY is a SSH client built for Linux and UNIX variants as well as Microsoft<br />

Windows operating systems. Reportedly PuTTY is affected by a remote, pre-authentication<br />

memory corruption vulnerability and by a buffer overrun in its SCP client. The version of<br />

PuTTY installed on the remote client is: %L<br />

Solution: Upgrade to PuTTY 0.55 or higher.<br />

CVE-2004-1440<br />

Putty < 0.54 SSH2 Authentication Password Persistence Weakness<br />

<strong>PVS</strong> ID: 1999 FAMILY: SSH RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is using a vulnerable version of PuTTY, a SSH<br />

client built for Linux and UNIX variants as well as Microsoft Windows operation systems.<br />

It has been reported that PuTTY does not safely handle password information. As a result, a<br />

local user may be able to recover authentication passwords. The version of PuTTY installed<br />

on the remote host is: %L<br />

Solution: Upgrade to PuTTY 0.54 or higher.<br />

CVE-2003-0048<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 510


Firebird Database Detection<br />

<strong>PVS</strong> ID: 2000 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host appears to be running the Firebird database server. You should manually<br />

inspect the system to ensure that the database is at least version 1.5.0<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Potential SQL Injection Vulnerability Detection<br />

<strong>PVS</strong> ID: 2001 FAMILY: Database RISK: HIGH NESSUS ID:11139<br />

Description: Synopsis :\n\nThe remote web server contains a script that appears to be vulnerable to a<br />

SQL injection attack.\n\n<strong>PVS</strong> observed a response from a web server that was driven by an<br />

error message from an underlying SQL server. It is possible that the application may be<br />

susceptible to an attack known as 'SQL Injection' in which an attacker can pass SQL<br />

commands via a web query. Successful exploitation would allow the remote attacker to<br />

execute arbitrary SQL commands on the backend database server.\nThe following request<br />

was made :\n%P\nWe saw : \n%L<br />

Solution: Audit and modify the application to properly validate user input.<br />

CVE Not available<br />

Potential SQL Injection Vulnerability Detection<br />

<strong>PVS</strong> ID: 2002 FAMILY: Database RISK: HIGH NESSUS ID:11139<br />

Description: Synopsis :\n\nThe remote web server contains a script that appears to be vulnerable to a<br />

SQL injection attack.\n\n<strong>PVS</strong> observed a response from a web server that was driven by an<br />

error message from an underlying SQL server. It is possible that the application may be<br />

susceptible to an attack known as 'SQL Injection' in which an attacker can pass SQL<br />

commands via a web query. Successful exploitation would allow the remote attacker to<br />

execute arbitrary SQL commands on the backend database server.\nThe following request<br />

was made :\n%P\nWe saw : \n%L<br />

Solution: Audit and modify the application to properly validate user input.<br />

CVE Not available<br />

Potential SQL Injection Vulnerability Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2003 FAMILY: Database RISK: HIGH NESSUS ID:11139<br />

Description: Synopsis :\n\nThe remote web server contains a script that appears to be vulnerable to a<br />

SQL injection attack.\n\n<strong>PVS</strong> observed a response from a web server that was driven by an<br />

error message from an underlying SQL server. It is possible that the application may be<br />

susceptible to an attack known as 'SQL Injection' in which an attacker can pass SQL<br />

Family Internet Services 511


commands via a web query. Successful exploitation would allow the remote attacker to<br />

execute arbitrary SQL commands on the backend database server.\nThe following request<br />

was made :\n%P\nWe saw : \n%L<br />

Solution: Audit and modify the application to properly validate user input.<br />

SMTP Banner - Generic<br />

CVE Not available<br />

<strong>PVS</strong> ID: 2004 FAMILY: SMTP Servers RISK: NONE NESSUS ID:10263<br />

Description: The banner of the remote SMTP server is : \n%L<br />

Solution: N/A<br />

CVE Not available<br />

SMTP Banner - Port Specific<br />

<strong>PVS</strong> ID: 2005 FAMILY: SMTP Servers RISK: NONE NESSUS ID:10263<br />

Description: The banner of the remote SMTP server is : \n%L<br />

Solution: N/A<br />

CVE Not available<br />

CommuniGate Pro < 3.2 HTTP Configuration Port Remote Overflow<br />

<strong>PVS</strong> ID: 2006 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:10048<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running CommuniGate Pro version 3.0 or 3.1. There is a flaw in this version that may allow<br />

an attacker to execute arbitrary code on this host.<br />

Solution: Upgrade to CommuniGate Pro 3.2 or higher.<br />

CVE-1999-0865<br />

WebShield SMTP Header DoS / Filter Bypass<br />

<strong>PVS</strong> ID: 2007 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:10557<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote<br />

WebShield SMTP server is vulnerable to two flaws:\n- Several emails may evade the filter<br />

rules if the attached file names contain strange characters\n-It is possible for an outsider to<br />

crash this program and force its reinstallation.<br />

Solution: Upgrade to MR1a or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 512


CVE-2000-1130<br />

Lotus Domino < 5.0.12 / 6.0.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2008 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:11338<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of the Domino mail server that is vulnerable to various flaws when it<br />

acts as a web client (through web retriever) or in LDAP. An attacker may use these flaws to<br />

execute arbitary code on this host.<br />

Solution: Upgrade to Domino 5.0.12 or 6.0.1 or higher.<br />

CVE-2001-1311<br />

Sendmail .forward File Local Privilege Escalation<br />

<strong>PVS</strong> ID: 2009 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:11364<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe sendmail server may be vulnerable to a local privilege escalation<br />

vulnerability when using .forward files. A local attacker may use this flaw to escalate<br />

privileges up to 'root' level. *** Note that Sun did not increase the version number of<br />

Sendmail when patching Solaris 7 and 8, so this might be a false positive.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2003-1076<br />

Sendmail .forward File Local Privilege Escalation<br />

<strong>PVS</strong> ID: 2010 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:11364<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe sendmail server may be vulnerable to a local privilege escalation<br />

vulnerability when using .forward files. A local attacker may use this flaw to escalate<br />

privileges up to 'root' level. *** Note that Sun did not increase the version number of<br />

Sendmail when patching Solaris 7 and 8, so this might be a false positive.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2003-1076<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Sendmail < 8.12.1 RestrictQueueRun Option Local DoS<br />

<strong>PVS</strong> ID: 2011 FAMILY: SMTP Servers RISK: LOW NESSUS ID:11087<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote sendmail server may be vulnerable to a queue destruction if a local user runs the<br />

command 'sendmail -q -h1000'. A local attacker may use this flaw to force this host to<br />

Family Internet Services 513


delete e-mails.<br />

Solution: Upgrade to version 8.12.1 or higher.<br />

CVE-2001-0714<br />

Sendmail < 8.9.3 Header Parsing Redirection DoS<br />

<strong>PVS</strong> ID: 2012 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11352<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote Sendmail server has a flaw in the way it processes the headers of messages. An<br />

attacker may exploit this flaw to force this server to fail by sending an e-mail with a large<br />

number of headers.<br />

Solution: Upgrade to Sendmail 8.9.3 or higher.<br />

CVE-1999-0393<br />

Sendmail < 8.8.5 MIME Conversion Malformed Header Overflow<br />

<strong>PVS</strong> ID: 2013 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:10055<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote Sendmail<br />

server is vulnerable to a MIME conversion overflow. An attacker may exploit this flaw to<br />

gain a root shell on this host.<br />

Solution: Upgrade to Sendmail 8.8.5 or higher.<br />

CVE-1999-0047<br />

Sendmail < 8.8.3 mime7to8 Function Overflow<br />

<strong>PVS</strong> ID: 2014 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:10588<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote Sendmail<br />

server is vulnerable to a buffer overflow when it processes MIME conversions. An attacker<br />

may exploit this flaw to gain a root shell on this host.<br />

Solution: Upgrade to version 8.8.3 or higher.<br />

CVE-1999-0206<br />

Sendmail < 8.10.0 mail.local Newline Handling Remote DoS<br />

<strong>PVS</strong> ID: 2015 FAMILY: SMTP Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11351<br />

Family Internet Services 514


Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote Sendmail server does not properly identiy the '.\n' string which identifies the end of<br />

message text. An attacker may use this flaw to remotely corrupt user mailboxes by sending<br />

a message line which is 2047 characters long and end in '.\n'.<br />

Solution: Install sendmail 8.10.0 or higher.<br />

CVE-2000-0319<br />

Sendmail < 8.6.8 Long Debug Local Overflow<br />

<strong>PVS</strong> ID: 2016 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:11348<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote Sendmail<br />

server allows local users to escalate their privileges due to a buffer overflow in the debug<br />

(-d) command line option of Sendmail.<br />

Solution: Upgrade to Sendmail 8.6.8 or higher.<br />

CVE-1999-1309<br />

Eserv SMTP Memory Leak<br />

<strong>PVS</strong> ID: 2017 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:11619<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote SMTP server is running Eserv SMTP. There is a memory leak in this software that<br />

may be abused by an attacker to disable this service remotely.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

Sendmail < 8.11.6 Local Overflow<br />

<strong>PVS</strong> ID: 2018 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10729<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote Sendmail<br />

server is vulnerable to a local buffer overflow that may allow local users to gain root<br />

privileges.<br />

Solution: Upgrade to Sendmail 8.11.6 or higher.<br />

CVE-2001-0653<br />

Sendmail < 8.6.10 IDENT Remote Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2019 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:10278<br />

Family Internet Services 515


Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote Sendmail server is vulnerable to an 'ident overflow' that may<br />

allow a remote attacker to gain a root shell on this host.<br />

Solution: Upgrade to version 8.6.10 or higher.<br />

CVE-1999-0204<br />

Sendmail < 8.12.8 Header Handling Remote Overflow<br />

<strong>PVS</strong> ID: 2020 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:11316<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote Sendmail<br />

server is vulnerable to a remote buffer overflow that may allow an attacker to remotely gain<br />

a root shell on this host.<br />

Solution: Upgrade to Sendmail 8.12.8 or higher.<br />

CVE-2002-1337<br />

Sendmail < 8.8.4 Group Permissions Local Privilege Escalation<br />

<strong>PVS</strong> ID: 2021 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11349<br />

Description: Synopsis :\n\nThe remote server may allow local users to escalate privileges.\n\nThe<br />

remote Sendmail server is vulnerable to a flaw that may allow local users to gain the group<br />

permission of the sendmail server by crafting a .forward file.<br />

Solution: Upgrade to Sendmail 8.8.4 or higher.<br />

CVE-1999-0129<br />

EXPN Command Information Disclosure<br />

<strong>PVS</strong> ID: 2022 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10249<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host has the EXPN command enabled. An attacker may use it to<br />

enumerate valid accounts on this host and gain more information about them.<br />

Solution: Disable this option in your MUA configuration file.<br />

CVE Not available<br />

EXPN Command Information Disclosure<br />

<strong>PVS</strong> ID: 2023 FAMILY: SMTP Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10249<br />

Family Internet Services 516


Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host has the EXPN command enabled. An attacker may use it to<br />

enumerate valid accounts on this host and gain more information about them.<br />

Solution: Disable this option in your MUA configuration file.<br />

CVE Not available<br />

Sendmail < 8.10.1 ETRN Command Remote DoS<br />

<strong>PVS</strong> ID: 2024 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote SMTP server has a flaw that may allow remote attackers to cause a denial of service<br />

by sending a series of ETRN commands and then disconnecting from this server.<br />

Solution: Upgrade to Sendmail 8.10.1 or higher.<br />

CVE-1999-1109<br />

Sendmail < 8.12.5 DNS Map TXT Query Overflow<br />

<strong>PVS</strong> ID: 2025 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:11232<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote Sendmail<br />

server is vulnerable to a buffer overflow in the portion of its code that handles DNS replies.<br />

The owner of a malicious DNS server could use this flaw to execute arbitrary code on this<br />

host.<br />

Solution: Upgrade to Sendmail 8.12.5 or higher.<br />

CVE-2002-0906<br />

Sendmail 'decode' Alias Arbitrary File Overwrite<br />

<strong>PVS</strong> ID: 2026 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10248<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote Sendmail server may pipe email sent to the 'decode' alias to a<br />

program, which is prone to various security issues.<br />

Solution: Remove the 'decode' entry from /etc/aliases.<br />

CVE-1999-0096<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Sendmail ResrictQueueRun Debug Information Disclosure<br />

<strong>PVS</strong> ID: 2027 FAMILY: SMTP Servers RISK: LOW NESSUS ID:11088<br />

Family Internet Services 517


Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote Sendmail server discloses too much information to local users when<br />

the command 'sendmail -q -d0-nnn.xxx' is executed. A local attacker may use this flaw to<br />

gather data about your local sendmail configuration.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2001-0715<br />

Sendmail DEBUG Arbitrary Command Execution<br />

<strong>PVS</strong> ID: 2028 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:10247<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote Sendmail server accepts the DEBUG mode. An attacker may<br />

use it to gain a shell on this host.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-1999-0095<br />

Sendmail < 8.8.3 Local Overflow<br />

<strong>PVS</strong> ID: 2029 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:11346<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote Sendmail server may allow a local user to gain root<br />

privileges.<br />

Solution: Upgrade to Sendmail 8.8.3 or higher.<br />

CVE-1999-0130<br />

Sendmail < 8.12.1 Custom Configuration File Privilege Escalation<br />

<strong>PVS</strong> ID: 2030 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11086<br />

Description: Synopsis :\n\nThe remote host may allow a local attacker to escalate privileges. \n\nThe<br />

remote sendmail server may be vulnerable to a mail system compromise if a rogue local<br />

user supplies a custom configuration file.<br />

Solution: Upgrade to version 8.12.1 or higher.<br />

CVE-2001-0713<br />

Sendmail < 8.12.9 NOCHAR Value Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2031 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:11499<br />

Family Internet Services 518


Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote Sendmail<br />

server may be vulnerable to a remote buffer overflow that can be exploited by an attacker<br />

to gain a root shell on this host.<br />

Solution: Upgrade to Sendmail 8.12.9 or higher.<br />

CVE-2003-0161<br />

Sendmail HELO Command Overflow<br />

<strong>PVS</strong> ID: 2032 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:10260<br />

Description: Synopsis :\n\nThe remote mail server may inadvertently allow anonymous emails.\n\nThe<br />

remote Sendmail server accepts too long arguments to the HELO command, which may<br />

allow attackers to send email anonymously.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-1999-1015<br />

Microsoft Exchange IMC SMTP EHLO Hostname Overflow<br />

<strong>PVS</strong> ID: 2033 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:11053<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nA security<br />

vulnerability results because of an unchecked buffer in the IMC code that generates the<br />

response to the EHLO protocol command. If the buffer were overrun with data it would<br />

result in either the failure of the IMC or could allow the attacker to run code in the security<br />

context of the IMC, which runs as Exchange 5.5 Service Account.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-0698<br />

TFS SMTP < 4.0 Build 210 MAIL FROM Remote Overflow<br />

<strong>PVS</strong> ID: 2034 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:10284<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote SMTP<br />

server (TFS SMTP) is vulnerable to a buffer overflow when it is issued a too long argument<br />

to the 'MAIL FROM' SMTP command. An attacker may exploit this vulnerability to run<br />

arbitrary commands on the remote SMTP server with the privileges of the SMTP daemon<br />

(typically, SYSTEM).<br />

Solution: Upgrade to TFS SMTP 4.0 Build 219 or higher.<br />

CVE-1999-1516<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Xtramail SMTP Multiple Command Remote Overflows<br />

<strong>PVS</strong> ID: 2035 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:10324<br />

Family Internet Services 519


Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote Xtramail<br />

SMTP server is vulnerable to a buffer overflow when the user supplies a too long argument<br />

to the HELO command. An attacker may use this flaw to execute arbitrary code on this host<br />

with the privileges of the Xtramail server (typically, SYSTEM).<br />

Solution: No solution is known at this time.<br />

CVE-1999-1511<br />

SLMail SMTP Multiple Overflows<br />

<strong>PVS</strong> ID: 2036 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:11593<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple buffer overflows.\n\nThe remote<br />

host is running a version of the SLMail SMTP server that is vulnerable to various<br />

overflows that may allow an attacker to gain a shell on this host.<br />

Solution: Upgrade to SLMail 5.1.0.4433 or higher.<br />

CVE-2003-0264<br />

FTGate Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2037 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:11579<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote SMTP server is running FTGate Pro. There is a flaw in some versions of this<br />

software that may allow an attacker to disable it remotely by sending a too long argument<br />

to the MAIL FROM and RCPT TO SMTP commands. In addition, there are flaws that<br />

would allow an attacker to execute arbitrary code on the vulnerable system.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-4568<br />

Lotus Domino < 6.0.1 Multiple SMTP Vulnerabilities<br />

<strong>PVS</strong> ID: 2038 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:11386<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote Lotus<br />

Domino server, according to its version number, is vulnerable to various buffer overflows<br />

and denial of service attacks. An attacker may use these to disable this server or execute<br />

arbitrary commands on the remote host.<br />

Solution: Update to Domino 6.0.1 or higher.<br />

CVE-2003-0178<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Sendmail < 8.12.8 Double Pipe smrsh Bypass Overflow<br />

<strong>PVS</strong> ID: 2039 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:11321<br />

Family Internet Services 520


Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that may allow attackers to execute<br />

arbitrary commands\n\nsmrsh (supplied by Sendmail) is designed to prevent the execution<br />

of commands outside of the restricted environment. However, when commands are entered<br />

using either double pipes (||) or a mixture of dot and slash characters, a user may be able to<br />

bypass the checks performed by smrsh. This can lead to the execution of commands outside<br />

of the restricted environment.<br />

Solution: Upgrade to Sendmail 8.12.8 or higher.<br />

CVE-2002-1337<br />

MS SMTP NULL Session Mail Relay<br />

<strong>PVS</strong> ID: 2040 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11308<br />

Description: Synopsis :\n\nThe remote SMTP server may be inappropriately used as a relay.\n\nIt is<br />

possible to authenticate to the remote SMTP service by logging in as a NULL session. An<br />

attacker may exploit this flaw to use your SMTP server as a spam relay.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-0054<br />

ISMail < 1.4.5 Multiple Command Domain Name Handling Overflow<br />

<strong>PVS</strong> ID: 2041 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:11272<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running ISMail, a SMTP server that is vulnerable to a buffer overflow. An attacker may<br />

exploit this flaw to gain LOCALSYSTEM privileges on this host.<br />

Solution: Upgrade to version 1.4.5 or higher.<br />

CVE Not available<br />

Youngzsoft CMailServer < 4.0.2003.03.30 RCPT TO Overflow<br />

<strong>PVS</strong> ID: 2042 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of CMailServer that is vulernable to a buffer overflow. An attacker may<br />

use this flaw to cause CMailServer to crash or execute arbitrary code.<br />

Solution: Upgrade to version 4.0.2003.03.30 or higher.<br />

CVE-2003-0280<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Sendmail < 8.12.10 prescan() Function Remote Overflow<br />

<strong>PVS</strong> ID: 2043 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:11838<br />

Family Internet Services 521


Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote Sendmail<br />

server may be vulnerable to a remote buffer overflow that can be exploited by an attacker<br />

to gain a root shell on this host.<br />

Solution: Upgrade to Sendmail 8.12.10 or higher.<br />

CVE-2003-0694<br />

Sendmail < 8.7.6 GECOS Field Local Overflow DoS<br />

<strong>PVS</strong> ID: 2044 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:11347<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote Sendmail server has a buffer overflow and a denial of<br />

service vulnerability in the way it uses the GECOS fields. A local attacker may exploit this<br />

flaw to escalate privileges on this host and gain a root shell.<br />

Solution: Upgrade to Sendmail 8.7.6 or higher.<br />

GoToMyPC Detection<br />

CVE-1999-0131<br />

<strong>PVS</strong> ID: 2045 FAMILY: Backdoors<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is running GoToMyPC, a remote administration tool that allows access to<br />

a PC. This software uses a backchannel (viewed as an outgoing connection by your<br />

firewall) to communicate with the vendor's computers that then broker a connection back to<br />

the remote client accessing this computer.<br />

Solution: Verify that this software conforms to your security policy.<br />

CVE Not available<br />

Sendmail SMTP Server Detection<br />

<strong>PVS</strong> ID: 2046 FAMILY: SMTP Servers RISK: LOW NESSUS ID:Not Available<br />

Description: The remote SMTP server is running a version of Sendmail.<br />

Solution: N/A<br />

CVE Not available<br />

Lotus Domino SMTP Server Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2047 FAMILY: SMTP Servers RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 522


Description: The remote host is running a version of the Domino mail server.<br />

Solution: N/A<br />

CVE Not available<br />

Clearswift MAILsweeper for SMTP < 4.3.15 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2048 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is running a vulnerable version of Clearswift MAILsweeper for SMTP.<br />

Clearswift MAILseeper for SMTP versions 4.3.14 and prior are reported to be prone to<br />

several security issues.<br />

Solution: Upgrade to Clearswift MAILsweeper 4.3.15 or higher.<br />

CVE-2004-2328<br />

Ipswitch IMail Weak Password Encryption Weakness<br />

<strong>PVS</strong> ID: 2049 FAMILY: SMTP Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host stores local confidential data in an insecure manner.\n\nThe<br />

remote host is running Ipswitch IMail, an e-mail server that serves email via a web<br />

interface. IMail runs on Microsoft Windows operating systems. Ipswitch IMail is reported<br />

to use a weak encryption algorithm when obfuscating saved passwords. A local attacker<br />

who has the ability to read the encrypted passwords from the system registry may easily<br />

derive the plaintext password if the username that is associated with the password is<br />

known.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Gnutella Server Detection<br />

<strong>PVS</strong> ID: 2050 FAMILY: Peer-To-Peer File Sharing<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10946<br />

Description: A Gnutella node was detected on the network. Gnutella is a peer-to-peer file-sharing<br />

software that allows users to share music or other media files.<br />

Solution: Ensure that use of this software is acceptable within company policy.<br />

BearShare Detection<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2051 FAMILY: Peer-To-Peer File Sharing<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10946<br />

Family Internet Services 523


Description: A Bearshare node was detected on the network. Bearshare is a peer-to-peer<br />

file-sharing software that allows users to share music or other media files.<br />

Solution: Ensure that use of BearShare software is acceptable to your company's policy.<br />

CVE Not available<br />

ICQ P2P Client Detection<br />

<strong>PVS</strong> ID: 2052 FAMILY: Peer-To-Peer File Sharing<br />

Description: The remote host is using ICQ.<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:<br />

Solution: Ensure that the software is being used in accordance with company policy.<br />

Blubster Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 2053 FAMILY: Peer-To-Peer File Sharing<br />

Description: The remote host is using Blubster.<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:<br />

Solution: Ensure that the software is being used in accordance with company policy.<br />

Gnucleus Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 2054 FAMILY: Peer-To-Peer File Sharing RISK: LOW NESSUS ID:<br />

Description: The remote host is using Gnucleus version %L<br />

Solution: Ensure that the software is being used in accordance with company policy.<br />

Morpheus Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 2055 FAMILY: Peer-To-Peer File Sharing RISK: LOW NESSUS ID:<br />

Description: The remote host is using Morpheus version %L<br />

Solution: Ensure that the software is being used in accordance with company policy.<br />

WinMX Detection<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 524


<strong>PVS</strong> ID: 2056 FAMILY: Peer-To-Peer File Sharing<br />

RISK:<br />

MEDIUM<br />

Description: The remote host is running the WinMX P2P client.<br />

NESSUS ID:<br />

Solution: Ensure that the software is being used in accordance with company policy.<br />

Xolox Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 2057 FAMILY: Peer-To-Peer File Sharing<br />

RISK:<br />

MEDIUM<br />

Description: The remote host is running the XOLOX P2P client.<br />

NESSUS ID:11431<br />

Solution: Ensure that the software is being used in accordance with company policy.<br />

Kazaa Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 2058 FAMILY: Peer-To-Peer File Sharing RISK: HIGH NESSUS ID:11426<br />

Description: The remote host is running the Kazaa P2P client.<br />

Solution: Ensure that the software is being used in accordance with company policy.<br />

Shareaza Detection<br />

CVE-2002-0315<br />

<strong>PVS</strong> ID: 2059 FAMILY: Peer-To-Peer File Sharing<br />

Description: The remote host is running Shareaza version %L<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:<br />

Solution: Ensure that the software is being used in accordance with company policy.<br />

Edonkey2k Detection<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2060 FAMILY: Peer-To-Peer File Sharing<br />

RISK:<br />

MEDIUM<br />

Description: The remote host is running the Edonkey P2P client.<br />

NESSUS ID:<br />

Solution: Ensure that the software is being used in accordance with company policy.<br />

Family Internet Services 525


MyNapster Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 2061 FAMILY: Peer-To-Peer File Sharing<br />

RISK:<br />

MEDIUM<br />

Description: The remote host is running the MyNapster P2P client version %L<br />

NESSUS ID:<br />

Solution: Ensure that the software is being used in accordance with company policy.<br />

KazaaClient Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 2062 FAMILY: Peer-To-Peer File Sharing<br />

RISK:<br />

MEDIUM<br />

Description: The remote host is running the KazaaClient P2P client.<br />

NESSUS ID:<br />

Solution: Ensure that the software is being used in accordance with company policy.<br />

Trillian Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 2063 FAMILY: Peer-To-Peer File Sharing<br />

RISK:<br />

MEDIUM<br />

Description: The remote host is running the Trillian P2P client.<br />

NESSUS ID:<br />

Solution: Ensure that the software is being used in accordance with company policy.<br />

CVE Not available<br />

Mantis < 0.18.3 / 0.19.0a2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2114 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:14324<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML injection attack.\n\nThe remote<br />

host seems to be running a vulnerable version of Mantis, a bug tracker web application<br />

written in PHP. It is reported that versions up to 0.18.0 and 0.19.0a1 are prone to multiple<br />

flaws that may allow a remote attacker to inject malicious HTML in webpages, to execute<br />

arbitrary code on the remote host or to perform a mass mailing.<br />

Solution: Upgrade to Mantis version 0.18.3 or 0.19.0a2 or higher.<br />

CVE-2004-1731<br />

Serv-U FTP Server Default Account<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 526


<strong>PVS</strong> ID: 2115 FAMILY: FTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a version of the Serv-U FTP Server that has an<br />

hidden default administration account. This account is reported to be hard-coded but it can<br />

be used only from the loopback interface. It may permit a local attacker to log into the site<br />

maintenance interface.<br />

Solution: No solution is known at this time.<br />

CVE-2004-2532<br />

Mozilla Browser Input Type HTML Tag Unauthorized Access<br />

<strong>PVS</strong> ID: 2116 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may be tricked into running an executable file.\n\nThe<br />

remote host is using a vulnerable version of Mozilla, an open-source web browser. It is<br />

reported that Mozilla versions prior 1.7.1 present an issue in the INPUT tag. An attacker<br />

may craft a malicious web page that may secretly upload files readable by the victim on a<br />

remote computer.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-0759<br />

Subversion (SVN) < 1.0.3 Remote Buffer Overflow<br />

<strong>PVS</strong> ID: 2117 FAMILY: Generic RISK: HIGH NESSUS ID:12261<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Subversion, an open-source file management product. According to the version<br />

number, the remote system is vulnerable to at least one remote buffer overflow.<br />

Solution: Upgrade to version 1.0.3 or higher.<br />

CVE-2004-0397<br />

Sympa < 4.1.2 wwsympa.fcgi List Master Authentication Bypass<br />

<strong>PVS</strong> ID: 2118 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the<br />

bypassing of authentication.\n\nThe remote host is running wwsympa.fcgi, a<br />

web interface for the Sympa mailing list manager. It is reported that this version<br />

of Sympa may permit an attacker to bypass the list master authentication in<br />

order to create unauthorized mailing list.<br />

Solution: Upgrade to version 4.1.2 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 527


CVE Not available<br />

Sympa < 4.1.3 List Creation Description Field XSS<br />

<strong>PVS</strong> ID: 2119 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running wwsympa.fcgi, a web interface for the Sympa mailing list manager.<br />

It is reported that this version of Sympa may permit an attacker to inject malicious HTML<br />

in "List Info" page through the description field of the list creation form. This field is not<br />

sanitized properly by the CGI.<br />

Solution: Upgrade to version 4.1.3 or higher.<br />

CVE-2004-1735<br />

thttpd < 2.20 Arbitrary World-Readable File Disclosure<br />

<strong>PVS</strong> ID: 2120 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data\n\nThe remote host is running a vulnerable version of Acme thttpd.<br />

This web server includes a CGI program to provide server-side-includes functionalities. It<br />

is reported that this CGI program does not properly filter certain escape sequences. An<br />

attacker may view arbitrary files in a known location on the web server.<br />

Solution: Upgrade to thttpd 2.20 or higher.<br />

CVE-2000-0900<br />

THTTPD/Mini_HTTPD < 2.22 File Disclosure<br />

<strong>PVS</strong> ID: 2121 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a flaw that allows attackers to<br />

retrieve sensitive files or data.\n\nThe remote host is running a vulnerable version of<br />

Acme thttpd. It is reported that versions prior 2.22 are prone to an issue that may<br />

permit an attacker to access arbitrary files on the vulnerable web server. The version<br />

of the remote thttpd server is: \n %L<br />

Solution: Upgrade to thttpd 2.22 or higher.<br />

CVE Not available<br />

THTTPD/Mini_HTTPD < 1.16 File Disclosure<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2122 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 528


Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running a vulnerable version of Acme<br />

mini_httpd. It is reported that versions prior 1.16 are prone to an issue that may<br />

permit an attacker to access arbitrary files on the vulnerable web server.<br />

Solution: Upgrade to mini_httpd 1.16 or higher.<br />

CVE Not available<br />

thttpd < 2.21 Error Page XSS<br />

<strong>PVS</strong> ID: 2123 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running a vulnerable version of Acme thttpd. It is reported that this version<br />

of thttpd fails to check URLs for the presence of script commands when generating error<br />

pages. An attacker may craft links containing scripting code in order to execute code within<br />

the context of the website. The version of the remote thttpd server is: \n %L<br />

Solution: Upgrade to thttpd 2.21 or higher.<br />

CVE-2002-0733<br />

thttpd/mini_httpd Virtual Hosting File Disclosure<br />

<strong>PVS</strong> ID: 2124 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running a vulnerable version of Acme<br />

mini_httpd. It is reported that versions prior 1.18 are prone to an issue that may permit an<br />

attacker to access arbitrary files on the vulnerable web server when virtual hosting is<br />

enabled. In a chrooted environment, this may only disclose directories under the chroot.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2003-0899<br />

thttpd/mini_httpd < 2.24 Virtual Hosting File Disclosure<br />

<strong>PVS</strong> ID: 2125 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running a vulnerable version of Acme thttpd.<br />

It is reported that versions prior 2.24 are prone to an issue that may permit an attacker to<br />

access arbitrary files on the vulnerable web server when virtual hosting is enabled. In a<br />

chrooted environment, this may only disclose directories under the chroot.<br />

Solution: Upgrade to version 2.24 or higher.<br />

CVE-2003-0899<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 529


thttpd CGI Test Script XSS<br />

<strong>PVS</strong> ID: 2126 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running a vulnerable version of Acme thttpd. It is reported that versions prior<br />

2.06 are prone to a cross-site scripting issue which may permit an attacker to embed hostile<br />

HTML and script code in an URL. This code may be rendered by the web browser of an<br />

innocent user visiting this crafted URL. This would occur in the security context of the<br />

vulnerable web site.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

BadBlue Webserver Connection Saturation Remote DoS<br />

<strong>PVS</strong> ID: 2127 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running a version of BadBlue webserver that is reported to be vulnerable to a<br />

denial of service. Upon receiving approximatively 24 connections for the same IP address,<br />

BadBlue Webserver version up to 2.5 may stop responding to new incoming request as<br />

long as the attacker maintains the connections.<br />

Solution: No solution is known at this time.<br />

CVE-2004-1727<br />

PHP-Fusion Database Backup Information Disclosure<br />

<strong>PVS</strong> ID: 2128 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running a version of PHP-Fusion that is<br />

prone to an information disclosure issue. In versions prior to 4.01, an attacker may<br />

download an entire backup of the web site database if he can guess the name of the<br />

backup file.<br />

Solution: No solution is known at this time.<br />

CVE-2004-1724<br />

MySQL Mysqlhotcopy Script Insecure Temporary File Creation<br />

<strong>PVS</strong> ID: 2129 FAMILY: Database<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 530


Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running a version of MySQL that is older than<br />

version 3.23.49 or than 4.0.20. The version of the utility Mysqlhotcopy included in these<br />

versions of MySQL is reported to be prone to a vulnerability that may permit an attacker to<br />

overwrite arbitrary files on the database server with the privilege of the targeted user.<br />

Privilege escalation may also be possible. An attacker requires local interactive access in<br />

order to exploit this vulnerability.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-0457<br />

Opera getElementsByTagName Javascript Method DoS<br />

<strong>PVS</strong> ID: 2130 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS)<br />

attack.\n\nThe remote host is using a version of Opera that is affected by a security<br />

weakness that may permit an attacker to crash the remote web browser using<br />

Javascript.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

SQL Server Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 2131 FAMILY: Database<br />

Description: Detects SQL servers on port 1433<br />

Solution: N/A<br />

CVE Not available<br />

eGroupWare < 1.0.0.004 Multiple XSS<br />

RISK: Risk<br />

not available<br />

NESSUS ID:Not Available<br />

<strong>PVS</strong> ID: 2132 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running eGroupWare, a web-based groupware solution. It is reported that<br />

versions prior 1.0.0.004 are prone to a cross-site scripting issue. An attacker may steal<br />

cookie-based authentication credentials from a legitimate user by sending malformed links<br />

to this web site.<br />

Solution: Upgrade to version 1.0.0.004 or higher.<br />

CVE-2004-1467<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 531


libNSS Hello Challenge Remote Heap Overflow<br />

<strong>PVS</strong> ID: 2133 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a vulnerable version of the Mozilla web browser. This version is based on a<br />

vulnerable version of libNSS, the <strong>Network</strong> <strong>Security</strong> Service library that implements the<br />

SSL/TLS protocol. It is reported that versions of libNSS up to 3.9.0 are prone to a remote<br />

heap overflow in the processing of the 'hello' message. An attacker may use this overflow<br />

to execute arbitrary code on the remote host.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-0826<br />

libNSS Hello Challenge Remote Heap Overflow<br />

<strong>PVS</strong> ID: 2134 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host<br />

seems to be running a vulnerable version of the Netscape Enterprise Server, iPlanet or Sun<br />

ONE Web Server. This version is based on a vulnerable version of libNSS, the <strong>Network</strong><br />

<strong>Security</strong> Service library that implements the SSL/TLS protocol. It is reported that versions<br />

of libNSS up to 3.9.0 are prone to a remote heap overflow in the processing of the 'hello'<br />

message. An attacker may use this overflow to execute arbitrary code on the remote host.<br />

<strong>PVS</strong> detected the following version of the webserver: \n %L<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-0826<br />

Bird Chat Server Invalid User DoS<br />

<strong>PVS</strong> ID: 2135 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running a vulnerable version of Bird Chat Server. Bird Chat Server is a small<br />

chat server for Windows. It is reported that versions up to 6.10 are prone to an issue that<br />

permit an attacker connecting with a fake username on the server to remotely crash all<br />

clients using the server.<br />

Solution: No solution is known at this time.<br />

CVE-2004-1739<br />

Icecast list.cgi User-Agent XSS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2136 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 532


Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running a vulnerable version of Icecast, an open-source streaming server. It<br />

is reported that every version of the 1.3 branch is vulnerable to a cross scripting issue. An<br />

attacker may steal cookie-based authentication credentials from a legitimate user by<br />

sending malformed links to the Icecast server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-0781<br />

Icecast < 2.0.1 HTTP Basic Authentication Remote Overflow<br />

<strong>PVS</strong> ID: 2137 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a vulnerable version of Icecast, an open-source streaming server. It is reported that<br />

every version prior to 2.0.1 is vulnerable to a remote buffer overflow during the Base64<br />

authorization request processing. This vulnerability may permit an attacker to execute<br />

arbitrary code on the remote host.<br />

Solution: Upgrade to Icecast 2.0.1 or higher.<br />

CVE-2004-2027<br />

Icecast Server < 2.0.0 list_directory Function Traversal Directory Enumeration<br />

<strong>PVS</strong> ID: 2138 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a directory traversal flaw.\n\nThe remote<br />

host is running a vulnerable version of Icecast, an open-source streaming server. It is<br />

reported that every version prior 2.0.0 is vulnerable to directory traversal issue. This issue<br />

discloses the existence of directory on the remote system that may permit an attacker to<br />

gather information about the host.<br />

Solution: Upgrade to Icecast 2.0.0 or higher.<br />

CVE-2002-1982<br />

Icecast < 1.3.12 Multiple Remote Buffer Overflows<br />

<strong>PVS</strong> ID: 2139 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a vulnerable version of Icecast, an open-source streaming server. It is reported that<br />

every version up to 1.3.10 is vulnerable to a remote buffer overflow which may permit an<br />

attacker to execute arbitrary code on the host.<br />

Solution: Upgrade to Icecast 1.3.12 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 533


CVE-2001-1230<br />

Icecast < 1.3.10 Multiple Remote Buffer Overflows<br />

<strong>PVS</strong> ID: 2140 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a vulnerable version of Icecast, an open-source streaming server. It is reported that<br />

every version prior 1.3.10 is vulnerable to a remote buffer overflow that may permit an<br />

attacker to execute arbitrary code on the host. Most vulnerable versions usualy run as root.<br />

Solution: Upgrade to Icecast 1.3.10 or higher.<br />

CVE-2001-1229<br />

Icecast < 1.3.12-1 HTTP GET Request Remote Overflow<br />

<strong>PVS</strong> ID: 2141 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a vulnerable version of Icecast, an open-source streaming server. It is reported that<br />

every version prior to 1.3.12-1 is vulnerable to a remote buffer overflow that may permit an<br />

attacker to execute arbitrary code on the host.<br />

Solution: Upgrade to Icecast 1.3.12-1 or higher.<br />

CVE-2002-0177<br />

Icecast Server < 1.3.10 Crafted URI Remote DoS<br />

<strong>PVS</strong> ID: 2142 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running a vulnerable version of Icecast, an open-source streaming server. It<br />

is reported that every version prior to 1.3.10 is vulnerable to a remote denial of service. The<br />

problem occurs if an attacker crafts a malicious file request by appending '/', '\' or '.' at the<br />

end.<br />

Solution: Upgrade to Icecast 1.3.10 or higher.<br />

CVE-2001-0784<br />

Icecast Server < 1.3.10 Directory Traversal Arbitrary File Access<br />

<strong>PVS</strong> ID: 2143 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running a vulnerable version of Icecast, an<br />

open-source streaming server. It is reported that every version prior to 1.3.10 is vulnerable<br />

Family Internet Services 534


to an information disclosure issue. An attacker may craft encoded URL request that may<br />

permit him to read files and directory outside the Icecast Server directory.<br />

Solution: Upgrade to Icecast 1.3.10 or higher.<br />

CVE-2001-0784<br />

Icecast < 1.3.10 print_client() Format String<br />

<strong>PVS</strong> ID: 2144 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote 'format string' flaw.\n\nThe remote<br />

host is running a vulnerable version of Icecast, an open-source streaming server. It is<br />

reported that every version prior to 1.3.10 is vulnerable to a format string bug that may<br />

permit an attacker to overwrite memory at arbitrary address.<br />

Solution: Upgrade to Icecast 1.3.10 or higher.<br />

CVE-2001-0197<br />

DtMail Local Format String Privilege Escalation<br />

<strong>PVS</strong> ID: 2145 FAMILY: SMTP Clients RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote 'format string' flaw.\n\nThe remote<br />

host is using DtMail, a mail user agent included in CDE, the default desktop environment<br />

for Sun Solaris. It is reported that versions of DtMail shipped with Solaris 8 and 9 are prone<br />

to a local format string issue. An local attacker may exploit this vulnerability to execute<br />

malicious code with mail group privileges.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-0800<br />

WebAPP < 0.9.9.2 index.cgi Directory Traversal Arbitrary File Access<br />

<strong>PVS</strong> ID: 2146 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:14365<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\n The remote host is running WebAPP, an open-source web portal<br />

application written in perl. There is a flaw in the remote version of this software that may<br />

allow an attacker to read arbitrary files on the remote host with the privileges of the web<br />

server process (httpd or root).<br />

Solution: Upgrade to version 0.9.9.2 or higher.<br />

CVE-2004-1742<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Easy File Share Virtual Folders Arbitrary File Access<br />

Family Internet Services 535


<strong>PVS</strong> ID: 2147 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running a version of the Easy File Share Web<br />

Server that is vulnerable to an information disclosure vulnerability. It is reported that in<br />

versions up to 1.25, an attacker may obtain read access to the server underlying filesystem<br />

using virtual folders URLs.<br />

Solution: No solution is known at this time.<br />

CVE-2004-1743<br />

Easy File Sharing Large HTTP Request Remote DoS<br />

<strong>PVS</strong> ID: 2148 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running a version of the Easy File Sharing Web Server that is vulnerable to<br />

an remote denial of service. An attacker may deny service to legitimate users by sending<br />

large HTTP request to the web server. When processing such requests, this service<br />

consumes CPU resources exponentially.<br />

Solution: No solution is known at this time.<br />

CVE-2004-1744<br />

PHP Code Snippet Library index.php XSS<br />

<strong>PVS</strong> ID: 2149 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running a version of PHP-CSL that is reported prone to a cross-site scripting<br />

vulnerability. An attacker may steal cookie-based authentication credentials from a<br />

legitimate user using crafted link to this web application.<br />

Solution: No solution is known at this time.<br />

CVE-2004-1746<br />

Outlook Express BCC: Recipient Disclosure<br />

<strong>PVS</strong> ID: 2150 FAMILY: SMTP Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote email client is vulnerable to a flaw where the 'BCC' address is<br />

not hidden.\n\nThe remote host is using Outlook Express version 6.00 or 6.00 SP1. It is<br />

reported that the effectiveness of the BCC: field in these versions cannot be trusted. People<br />

receiving the mail through the To: and CC: fields can find the invisible receipients by<br />

opening the mail in a text editor.<br />

Family Internet Services 536


Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-2137<br />

Winamp < 5.05 .WSZ File Handling Remote Code Execution<br />

<strong>PVS</strong> ID: 2151 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote client is<br />

running a version of the Nullsoft Winamp media player that may be vulnerable to a remote<br />

code execution issue. This vulnerability may be used to remotely execute arbitrary code on<br />

the host by crafting a malicious .WSZ file (Winamp Skin).<br />

Solution: Upgrade to Winamp 5.05 or higher.<br />

CVE Not available<br />

ignitionServer < 0.3.2 SERVER Command Remote DoS<br />

<strong>PVS</strong> ID: 2152 FAMILY: IRC Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running an ignitionServer IRC server. This version of ignitionServer is<br />

reported to be prone to a remote denial of service in the processing of the SERVER IRC<br />

command. An attacker may crash or hang the remote server, denying service to legitimate<br />

users.<br />

Solution: Upgrade to version 0.3.2 or higher.<br />

CVE Not available<br />

Unreal IRCD < 3.2.1 Cloak IP Address Disclosure<br />

<strong>PVS</strong> ID: 2153 FAMILY: IRC Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running a version of Unreal IRCD that is prone to a cloaked<br />

IP address disclosure issue. An attacker may use its own IP and the corresponding hash in<br />

order to find the server cloak keys. This vulnerability could permit an attacker to gather<br />

valid IP addresses in order to carry out attacks on them.<br />

Solution: Upgrade to version 3.2.1 or higher.<br />

CVE-2004-0679<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Unreal IRCD OperServ Raw Message Channel Join DoS<br />

<strong>PVS</strong> ID: 2154 FAMILY: IRC Servers NESSUS ID:Not Available<br />

Family Internet Services 537


RISK:<br />

MEDIUM<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running a version of Unreal IRCD that is vulnerable to a remote denial of<br />

service. It is reported that Unreal IRCD may crash when a client sends a raw message to<br />

OperServ to join a channel. An attacker may use this issue to deny service to legitimate<br />

users.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

CVS history.c File Existence Disclosure<br />

<strong>PVS</strong> ID: 2155 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:14313<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running a CVS server that, according to its version number,<br />

is vulnerable to an information disclosure issue. This weakness can be exploited by<br />

malicious users to gain knowledge about files and directories existing on the server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-0778<br />

Merak Mail Server < 7.5.1 Web Mail Module Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2156 FAMILY: POP Server RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running Merak Mail Server. It is reported that versions prior<br />

to 7.5.1 are prone to multiple vulnerabilities in the Web Mail module. An attacker may use<br />

these vulnerabilities to perform cross-site scripting attacks, SQL injection and access to the<br />

PHP source code.<br />

Solution: Upgrade to Merak Mail Server 7.5.1 or higher if you are using the Web Mail module.<br />

CVE-2004-1721<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Merak Mail Server < 7.5.2 Web Mail Module Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2157 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running Merak Mail Server. It is reported that versions prior<br />

to 7.5.1 are prone to multiple vulnerabilities in the Web Mail module. An attacker may use<br />

these vulnerabilities to perform cross-site scripting attacks, SQL injection and access to the<br />

PHP source code.<br />

Family Internet Services 538


Solution: Upgrade to Merak Mail Server 7.5.2 or higher if you are using the Web Mail module.<br />

CVE-2004-1721<br />

Merak Mail Server < 7.5.2 Web Mail Module Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2158 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running Merak Mail Server. It is reported that versions prior<br />

to 7.5.1 are prone to multiple vulnerabilities in the Web Mail module. An attacker may use<br />

these vulnerabilities to perform cross-site scripting attacks, SQL injection and access to the<br />

PHP source code.<br />

Solution: Upgrade to Merak Mail Server 7.5.2 or higher if you are using the Web Mail module.<br />

CVE-2004-1721<br />

Gaim < 0.82 Multiple Overflows<br />

<strong>PVS</strong> ID: 2159 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host<br />

appears to be running Gaim, a popular open-source multi-protocol instant messenger. It is<br />

reported that this version of Gaim is prone to multiple vulnerabilities including several<br />

buffer and heap overflows. These vulnerabilities may permit an attacker to execute<br />

arbitrary code on the remote computer.<br />

Solution: Upgrade to Gaim 0.82.0 or higher.<br />

CVE-2004-0785<br />

Gaim < 0.82 MSN Protocol Buffer Overflow<br />

<strong>PVS</strong> ID: 2160 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host<br />

appears to be running Gaim, a popular open-source multi-protocol instant messenger. It is<br />

reported that this version of Gaim is prone to several buffer overflows in the MSN protocol<br />

implementation. This vulnerability may permit an attacker to execute arbitrary code on the<br />

remote computer.<br />

Solution: Upgrade to Gaim 0.82.0 or higher or disable the MSN protocol module.<br />

CVE-2004-0500<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Gaim / Ultramagnetic Multiple <strong>Security</strong> Vulnerabilities<br />

<strong>PVS</strong> ID: 2161 FAMILY: Internet Messengers NESSUS ID:Not Available<br />

Family Internet Services 539


RISK:<br />

MEDIUM<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

seems to be running either Gaim, a popular open-source multi-protocol instant messenger,<br />

either Ultramagnetic, a clone of Gaim that includes encryption features. It is reported that<br />

the version of the running software is prone to 12 security problems including buffer and<br />

stack overflows. These vulnerabilities may permit an attacker to execute arbitrary code on<br />

the remote host.<br />

Solution: Upgrade to Gaim version 0.76 or higher or to Ultramagnetic 0.81.0 or higher.<br />

CVE-2004-0008<br />

Gaim < 0.59.1 Remote Command Execution<br />

<strong>PVS</strong> ID: 2162 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host<br />

seems to be running Gaim, a popular open-source multi-protocol instant messenger. It is<br />

reported that this version of Gaim is prone to a remote command execution issue. An<br />

attacker may send malicious code encoded in hyperlinks in instant messages that will be<br />

executed by the remote host.<br />

Solution: Upgrade to version 0.59.1 or higher.<br />

CVE-2002-0989<br />

Gaim < 0.59 Web Mail Account Information Disclosure<br />

<strong>PVS</strong> ID: 2163 FAMILY: Internet Messengers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host appears to be running Gaim, a popular<br />

open-source multi-protocol instant messenger. It is reported that this version of Gaim is<br />

prone to an information disclosure issue. If the user configures Gaim to check a web mail<br />

account, the program may create two world readable files in /tmp during the operation that<br />

contain sensitive information about the account.<br />

Solution: Upgrade to version 0.59 or higher.<br />

CVE-2002-0377<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Keene Digital Media Server Directory Traversal Arbitrary File Access<br />

<strong>PVS</strong> ID: 2164 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 540


Description: Synopsis :\n\nThe remote host is vulnerable to a directory traversal flaw.\n\nThe remote<br />

host is running Keene Digital Media Server, a web application for Microsoft Windows<br />

designed to share media files on the Internet. The version installed on the remote host has<br />

been reported to be prone to a directory traversal issue. An attacker may gain read access<br />

on files outside the web root.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Keene Digital Media Server < 1.0.4 Directory Traversal and Authentication Bypass<br />

<strong>PVS</strong> ID: 2165 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Keene Digital Media Server, a web application for Microsoft Windows designed<br />

to share media files on the Internet. The version installed on the remote host has been<br />

reported prone to several vulnerabilities including a directory traversal issue and an<br />

authentication bypass issue. An attacker may gain read access on files outside the web root<br />

or access the administrative module without authentication.<br />

Solution: Upgrade to version 1.0.4 or higher.<br />

CVE-2004-2419<br />

Webmatic < 1.9.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2166 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is running Webmatic, a web portal application. It is reported that this version of<br />

Webmatic is prone to several unknown security issues.<br />

Solution: Upgrade to Webmatic 1.9.0 or higher.<br />

CVE Not available<br />

HastyMail HTML Attachment Content-Disposition Header XSS<br />

<strong>PVS</strong> ID: 2167 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:14370<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection attack.\n\nThe remote host<br />

is running HastyMail, a PHP-based mail client application. There is a flaw in the remote<br />

version of this software that may allow an attacker to execute arbitrary javascript code on<br />

the hosts of users of this software. To exploit this flaw, an attacker would need to send an<br />

email to a victim using HastyMail containing a malicious HTML attachment. When the<br />

victim attempts to read the attachment, a web browser may attempt to render the HTML<br />

file. An attacker may use this flaw to steal the cookies of the victim and therefore get<br />

access to their mailbox or perform other attacks.<br />

Family Internet Services 541


Solution: Upgrade to Hastymail 1.0.2 or 1.2.0 or higher.<br />

CVE-2004-2704<br />

Nakedsoft Gaucho < 1.4.0 Build 151 Content-Type Header Overflow<br />

<strong>PVS</strong> ID: 2168 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using Nakedsoft Gaucho, an email client for Microsoft Windows. It is reported that this<br />

version of the software is prone to a buffer overflow in its mail headers processing<br />

function. An attacker may craft a malicious email that could execute arbitrary code on the<br />

remote host.<br />

Solution: Upgrade to Gaucho 1.4.0 build 151 or higher.<br />

CVE-2004-1752<br />

Gecko-based Browsers for MacOS X Content Spoofing<br />

<strong>PVS</strong> ID: 2169 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection attack.\n\nThe remote host<br />

appears to be running a Gecko-based browser under the MacOS X operating system. It<br />

could be Mozilla, Camillo, Netscape or Firefox. This version of the software is vulnerable<br />

to a content spoofing issue because of a flaw in the third-party plug-in management. An<br />

attacker may write a malicious plug-in (or a Java applet) that may misrepresent or spoof the<br />

content of a alternate tab.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-1753<br />

4D WebStar < 5.3.3 FTP Pre-Authentication Overflow<br />

<strong>PVS</strong> ID: 2170 FAMILY: Web Servers RISK: HIGH NESSUS ID:14195<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote server is<br />

running 4D WebStar. There is a buffer overflow condition in the FTP server module of the<br />

remote version of this software. An attacker may exploit this flaw to execute arbitrary code<br />

on the remote host with the privileges of the FTP server (root).<br />

Solution: Upgrade to 4D WebStar 5.3.3 or higher.<br />

CVE-2004-0695<br />

4D WebStar < 5.3.3 Information Disclosure<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2171 FAMILY: Web Servers NESSUS ID:14196<br />

Family Internet Services 542


RISK:<br />

MEDIUM<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote<br />

server is running 4D WebStar Web Server. The remote server is vulnerable to two issues:<br />

an attacker may be able to obtain the listing of a directory by appending a star (*) to the<br />

directory name and an attacker may obtain the file php.ini by directly requesting<br />

/cgi-bin/php.ini<br />

Solution: Upgrade to 4D WebStar 5.3.3 or higher.<br />

CVE-2004-0696<br />

Abyss < 1.1.6 httpd GET Request Remote Overflow<br />

<strong>PVS</strong> ID: 2172 FAMILY: Web Servers RISK: HIGH NESSUS ID:11784<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote Abyss<br />

Web server is vulnerable to a buffer overflow that may be exploited by an attacker to<br />

execute arbitrary code on this host.<br />

Solution: Upgrade to Abyss 1.1.6 or higher.<br />

CVE-2003-1337<br />

Apache < 1.3.28 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2173 FAMILY: Web Servers RISK: HIGH NESSUS ID:11793<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host appears to be running a version of Apache that is older than 1.3.28 There are<br />

several flaws in this version, which may allow an attacker to disable the remote server.<br />

Solution: Upgrade to version 1.3.28 or higher.<br />

CVE-2002-0061<br />

Apache < 1.3.29 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2174 FAMILY: Web Servers RISK: HIGH NESSUS ID:11915<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote<br />

host appears to be running a version of Apache which is older than 1.3.29 There<br />

are several flaws in this version that may allow an attacker to possibly execute<br />

arbitrary code through mod_alias and mod_rewrite.<br />

Solution: Upgrade to version 1.3.29 or higher.<br />

CVE-2003-0542<br />

Apache < 2.0.48 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 543


<strong>PVS</strong> ID: 2175 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host appears to be running a version of Apache 2.x that is older than 2.0.48. This<br />

version is vulnerable to a bug that may allow a rogue CGI to disable the httpd service by<br />

issuing over 4K of data to stderr. To exploit this flaw, an attacker would need the ability to<br />

upload a rogue CGI script to this server and to have it executed by the Apache daemon<br />

(httpd).<br />

Solution: Upgrade to version 2.0.48 or higher.<br />

CVE-2004-0092<br />

Argosoft HTTP GET Request Saturation Remote DoS<br />

<strong>PVS</strong> ID: 2176 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11734<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Argosoft. This version is reported prone to a denial of service. It is possible to kill<br />

the remote HTTP server by sending an invalid request to it ('GET /index.html\n\n'). An<br />

attacker may exploit this vulnerability to make a web server crash continually or even<br />

execute arbitrary code on a system.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

BadBlue < 2.3 ISAPI Module Remote Administrative Interface Access<br />

<strong>PVS</strong> ID: 2177 FAMILY: Web Servers RISK: HIGH NESSUS ID:11641<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote BadBlue web server has a bug in the way its security<br />

functions are performed that may allow attackers to gain administrative control of this host.<br />

Solution: Upgrade to version 2.3 or higher.<br />

CVE Not available<br />

CommuniGatePro < 4.1b2 Session Token Disclosure<br />

<strong>PVS</strong> ID: 2178 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11567<br />

Description: Synopsis :\n\nThe remote host may allow an attacker to gain unauthorized access to a user's<br />

email.\n\nThe remote CommuniGatePro, according to its version number, is vulnerable to a<br />

flaw that may allow an attacker access the mailboxes of its victims. To exploit such a flaw,<br />

the attacker needs to send an email to a victim with a link to an image hosted on a rogue<br />

server that will store the Referer field sent by the user-agent that contains the credentials<br />

used to access the victim's mailbox.<br />

Family Internet Services 544


Solution: Upgrade to CommuniGatePro 4.1b2 or higher.<br />

CVE Not available<br />

Dune Web Server HTTP GET Request Remote Overflow<br />

<strong>PVS</strong> ID: 2179 FAMILY: Web Servers RISK: HIGH NESSUS ID:11751<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of the Dune Web server that contains a flaw that may be exploited by an<br />

attacker to gain a shell on this host.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

Microsoft IIS FrontPage Extensions Detection<br />

<strong>PVS</strong> ID: 2180 FAMILY: Web Servers RISK: HIGH NESSUS ID:11923<br />

Description: The remote host is running Microsoft IIS with FrontPage Extensions.<br />

Solution: Ensure that you are running a fully patched version of FrontPage and that access to the<br />

FrontPage application is limited to authorized developers and/or administrators.<br />

CVE-2003-0824<br />

iPlanet Web Server < 4.1 SP7 URL-Encoded Host: Information Disclosure<br />

<strong>PVS</strong> ID: 2181 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11856<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote<br />

iPlanet webserver (according to it's version number) is vulnerable to a bug where a remote<br />

user can retrieve sensitive data from memory allocation pools or cause a denial of service<br />

against the server.<br />

Solution: Update to version 4.1 SP7 or higher.<br />

MyServer <<br />

CVE-2001-0327<br />

<strong>PVS</strong> ID: 2182 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11770<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running myServer 0.4.2 or older. There are flaws in this software that may<br />

allow an attacker to disable this service remotely.<br />

Family Internet Services 545


Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-2240<br />

OpenSSL < 0.9.6m / 0.9.7d Multiple DoS<br />

<strong>PVS</strong> ID: 2183 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:12110<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is using a version of OpenSSL that is older than 0.9.6m or 0.9.7d There are<br />

several vulnerabilities in this version of OpenSSL that may allow an attacker to cause a<br />

denial of service against the remote host. The reported version of OpenSSL is: \n %L<br />

Solution: Upgrade to version 0.9.6m, 0.9.7d or higher.<br />

CVE-2004-0112<br />

Pi3Web Webserver < 2.0.3 HTTP GET Request Overflow DoS<br />

<strong>PVS</strong> ID: 2184 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11695<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote Pi3Web<br />

web server may crash when it is sent a malformed GET request.<br />

Solution: Upgrade to Pi3Web 2.0.3 or higher.<br />

CVE-2003-0276<br />

Squid Remote NTLM Authentication Password Handling Remote Overflow<br />

<strong>PVS</strong> ID: 2185 FAMILY: Web Servers RISK: HIGH NESSUS ID:12294<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote server is<br />

running a Squid proxy server. This version is reported vulnerable to a remote buffer<br />

overflow in the NTLM authentication routine. Exploitation of this vulnerability can allow<br />

remote attackers to gain access to confidential data.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-0541<br />

WebServer 4D HTTP GET Request Remote Overflow<br />

<strong>PVS</strong> ID: 2186 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11560<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running WebServer 4D. It is possible to kill the web server by sending an oversized string<br />

of '


your web server crash continually or even execute arbirtray code on your system.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-1507<br />

Nagl Dictionary Module for XOOPS XSS<br />

<strong>PVS</strong> ID: 2187 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running Nagl Dictionary, a XOOPS module. XOOPS is a web portal<br />

application written in PHP. The running version is reported vulnerable to a cross-site<br />

scripting issue. An attacker may steal cookie-based authentication credentials from a<br />

legitimate user by sending the user malformed links to this web site.<br />

Solution: No solution is known at this time.<br />

CVE-2004-1640<br />

WS_FTP Server < 5.04 Hotfix 1 Path Parsing Remote DoS<br />

<strong>PVS</strong> ID: 2188 FAMILY: FTP Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThis<br />

host is running a vulnerable version of WS_FTP Server. Versions up to and including 5.0.2<br />

are reported prone to a remote denial of service in the processing of the CD command. By<br />

providing a malformed path containing '../' characters to the CD command, an attacker may<br />

exhaust server resources.<br />

Solution: Upgrade to version 5.04 Hotfix 1 or higher.<br />

CVE-2004-1643<br />

WFTPD MLST Command Remote DoS<br />

<strong>PVS</strong> ID: 2189 FAMILY: FTP Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote WFTP server may crash when a logged user sends 60 MLST requests with varying<br />

parameter sizes over 2KB. An attacker may use this flaw to prevent this host from<br />

publishing anything using FTP.<br />

Solution: No solution is known at this time.<br />

CVE-2004-1642<br />

Titan FTP < 3.30 CWD Remote Heap Overflow<br />

<strong>PVS</strong> ID: 2190 FAMILY: FTP Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 547


Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote is running<br />

Titan FTP Server. All versions up to and including 3.21 are reported vulnerable to a remote<br />

heap overflow in the CWD command processing. An attacker may deny service to<br />

legitimate users or execute arbitrary code on the remote host.<br />

Solution: Upgrade to Titan FTP 3.30 or higher.<br />

CVE-2004-1641<br />

phpScheduleIt < 1.0.0 New User Registration HTML Injection<br />

<strong>PVS</strong> ID: 2191 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML injection attack.\n\nThe<br />

remote host is running phpScheduleIt. According to its banner, this version is<br />

reported vulnerable to an HTML injection issue. An attacker may add malicious<br />

HTML and Javascript code in a schedule page if they have the right to edit the<br />

'Schedule Name' field. This field is not properly sanitized. The malicious code<br />

would be executed by a victim's web browser displaying this schedule.<br />

Solution: Upgrade to phpScheduleIt 1.0.0 or higher.<br />

CVE-2004-1651<br />

pLog register.php HTML Injection<br />

<strong>PVS</strong> ID: 2192 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML injection attack.\n\nThe remote<br />

host is running pLog, a blog system implemented in PHP. It is reported that every version<br />

up to and including 0.3.2 are prone to an HTML injection issue in the user registration<br />

form. An attacker may use the 'username' and 'blog' fields to inject malicous HTML codes<br />

and scripts in web pages. The malicious code will be executed by a victim's browser when a<br />

tampered page is displayed. For example, the summary.php page that lists every user and<br />

their blog on the system.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

dasBlog Multiple HTTP Headers HTML Injection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2193 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML injection attack.\n\nThe remote<br />

host is running dasBlog, a .NET blog system. It is reported that versions up to and<br />

including 1.6.0 are vulnerable to an HTML injection issue. The application does not<br />

sanitize the Referer and User-Agent HTTP headers. An attacker may use this weakness to<br />

include malicious code in the 'Activity and Events Viewer' that may be executed by an<br />

administrator displaying this page.<br />

Family Internet Services 548


Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-1657<br />

Cerbere Proxy Server Long Host Header Field Overflow DoS<br />

<strong>PVS</strong> ID: 2194 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Cerbere Proxy Server, a HTTP/FTP proxy server for Windows operating systems.<br />

It is reported that versions up to and including 1.2 are vulnerable to a remote denial of<br />

service in the 'Host:' HTTP field processing. An attacker may craft a malicious HTTP<br />

request with a large 'Host:' field to deny service to legitimate users.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

Cisco IOS ACL Bypass (Bug ID CSCdi34061)<br />

<strong>PVS</strong> ID: 2195 FAMILY: SNMP Traps<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10973<br />

Description: Synopsis :\n\nThe remote host may allow unauthorized traffic to pass, despite configured<br />

access controls.\n\n The remote system appears to be vulnerable to a flaw in IOS when the<br />

keyword 'established' is being used in the ACLs. This bug can, under very specific<br />

circumstances and only with certain IP host implementations, allow unauthorized packets<br />

to circumvent a filtering router. This vulnerability is documented as Cisco Bug ID<br />

CSCdi34061.<br />

Solution: http://www.cisco.com/warp/public/707/2.html<br />

CVE-1999-0162<br />

Cisco IOS ACL Bypass (Bug ID CSCdi34061)<br />

<strong>PVS</strong> ID: 2196 FAMILY: SNMP Traps<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10973<br />

Description: Synopsis :\n\nThe remote host may allow unauthorized traffic to pass, despite configured<br />

access controls.\n\n The remote system seems to be vulnerable to a flaw in IOS when the<br />

keyword 'established' is being used in the ACLs. This bug can, under very specific<br />

circumstances and only with certain IP host implementations, allow unauthorized packets<br />

to circumvent a filtering router. This vulnerability is documented as Cisco Bug ID<br />

CSCdi34061.<br />

Solution: http://www.cisco.com/warp/public/707/2.html<br />

CVE-1999-0162<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 549


Cisco IOS ACL Bypass (Bug ID CSCdi34061)<br />

<strong>PVS</strong> ID: 2197 FAMILY: SNMP Traps<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10973<br />

Description: Synopsis :\n\nThe remote host may allow unauthorized traffic to pass, despite configured<br />

access controls.\n\n The remote system appears to be vulnerable to a flaw in IOS when the<br />

keyword 'established' is being used in the ACLs. This bug can, under very specific<br />

circumstances and only with certain IP host implementations, allow unauthorized packets<br />

to circumvent a filtering router. This vulnerability is documented as Cisco Bug ID<br />

CSCdi34061.<br />

Solution: http://www.cisco.com/warp/public/707/2.html<br />

CVE-1999-0162<br />

Cisco IOS ACL Bypass (Bug ID CSCdi36962)<br />

<strong>PVS</strong> ID: 2198 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:10974<br />

Description: Synopsis :\n\nThe remote host may allow unauthorized traffic to pass, despite configured<br />

access controls.\n\n The remote system appears to be vulnerable to a flaw in IOS when the<br />

keyword 'tacacs-ds' or 'tacacs' is being used in extended ACLs. This bug can, under very<br />

specific circumstances and only with certain IP host implementations, allow unauthorized<br />

packets to circumvent a filtering router. This vulnerability is documented as Cisco Bug ID<br />

CSCdi36962.<br />

Solution: http://www.cisco.com/warp/public/707/1.html<br />

CVE-1999-0161<br />

Cisco IOS ACL Bypass (Bug ID CSCdi36962)<br />

<strong>PVS</strong> ID: 2199 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:10974<br />

Description: Synopsis :\n\nThe remote host may allow unauthorized traffic to pass, despite configured<br />

access controls.\n\n The remote system appears to be vulnerable to a flaw in IOS when the<br />

keyword 'tacacs-ds' or 'tacacs' is being used in extended ACLs. This bug can, under very<br />

specific circumstances and only with certain IP host implementations, allow unauthorized<br />

packets to circumvent a filtering router. This vulnerability is documented as Cisco Bug ID<br />

CSCdi36962.<br />

Solution: http://www.cisco.com/warp/public/707/1.html<br />

CVE-1999-0161<br />

Cisco IOS ACL Bypass (Bug ID CSCdi36962)<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2200 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:10974<br />

Family Internet Services 550


Description: Synopsis :\n\nThe remote host may allow unauthorized traffic to pass, despite configured<br />

access controls.\n\n The remote system appears to be vulnerable to a flaw in IOS when the<br />

keyword 'tacacs-ds' or 'tacacs' is being used in extended ACLs. This bug can, under very<br />

specific circumstances and only with certain IP host implementations, allow unauthorized<br />

packets to circumvent a filtering router. This vulnerability is documented as Cisco Bug ID<br />

CSCdi36962.<br />

Solution: http://www.cisco.com/warp/public/707/1.html<br />

CVE-1999-0161<br />

Cisco IOS OSPF Neighbor Announcement Overflow DoS (Bug ID CSCdp58462)<br />

<strong>PVS</strong> ID: 2201 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:11283<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

Open Shortest Path First (OSPF) implementation in the remote Cisco IOS software<br />

versions is vulnerable to a denial of service if it receives a flood of neighbor<br />

announcements in which more than 255 hosts try to establish a neighbor relationship per<br />

interface. An attacker may use this flaw to prevent the router from working properly. This<br />

vulnerability is documented as Cisco Bug ID CSCdp58462.<br />

Solution: http://www.cisco.com/warp/public/707/cisco-sn-20030221-ospf.shtml<br />

CVE-2003-0100<br />

Cisco IOS OSPF Neighbor Announcement Overflow DoS (Bug ID CSCdp58462)<br />

<strong>PVS</strong> ID: 2202 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:11283<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

Open Shortest Path First (OSPF) implementation in the remote Cisco IOS software<br />

versions is vulnerable to a denial of service if it receives a flood of neighbor<br />

announcements in which more than 255 hosts try to establish a neighbor relationship per<br />

interface. An attacker may use this flaw to prevent the router from working properly. This<br />

vulnerability is documented as Cisco Bug ID CSCdp58462.<br />

Solution: http://www.cisco.com/warp/public/707/cisco-sn-20030221-ospf.shtml<br />

CVE-2003-0100<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Cisco IOS OSPF Neighbor Announcement Overflow DoS (Bug ID CSCdp58462)<br />

<strong>PVS</strong> ID: 2203 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:11283<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

Open Shortest Path First (OSPF) implementation in the remote Cisco IOS software<br />

versions is vulnerable to a denial of service if it receives a flood of neighbor<br />

announcements in which more than 255 hosts try to establish a neighbor relationship per<br />

interface. An attacker may use this flaw to prevent the router from working properly. This<br />

vulnerability is documented as Cisco Bug ID CSCdp58462.<br />

Family Internet Services 551


Solution: http://www.cisco.com/warp/public/707/cisco-sn-20030221-ospf.shtml<br />

CVE-2003-0100<br />

Cisco IOS PPTP Packet Remote DoS (Bug ID CSCdt46181)<br />

<strong>PVS</strong> ID: 2204 FAMILY: SNMP Traps<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10979<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\n<br />

Point-to-Point Tunneling Protocol (PPTP) allows users to tunnel to an Internet Protocol<br />

(IP) network using a Point-to-Point Protocol (PPP). The protocol is described in RFC2637.<br />

PPTP implementation using Cisco IOS software releases contains a vulnerability that will<br />

crash a router if it receives a malformed or crafted PPTP packet. To expose this<br />

vulnerability, PPTP must be enabled on the router. PPTP is disabled by default. No<br />

additional special conditions are required. An attacker may use this issue to prevent a<br />

network from working properly. This vulnerability is documented as Cisco Bug ID<br />

CSCdt46181<br />

Solution: http://www.cisco.com/warp/public/707/PPTP-vulnerability-pub.html<br />

CVE-2001-1183<br />

Cisco IOS PPTP Packet Remote DoS (Bug ID CSCdt46181)<br />

<strong>PVS</strong> ID: 2205 FAMILY: SNMP Traps<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10979<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\n<br />

Point-to-Point Tunneling Protocol (PPTP) allows users to tunnel to an Internet Protocol<br />

(IP) network using a Point-to-Point Protocol (PPP). The protocol is described in RFC2637.<br />

PPTP implementation using Cisco IOS software releases contains a vulnerability that will<br />

crash a router if it receives a malformed or crafted PPTP packet. To expose this<br />

vulnerability, PPTP must be enabled on the router. PPTP is disabled by default. No<br />

additional special conditions are required. An attacker may use this issue to prevent a<br />

network from working properly. This vulnerability is documented as Cisco Bug ID<br />

CSCdt46181<br />

Solution: http://www.cisco.com/warp/public/707/PPTP-vulnerability-pub.html<br />

CVE-2001-1183<br />

Cisco IOS PPTP Packet Remote DoS (Bug ID CSCdt46181)<br />

<strong>PVS</strong> ID: 2206 FAMILY: SNMP Traps<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10979<br />

Family Internet Services 552


Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\n<br />

Point-to-Point Tunneling Protocol (PPTP) allows users to tunnel to an Internet Protocol<br />

(IP) network using a Point-to-Point Protocol (PPP). The protocol is described in RFC2637.<br />

PPTP implementation using Cisco IOS software releases contains a vulnerability that will<br />

crash a router if it receives a malformed or crafted PPTP packet. To expose this<br />

vulnerability, PPTP must be enabled on the router. PPTP is disabled by default. No<br />

additional special conditions are required. An attacker may use this issue to prevent a<br />

network from working properly. This vulnerability is documented as Cisco Bug ID<br />

CSCdt46181<br />

Solution: http://www.cisco.com/warp/public/707/PPTP-vulnerability-pub.html<br />

CVE-2001-1183<br />

Cisco PPTP Authentication Bypass / DoS (Bug ID CSCdt56514)<br />

<strong>PVS</strong> ID: 2207 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:11287<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw which allows for the<br />

bypassing of authentication.\n\nThe remote VPN concentrator is vulnerable to<br />

an internal PPTP / IPSEC authentication login vulnerability. This vulnerability<br />

is documented as Cisco bug ID CSCdt56514.<br />

Solution: http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml<br />

CVE-2002-1095<br />

Cisco PPTP Authentication Bypass / DoS (Bug ID CSCdt56514)<br />

<strong>PVS</strong> ID: 2208 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:11287<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the<br />

bypassing of authentication.\n\nThe remote VPN concentrator is vulnerable to<br />

an internal PPTP / IPSEC authentication login vulnerability. This vulnerability<br />

is documented as Cisco bug ID CSCdt56514.<br />

Solution: http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml<br />

CVE-2002-1095<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Cisco PPTP Authentication Bypass / DoS (Bug ID CSCdt56514)<br />

<strong>PVS</strong> ID: 2209 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:11287<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the<br />

bypassing of authentication.\n\nThe remote VPN concentrator is vulnerable to<br />

an internal PPTP / IPSEC authentication login vulnerability. This vulnerability<br />

is documented as Cisco bug ID CSCdt56514.<br />

Solution: http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml<br />

Family Internet Services 553


CVE-2002-1095<br />

Cisco VPN Concentrator HTML Interface DoS (Bug ID CSCdu15622)<br />

<strong>PVS</strong> ID: 2210 FAMILY: SNMP Traps<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11288<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote VPN concentrator is vulnerable to a flaw in its HTML parser processor. This<br />

vulnerability is documented as Cisco bug ID CSCdu15622.<br />

Solution: http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml<br />

CVE-2002-1093<br />

Cisco VPN Concentrator HTML Interface DoS (Bug ID CSCdu15622)<br />

<strong>PVS</strong> ID: 2211 FAMILY: SNMP Traps<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11288<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote VPN concentrator is vulnerable to a flaw in its HTML parser processor. This<br />

vulnerability is documented as Cisco bug ID CSCdu15622.<br />

Solution: http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml<br />

CVE-2002-1093<br />

Cisco VPN Concentrator HTML Interface DoS (Bug ID CSCdu15622)<br />

<strong>PVS</strong> ID: 2212 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11288<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote VPN concentrator is vulnerable to a flaw in its HTML parser processor. This<br />

vulnerability is documented as Cisco bug ID CSCdu15622. For your information, the<br />

version of Cisco IOS was observed as: %L<br />

Solution: http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml<br />

CVE-2002-1093<br />

Cisco IOS CEF Packet Information Disclosure (Bug ID CSCdu20643)<br />

<strong>PVS</strong> ID: 2213 FAMILY: SNMP Traps<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10983<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nIf the remote device has Cisco Express Forwarding (CEF) enabled, it may leak<br />

information from previous packets that have been handled by the device. An attacker may<br />

Family Internet Services 554


use this vulnerability to sniff your network remotely. This vulnerability is documented as<br />

Cisco Bug ID CSCdu20643.<br />

Solution: http://www.cisco.com/warp/public/707/IOS-CEF-pub.shtml<br />

CVE-2002-0339<br />

Cisco IOS CEF Packet Information Disclosure (Bug ID CSCdu20643)<br />

<strong>PVS</strong> ID: 2214 FAMILY: SNMP Traps<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10983<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nIf the remote device has Cisco Express Forwarding (CEF) enabled, it may leak<br />

information from previous packets that have been handled by the device. An attacker may<br />

use this vulnerability to sniff your network remotely. This vulnerability is documented as<br />

Cisco Bug ID CSCdu20643.<br />

Solution: http://www.cisco.com/warp/public/707/IOS-CEF-pub.shtml<br />

CVE-2002-0339<br />

Cisco IOS CEF Packet Information Disclosure (Bug ID CSCdu20643)<br />

<strong>PVS</strong> ID: 2215 FAMILY: SNMP Traps<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10983<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nIf the remote device has Cisco Express Forwarding (CEF) enabled, it may leak<br />

information from previous packets that have been handled by the device. An attacker may<br />

use this vulnerability to sniff your network remotely. This vulnerability is documented as<br />

Cisco Bug ID CSCdu20643.<br />

Solution: http://www.cisco.com/warp/public/707/IOS-CEF-pub.shtml<br />

CVE-2002-0339<br />

Cisco VPN Concentrator Service Banners Information Disclosure (Bug ID CSCdu35577)<br />

<strong>PVS</strong> ID: 2216 FAMILY: SNMP Traps<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11289<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote VPN concentrator gives out too much information in application<br />

layer banners. This vulnerability is documented as Cisco bug ID CSCdu35577.<br />

Solution: http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml<br />

CVE-2002-1094<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 555


Cisco VPN Concentrator Service Banner Information Disclosure (Bug ID CSCdu35577)<br />

<strong>PVS</strong> ID: 2217 FAMILY: SNMP Traps<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11289<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote VPN concentrator gives out too much information in application<br />

layer banners. This vulnerability is documented as Cisco bug ID CSCdu35577.<br />

Solution: http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml<br />

CVE-2002-1094<br />

Cisco VPN Concentrator Service Banner Information Disclosure (Bug ID CSCdu35577)<br />

<strong>PVS</strong> ID: 2218 FAMILY: SNMP Traps<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11289<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote VPN concentrator gives out too much information in application<br />

layer banners. This vulnerability is documented as Cisco bug ID CSCdu35577.<br />

Solution: http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml<br />

CVE-2002-1094<br />

Cisco VPN Concentrator Invalid Login DoS (Bug ID CSCdu82823)<br />

<strong>PVS</strong> ID: 2219 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:11290<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote VPN<br />

concentrator has a vulnerability in its implementation of telnetd. This vulnerability is<br />

documented as Cisco bug ID CSCdu82823.<br />

Solution: http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml<br />

CVE-2001-0427<br />

Cisco VPN Concentrator Invalid Login DoS (Bug ID CSCdu82823)<br />

<strong>PVS</strong> ID: 2220 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:11290<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote VPN<br />

concentrator has a vulnerability in its implemenation of telnetd. This vulnerability is<br />

documented as Cisco bug ID CSCdu82823.<br />

Solution: http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml<br />

CVE-2001-0427<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Cisco VPN Concentrator Invalid Login DoS (Bug ID CSCdu82823)<br />

Family Internet Services 556


<strong>PVS</strong> ID: 2221 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:11290<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote VPN<br />

concentrator has a vulnerability in its implemenation of telnetd. This vulnerability is<br />

documented as Cisco bug ID CSCdu82823.<br />

Solution: http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml<br />

CVE-2001-0427<br />

Cisco VPN Concentrator PPTP Multiple Vulnerabilities (Bug ID CSCdv66718)<br />

<strong>PVS</strong> ID: 2222 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:11291<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote VPN concentrator has a vulnerability in its PPTP client. This vulnerability is<br />

documented as Cisco bug ID CSCdv66718.<br />

Solution: http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml<br />

CVE-2002-1092<br />

Cisco VPN Concentrator PPTP Multiple Vulnerabilities (Bug ID CSCdv66718)<br />

<strong>PVS</strong> ID: 2223 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:11291<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote VPN concentrator has a vulnerability in its PPTP client. This vulnerability is<br />

documented as Cisco bug ID CSCdv66718.<br />

Solution: http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml<br />

CVE-2002-1092<br />

Cisco VPN Concentrator PPTP Multiple Vulnerabilities (Bug ID CSCdv66718)<br />

<strong>PVS</strong> ID: 2224 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:11291<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote VPN concentrator has a vulnerability in its PPTP client. This vulnerability is<br />

documented as Cisco bug ID CSCdv66718.<br />

Solution: http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml<br />

CVE-2002-1092<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Cisco VPN Concentrator HTML Source Cleartext Password Disclosure (Bug ID CSCdv88230,<br />

CSCdw22408)<br />

<strong>PVS</strong> ID: 2225 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:11292<br />

Family Internet Services 557


Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to<br />

retrieve sensitive files or data.\n\nThe remote VPN concentrator discloses the<br />

passwords of its users in the source HTML of the embedded web server. This<br />

vulnerability is documented as Cisco bug ID CSCdv88230 and CSCdw22408.<br />

Solution: http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml<br />

CVE-2002-1096<br />

Cisco VPN Concentrator HTMl Source Cleartext Password Disclosure (Bug ID CSCdv88230,<br />

CSCdw22408)<br />

<strong>PVS</strong> ID: 2226 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:11292<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to<br />

retrieve sensitive files or data.\n\nThe remote VPN concentrator discloses the<br />

passwords of its users in the source HTML of the embedded web server. This<br />

vulnerability is documented as Cisco bug ID CSCdv88230 and CSCdw22408.<br />

Solution: http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml<br />

CVE-2002-1096<br />

Cisco VPN Concentrator HTML Source Cleartext Password Disclosure (Bug ID CSCdv88230,<br />

CSCdw22408)<br />

<strong>PVS</strong> ID: 2227 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:11292<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to<br />

retrieve sensitive files or data.\n\nThe remote VPN concentrator discloses the<br />

passwords of its users in the source HTML of the embedded web server. This<br />

vulnerability is documented as Cisco bug ID CSCdv88230 and CSCdw22408.<br />

Solution: http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml<br />

CVE-2002-1096<br />

Cisco VPN Concentrator HTML Source Certificate Password Disclosure (Bug ID CSCdw50657)<br />

<strong>PVS</strong> ID: 2228 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:11294<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to<br />

retrieve sensitive files or data.\n\nThe remote VPN concentrator discloses the<br />

certificate passwords of its users in the source HTML pages of the embedded web<br />

server. This vulnerability is documented as Cisco bug ID CSCdw50657.<br />

Solution: http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml<br />

CVE-2002-1097<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 558


Cisco VPN Concentrator HTML Source Certificate Password Disclosure (Bug ID CSCdw50657)<br />

<strong>PVS</strong> ID: 2229 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:11294<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to<br />

retrieve sensitive files or data.\n\nThe remote VPN concentrator discloses the<br />

certificate passwords of its users in the source HTML pages of the embedded web<br />

server. This vulnerability is documented as Cisco bug ID CSCdw50657.<br />

Solution: http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml<br />

CVE-2002-1097<br />

Cisco VPN Concentrator HTML Source Certificate Password Disclosure (Bug ID CSCdw50657)<br />

<strong>PVS</strong> ID: 2230 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:11294<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to<br />

retrieve sensitive files or data.\n\nThe remote VPN concentrator discloses the<br />

certificate passwords of its users in the source HTML pages of the embedded web<br />

server. This vulnerability is documented as Cisco bug ID CSCdw50657.<br />

Solution: http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml<br />

CVE-2002-1097<br />

Cisco VPN Concentrator ACL Bypass / DoS (Bug ID CSCdx07754, CSCdx24622, CSCdx24632)<br />

<strong>PVS</strong> ID: 2231 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:11293<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote VPN concentrator is subject to multiple flaws: XML public rule, HTML pages<br />

access and HTML login processing. This vulnerability is documented as Cisco bug ID<br />

CSCdx07754, CSCdx24622 and CSCdx24632<br />

Solution: http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml<br />

CVE-2002-1098<br />

Cisco VPN Concentrator ACL Bypass / DoS (Bug ID CSCdx07754, CSCdx24622, CSCdx24632)<br />

<strong>PVS</strong> ID: 2232 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:11293<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote VPN concentrator is subject to multiple flaws: XML public rule, HTML pages<br />

access and HTML login processing. This vulnerability is documented as Cisco bug ID<br />

CSCdx07754, CSCdx24622 and CSCdx24632<br />

Solution: http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml<br />

CVE-2002-1098<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 559


Cisco VPN Concentrator ACL Bypass / DoS (Bug ID CSCdx07754, CSCdx24622, CSCdx24632)<br />

<strong>PVS</strong> ID: 2233 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:11293<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote VPN concentrator is subject to multiple flaws: XML public rule, HTML pages<br />

access, HTML login processing. This vulnerability is documented as Cisco bug ID<br />

CSCdx07754, CSCdx24622 and CSCdx24632<br />

Solution: http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml<br />

CVE-2002-1098<br />

Cisco VPN Concentrator "No Encryption" Option Remote DoS (Bug ID CSCdx39981)<br />

<strong>PVS</strong> ID: 2234 FAMILY: SNMP Traps<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11295<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote VPN concentrator is subject to a VPN client authentication vulnerability that can<br />

force a reload of the concentrator when a very large string for the username prompt is sent.<br />

This vulnerability is documented as Cisco bug ID CSCdx39981<br />

Solution: http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml<br />

CVE-2002-1095<br />

Cisco VPN Concentrator "No Encryption" Option Remote DoS (Bug ID CSCdx39981)<br />

<strong>PVS</strong> ID: 2235 FAMILY: SNMP Traps<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11295<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote VPN concentrator is subject to a VPN client authentication vulnerability that can<br />

force a reload of the concentrator when a very large string for the username prompt is sent.<br />

This vulnerability is documented as Cisco bug ID CSCdx39981<br />

Solution: http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml<br />

CVE-2002-1095<br />

Cisco VPN Concentrator "No Encryption" Option Remote DoS (Bug ID CSCdx39981)<br />

<strong>PVS</strong> ID: 2236 FAMILY: SNMP Traps<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11295<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote VPN concentrator is subject to a VPN client authentication vulnerability that can<br />

force a reload of the concentrator when a very large string for the username prompt is sent.<br />

This vulnerability is documented as Cisco bug ID CSCdx39981<br />

Family Internet Services 560


Solution: http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml<br />

CVE-2002-1095<br />

Cisco VPN Concentrator LAN-to-LAN IPSEC Tunnel Termination DoS (Bug ID CSCdx54675)<br />

<strong>PVS</strong> ID: 2237 FAMILY: SNMP Traps<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11296<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote VPN concentrator is subject to a LAN-to-LAN IPSEC tunnel vulnerability that<br />

allows remote attackers to cause a denial of service. Existing associations might be<br />

removed when a new connection is made and no check is done in order to determine if the<br />

connection comes from the proper network. This vulnerability is documented as Cisco bug<br />

ID CSCdx54675<br />

Solution: http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml<br />

CVE-2002-1102<br />

Cisco VPN Concentrator LAN-to-LAN IPSEC Tunnel Termination DoS (Bug ID CSCdx54675)<br />

<strong>PVS</strong> ID: 2238 FAMILY: SNMP Traps<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11296<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote VPN concentrator is subject to a LAN-to-LAN IPSEC tunnel vulnerability that<br />

allows remote attackers to cause a denial of service. Existing associations might be<br />

removed when a new connection is made and no check is done in order to determine if the<br />

connection comes from the proper network. This vulnerability is documented as Cisco bug<br />

ID CSCdx54675<br />

Solution: http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml<br />

CVE-2002-1102<br />

Cisco VPN Concentrator LAN-to-LAN IPSEC Tunnel Termination DoS (Bug ID CSCdx54675)<br />

<strong>PVS</strong> ID: 2239 FAMILY: SNMP Traps<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11296<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote VPN concentrator is subject to a LAN-to-LAN IPSEC tunnel vulnerability that<br />

allows remote attackers to cause a denial of service. Existing associations might be<br />

removed when a new connection is made and no check is done in order to determine if the<br />

connection comes from the proper network. This vulnerability is documented as Cisco bug<br />

ID CSCdx54675<br />

Solution: http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml<br />

Family Internet Services 561


CVE-2002-1102<br />

Cisco Multiple DoS (Bug ID CSCdx92043)<br />

<strong>PVS</strong> ID: 2240 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:11379<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\n Sending bogus<br />

ICMP redirect packets, a malicious user can either disrupt or intercept communication from<br />

a router. This vulnerability is documented with the CISCO bug ID CSCdx92043<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-1222<br />

Cisco Multiple DoS (Bug ID CSCdx92043)<br />

<strong>PVS</strong> ID: 2241 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:11379<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nSending bogus<br />

ICMP redirect packets, a malicious user can either disrupt or intercept communication from<br />

a router. This vulnerability is documented with the CISCO bug ID CSCdx92043<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-1222<br />

Cisco Multiple DoS (Bug ID CSCdx92043)<br />

<strong>PVS</strong> ID: 2242 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:11379<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\n Sending bogus<br />

ICMP redirect packets, a malicious user can either disrupt or intercept communication from<br />

a router. This vulnerability is documented with the CISCO bug ID CSCdx92043<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-1222<br />

Cisco TFTP Server Long Filename DoS (Bug ID CSCdy03429)<br />

<strong>PVS</strong> ID: 2243 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:11056<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\n Trivial File Transfer<br />

Protocol (TFTP) is a protocol that allows for easy transfer of files between network<br />

connected devices. A vulnerability has been discovered in the processing of filenames<br />

within a TFTP read request when Cisco IOS is configured to act as a TFTP server. This<br />

vulnerability is documented as Cisco Bug ID CSCdy03429.<br />

Solution: http://www.cisco.com/warp/public/707/ios-tftp-long-filename-pub.shtml<br />

CVE-2002-0813<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 562


Cisco TFTP Server Long Filename DoS (Bug ID CSCdy03429)<br />

<strong>PVS</strong> ID: 2244 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:11056<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nTrivial File Transfer<br />

Protocol (TFTP) is a protocol that allows for easy transfer of files between network<br />

connected devices. A vulnerability has been discovered in the processing of filenames<br />

within a TFTP read request when Cisco IOS is configured to act as a TFTP server. This<br />

vulnerability is documented as Cisco Bug ID CSCdy03429<br />

Solution: http://www.cisco.com/warp/public/707/ios-tftp-long-filename-pub.shtml<br />

CVE-2002-0813<br />

Cisco TFTP Server Long Filename DoS (Bug ID CSCdy03429)<br />

<strong>PVS</strong> ID: 2245 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:11056<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nTrivial File Transfer<br />

Protocol (TFTP) is a protocol that allows for easy transfer of files between network<br />

connected devices. A vulnerability has been discovered in the processing of filenames<br />

within a TFTP read request when Cisco IOS is configured to act as a TFTP server. This<br />

vulnerability is documented as Cisco Bug ID CSCdy03429<br />

Solution: http://www.cisco.com/warp/public/707/ios-tftp-long-filename-pub.shtml<br />

CVE-2002-0813<br />

Cisco VPN Concentrator ISAKMP Packet Remote DoS (Bug ID CSCdy38035)<br />

<strong>PVS</strong> ID: 2246 FAMILY: SNMP Traps<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11297<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote VPN concentrator is subject to an ISAKMP package processing vulnerability.<br />

Malformed or a very large number of ISAKMP packets might cause a reload of the<br />

concentrator. The vulnerability is aggravated if debug is turned on. This vulnerability is<br />

documented as Cisco bug ID CSCdy38035.<br />

Solution: http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml<br />

CVE-2002-1103<br />

Cisco VPN Concentrator ISAKMP PAcket Remote DoS (Bug ID CSCdy38035)<br />

<strong>PVS</strong> ID: 2247 FAMILY: SNMP Traps<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11297<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote VPN concentrator is subject to an ISAKMP package processing vulnerability.<br />

Malformed or a very large number of ISAKMP packets might cause a reload of the<br />

Family Internet Services 563


concentrator. The vulnerability is aggravated if debug is turned on. This vulnerability is<br />

documented as Cisco bug ID CSCdy38035.<br />

Solution: http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml<br />

CVE-2002-1103<br />

Cisco VPN Concentrator ISAKMP Packet Remote DoS (Bug ID CSCdy38035)<br />

<strong>PVS</strong> ID: 2248 FAMILY: SNMP Traps<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11297<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote VPN concentrator is subject to an ISAKMP package processing vulnerability.<br />

Malformed or a very large number of ISAKMP packets might cause a reload of the<br />

concentrator. The vulnerability is aggravated if debug is turned on. This vulnerability is<br />

documented as Cisco bug ID CSCdy38035.<br />

Solution: http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml<br />

CVE-2002-1103<br />

Cisco IOS SIP Packet Remote DoS (Bug ID CSCdz39284, CSCdz41124)<br />

<strong>PVS</strong> ID: 2249 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:11380<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\n It is<br />

possible to make the remote IOS crash by sending malformed SIP packets. These<br />

vulnerabilities are documented as CISCO bug id CSCdz39284 and CSCdz41124.<br />

Solution: http://www.cisco.com/warp/public/707/cisco-sa-20030221-protos.shtml<br />

CVE-2003-1115<br />

Cisco IOS SIP Packet DoS (Bug ID CSCdz39284, CSCdz41124)<br />

<strong>PVS</strong> ID: 2250 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:11380<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\n It is<br />

possible to make the remote IOS crash by sending malformed SIP packets. These<br />

vulnerabilities are documented as CISCO bug id CSCdz39284 and CSCdz41124.<br />

Solution: http://www.cisco.com/warp/public/707/cisco-sa-20030221-protos.shtml<br />

CVE-2003-1115<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Cisco IOS SIP Packet Remote DoS (Bug ID CSCdz39284, CSCdz41124)<br />

<strong>PVS</strong> ID: 2251 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:11380<br />

Family Internet Services 564


Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\n It is<br />

possible to make the remote IOS crash by sending malformed SIP packets. These<br />

vulnerabilities are documented as CISCO bug id CSCdz39284 and CSCdz41124.<br />

Solution: http://www.cisco.com/warp/public/707/cisco-sa-20030221-protos.shtml<br />

CVE-2003-1115<br />

IBM DB2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2252 FAMILY: Database RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a IBM DB/2 Universal Database Server. It is reported that versions up to and<br />

including 8.1 are vulnerable to multiple critical vulnerabilities including multiple remote<br />

buffer overflows. Because DB/2 banners sent over the network do not include the installed<br />

FixPak number, this alert may be a false positive.<br />

Solution: Install the relevant Fixpak (Fixpak 8 for DB/2 8.1 or Fixpak 12 for DB/2 7.x) from IBM.<br />

CuteNews <<br />

CVE-2004-1372<br />

<strong>PVS</strong> ID: 2253 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17256<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS)<br />

attack.\n\nAccording to its version number, the remote host is running a version of<br />

CuteNews that allows an attacker to inject arbitrary script through the variables<br />

'X-FORWARDED-FOR' or 'CLIENT-IP' when adding a comment. On one hand, an<br />

attacker can inject a client-side script to be executed by an administrator's browser when<br />

he/she chooses to edit the added comment. On the other, an attacker with local access could<br />

leverage this flaw to run arbitrary PHP code in the context of the web server user.<br />

Additionally, it suffers from a cross-site scripting flaw involving the 'search.php' script.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-0645<br />

Apache < 2.0.51 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2254 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host appears to be running a version of Apache 2.x that is older than 2.0.51. It is<br />

reported that these versions of Apache are prone to a denial of service issue related to<br />

mod_ssl. An attacker may force a SSL connection to be aborted and therefore cause the<br />

Apache server to enter in an infinite loop, consuming CPU resources.<br />

Family Internet Services 565


Solution: Upgrade to version 2.0.51 or higher.<br />

CVE-2004-0748<br />

Squid NTLM Authentication NTLMSSP Packet Remote DoS<br />

<strong>PVS</strong> ID: 2255 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe remote<br />

server is running a Squid proxy server. This version is reported vulnerable to a remote denial of<br />

service in the NTLM authentication routine. If NTLM authentication is enabled, an attacker<br />

may deny service to legitimate users by sending malformed NTLMSSP packets.<br />

Solution: Apply the relevant patch from<br />

http://www.squid-cache.org/squid/Versions/v2/2.5/bugs/squid-2.5.STABLE6-ntlm_fetch_string.patch<br />

CVE-2004-0832<br />

Ipswitch IMail Server < 8.13.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2256 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running Ipswitch IMail, a server that sends clients email via a web interface.<br />

It runs on Microsoft Windows operating systems. Ipswitch IMail is reported to be<br />

vulnerable to multiple remote denial of service in the following modules: 'Queue Manager',<br />

'Web Messaging' and 'Web Calendar'. An attacker may use these weakness to deny service<br />

to legitimate users. It is conjectured that these issues may allow remote arbitrary code<br />

execution.<br />

Solution: Upgrade to IMail 8.13.0 or higher.<br />

CVE-2004-2422<br />

Ipswitch IMail Server < 8.13.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2257 FAMILY: SMTP Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running Ipswitch IMail, an server that sends clients email via a web<br />

interface. It runs on Microsoft Windows operating systems. Ipswitch IMail is reported to be<br />

vulnerable to multiple remote denial of service in the following modules: 'Queue Manager',<br />

'Web Messaging' and 'Web Calendar'. An attacker may use these weakness to deny service<br />

to legitimate users. It is conjectured that these issues may allow remote arbitrary code<br />

execution.<br />

Family Internet Services 566


Solution: Upgrade to IMail 8.13.0 or higher.<br />

CVE-2004-2422<br />

Winamp ActiveX Control Remote Buffer Overflow<br />

<strong>PVS</strong> ID: 2258 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote client is<br />

running a version of the Nullsoft Winamp media player that may be vulnerable to a remote<br />

code execution issue. This vulnerability may be used to remotely execute arbitrary code on<br />

the host by invoking an ActiveX component installed by Winamp in a malicious manner.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Opera < 7.54.0 Empty CCCC Object JavaScript-based DoS<br />

<strong>PVS</strong> ID: 2259 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is using a version of Opera that is affected by a security weakness that may<br />

permit an attacker to crash the remote web browser by using JavaScript. Specifically,<br />

processing an empty 'CCCC' object generated using JavaScript causes Opera to crash.<br />

Solution: Install Opera 7.54.0 or higher.<br />

CVE Not available<br />

phpMyBackupPro < 1.0.0 Multiple Input Sanitization Vulnerabilities<br />

<strong>PVS</strong> ID: 2260 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

appears to be using phpMyBackupPro. It is reported that this version is prone to multiple<br />

security weaknesses via input validation. An attacker may use these issues to gain access to<br />

the application or to access the underlying database.<br />

Solution: Upgrade to version 1.0.0 or higher.<br />

CVE Not available<br />

Keene Digital Media Server Multiple XSS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2261 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running Keene Digital Media Server, a web application for Microsoft<br />

Windows designed to share media files on the Internet. This version of the software has<br />

Family Internet Services 567


een reported to be prone to a cross-site scripting issue. An attacker may steal cookie-based<br />

authentication credentials from a legitimate user by sending malformed links to this site.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Keene Digital Media Server Multiple Script Authentication Bypass<br />

<strong>PVS</strong> ID: 2262 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running Keene Digital Media Server, a web<br />

application for Microsoft Windows designed to share media files on the Internet. This<br />

version of the software has been reported to be prone to an authentication bypass<br />

vulnerability. An attacker may access some part of the administration interface<br />

(adminmessage.kspx and adminshares.kspx) without providing proper authentication.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Ipswitch WhatsUp Gold prn.htm GET Request Remote DoS<br />

<strong>PVS</strong> ID: 2263 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS)<br />

attack.\n\nAccording to its HTTP banner, the remote host appears to be running a<br />

vulnerable version of Ipswitch WhatsUp Gold, a network management application for<br />

Microsoft Windows. It is reported that versions up to and incluing 8.03 hotfix 1 are prone<br />

to a remote denial of service vulnerability when processing certain HTTP GET requests.<br />

An attacker may deny service to legitimate users by sending a malformed GET request for<br />

the 'prn.html' file.<br />

Solution: Upgrade to WhatsUp Gold 8.03 Hotfix 3 or higher.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Ipswitch WhatsUp Gold Notification Instance Name Remote Overflow<br />

<strong>PVS</strong> ID: 2264 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nAccording<br />

to its HTTP banner, the remote host appears to be running a vulnerable version of Ipswitch<br />

WhatsUp Gold, a network management application for Microsoft Windows. It is reported<br />

that versions up to and incluing 8.03 Hotfix 1 are prone to a remote buffer overflow<br />

vulnerability when processing notification instance names in the web interface. An attacker<br />

may use this vulnerability to execute arbitrary code on the remote host.<br />

Family Internet Services 568


Solution: Upgrade to WhatsUp Gold 8.03 Hotfix 2 or higher.<br />

CVE Not available<br />

mpg123 Multiple Remote Overflows<br />

<strong>PVS</strong> ID: 2265 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host<br />

seems to be running mpg123 (or one of its derivatives). This version of mpg123 is reported<br />

to be vulnerable to a remote buffer overflow that may permit an attacker to execute<br />

arbitrary code on the remote host.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-0805<br />

PSNews v1.1 index.php Multiple Parameter XSS<br />

<strong>PVS</strong> ID: 2266 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running PSNews, a content management system implemented in ASP. It is<br />

reported that PSNews v1.1 is affected by a cross-site scripting vulnerability. An attacker<br />

may steal cookie-based authentication credentials from a legitimate user by sending<br />

malformed links to this web site.<br />

Solution: No solution is known at this time.<br />

CVE-2004-1665<br />

OpenCA < 0.9.1-9 Web Interface Form Input Field XSS<br />

<strong>PVS</strong> ID: 2267 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an Cross-Site Scripting (XSS)<br />

attack.\n\nThe remote host appears to be running OpenCA. It is reported that OpenCA<br />

versions up to and including 0.9.2-RC2 are prone to a cross-site scripting vulnerability<br />

when processing user inputs into the web form frontend. This issue may permit an attacker<br />

to execute hostile HTML code in the context of another user.<br />

Solution: Upgrade to version 0.9.1-9 or higher.<br />

CVE-2004-0787<br />

eZ Multiple Products Connection Saturation Remote DoS<br />

<strong>PVS</strong> ID: 2268 FAMILY: Web Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 569


Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host appears to be running eZ or eZphotoshare. It is reported that this software is<br />

vulnerable to a remote denial of service. An attacker may remotely crash eZphotoshare or<br />

eZ by establishing over 80 simultaneous connections to the server.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

PHPGroupWare < 0.9.16.003 Wiki Module XSS<br />

<strong>PVS</strong> ID: 2269 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host appears to be running PHPGroupWare, a groupware system implemented in<br />

PHP. This version is reported to be vulnerable to a cross-site scripting issue in the Wiki<br />

module. An attacker may steal cookie-based authentication credentials from a legitimate<br />

user by sending a malformed link to this web site.<br />

Solution: Upgrade to PHPGroupWare 0.9.16.003 or higher.<br />

CVE-2004-0875<br />

TYPSoft FTP Server Multiple DoS<br />

<strong>PVS</strong> ID: 2270 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

appears to be running TYPSoft FTP Server. It is reported that version up to and including<br />

1.11 are prone to multiple vulnerabilities.\n\n - A denial-of-service vulnerability when an<br />

authenticated user issues two 'RETR' request in a row, without actualy downloading the<br />

files.\n\n - A denial-of-service vulnerability when handling data passed to the 'APPE' and<br />

'DELE' commands via the same socket connection.\n\n - A denial-of-service vulnerability<br />

when handling a malformed 'ABORT' command.<br />

Solution: No solution is known at this time.<br />

CVE-2009-4105<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

SAFE TEAM Regulus Staff Accounts Password Hash Disclosure<br />

<strong>PVS</strong> ID: 2271 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to<br />

retrieve sensitive files or data.\n\nThe remote host seems to be running Regulus, a<br />

web accounting software implemented in PHP. It is reported that every version of<br />

Regulus up to and including 2.2-95 are prone to a staff accounts information<br />

disclosure vulnerability. Any user may query the 'staffile' from the web server and<br />

be served. This file contains information about the staff accounts including<br />

password hashes which are computed using DES 56 bit. Therefore staff users<br />

Family Internet Services 570


passwords can be easily derived from their hash using a dictionary-based brute<br />

force attack.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

SAFE TEAM Regulus Customers Accounts Password Hash Disclosure<br />

<strong>PVS</strong> ID: 2272 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to<br />

retrieve sensitive files or data.\n\nThe remote host seems to be running Regulus, a<br />

web accounting software implemented in PHP. It is reported that every version of<br />

Regulus up to and including 2.2-95 are prone to a customer accounts information<br />

disclosure vulnerability. The 'Update your password' action from the<br />

'custchoice.php' script permits any user to get the password hash for a given<br />

username or customer ID. The password hash, computed using DES 56 bit, is<br />

included in a hidden tag of the HTML file served by the web server. Therefore<br />

customer passwords can be easily derived from their hash using a dictionary-based<br />

brute force attack.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

SAFE TEAM Regulus Customer Statistics Connection Log Information Disclosure<br />

<strong>PVS</strong> ID: 2273 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host seems to be running Regulus, a web accounting software<br />

implemented in PHP. It is reported that every version of Regulus up to and including 2.2-95<br />

are prone to a customer statistics information disclosure vulnerability. The 'To see your<br />

connection logs' action from the 'custchoice.php' script permits any user to see the<br />

connection statistics for a given username or customer ID without requiring valid<br />

credentials.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mac OS X Multiple Vulnerabilities (<strong>Security</strong> Update 2004-09-07)<br />

<strong>PVS</strong> ID: 2274 FAMILY: Operating System Detection RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is missing Apple's <strong>Security</strong> Update 2004-09-07. This security update fixes the<br />

following components: CoreFoundation, IPSec, Kerberos, libpcap, lukemftpd,<br />

<strong>Network</strong>Config, OpenLDAP, OpenSSH, PPPDialer, rsync, Safari and tcpdump<br />

Family Internet Services 571


Solution: http://docs.info.apple.com/article.html?artnum<br />

CVE-2004-0823<br />

Serv-U FTP Server < 5.2.0.1 'STOU' Command Remote DoS<br />

<strong>PVS</strong> ID: 2275 FAMILY: FTP Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running Serv-U FTP server. There is a bug in the way this version handles<br />

the 'STOU' command, which is used to send files to a remote server. It is reported that<br />

Serv-U FTP server will crash if it receives certain 'STOU' requests. An attacker may<br />

connect to the remote server and issue a 'STOU' request to deny service to legitimate users.<br />

Solution: Upgrade to version 5.2.0.1 or higher.<br />

CVE-2004-1675<br />

Apache < 2.0.51 mod_ssl Rewrite Rules DoS<br />

<strong>PVS</strong> ID: 2276 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host appears to be running a version of Apache 2.x that is older than 2.0.51. It is<br />

reported that these versions of Apache are prone to a denial of service issue related to<br />

mod_ssl. An attacker may deny service to legitimate users if the remote server uses a<br />

'RewriteRule' to enable reverse proxying to a SSL origin server.<br />

Solution: Upgrade to version 2.0.51 or higher.<br />

CVE-2004-0751<br />

Oracle <strong>Security</strong> Alert #68<br />

<strong>PVS</strong> ID: 2277 FAMILY: Database RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host appears to be running a vulnerable version of Oracle Database Server. It is<br />

reported that Oracle Database Server version 8.1.7, 9.0.1.4, 9.0.1.5, 9.0.4, 9.2.0.4, 9.2.0.5<br />

and 10.1.0.2 are prone to multiple vulnerabilities including buffer overflow issues, PL/SQL<br />

injection, trigger abuse, character set conversion bugs and denial of service issues. An<br />

attacker may exploit these vulnerabilities to deny service to legitimate users or to execute<br />

arbitrary code on the remote server.<br />

Solution: Download and install the relevant patch from Oracle.<br />

CVE-2004-0638<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

PerlDesk < 2 pdesk.cgi lang Parameter Traversal Server-Side Script Execution<br />

Family Internet Services 572


<strong>PVS</strong> ID: 2278 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may be tricked into running an executable file.\n\nThe<br />

remote host is running perlDesk, a web-based help desk application implemented in Perl. It<br />

is reported that perlDesk is prone to a service-side script execution vulnerability. If an<br />

attacker manages to store a script on the remote server, he may execute it through the 'lang'<br />

URI parameter of perlDesk. Otherwise, he may use this vulnerability for information<br />

disclosure purposes.<br />

Solution: Upgrade to version 2 or higher.<br />

CVE-2004-1678<br />

TwinFTP < 1.0.3 R3 Server Directory Traversal File Access<br />

<strong>PVS</strong> ID: 2279 FAMILY: FTP Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a directory traversal flaw.\n\nThe remote<br />

host is running TwinFTP FTP Server. It is reported that TwinFTP is prone to a directory<br />

traversal issue. An attacker may read and write files outside the FTP server root directory<br />

with the FTP server process privileges.<br />

Solution: Upgrade to TwinFTP Enterprise or Standard 1.0.3 R3 or higher.<br />

CVE-2004-1679<br />

Turbo Seek < 1.7.2 tseekdir.cgi location Parameter Information Disclosure<br />

<strong>PVS</strong> ID: 2280 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running FocalMedia Turbo Seek, a web-based<br />

search Application for Unix. It is reported that Turbo Seek is prone to an information<br />

disclosure issue. An attacker may craft a malicious request for the tseekdir.cgi script and be<br />

served with the content of any file readable by the web server process.<br />

Solution: Upgrade to version 1.7.2 or higher.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla/Firefox Linux Installation Arbitrary File Overwrite<br />

<strong>PVS</strong> ID: 2281 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host seems to be running Mozilla or Firefox for<br />

Linux. It is reported that versions up to and include 0.9.3 of Firefox and up to and including<br />

1.7.2 of Mozilla are prone to an improper file permission issue in the installation process.<br />

Upon installation, several files are created with world-writable permissions. An attacker<br />

Family Internet Services 573


with interactive access to the host may corrupt these scripts and programs during the<br />

installation process. This vulnerability exists only in the Linux archive version. If you<br />

installed Firefox using your Linux distribution packaging system, the vulnerability is likely<br />

not present on the remote system.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-0906<br />

BEA WebLogic < 8.1.0 SP 3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2282 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is running BEA WebLogic. Multiple undisclosed vulnerabilities have been<br />

reported in every version of WebLogic up to and including 8.1.0 SP2. An attacker may<br />

exploit these issues to gain unauthorized access or to gather information about the remote<br />

host. BEA WebLogic 8.1 Service Pack 3 addresses these vulnerabilities.<br />

Solution: Upgrade to WebLogic 8.1.0 SP3 or higher.<br />

CVE-2004-2320<br />

Microsoft WinErr Version Check<br />

<strong>PVS</strong> ID: 2283 FAMILY: Operating System Detection RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Microsoft has a functionality in which error messages are sent to Microsoft Corp. <strong>PVS</strong> has<br />

just noted a network client sending such an error to Microsoft. According to the error<br />

message, the network client is running Microsoft version %L<br />

Solution: Depending on corporate policy, you may wish to disable Windows Error Messages.<br />

CVE Not available<br />

Outbound Microsoft WinErr Message<br />

<strong>PVS</strong> ID: 2284 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client has enabled automatic Windows Error Reporting. This functionality<br />

allows Microsoft to gather error reports from local clients. According to the error report,<br />

the remote client just had an error in %L and has sent an error report to Microsoft.<br />

realtime<br />

Solution: Ensure that such reporting is in alignment with existing corporate standards and policies.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 574


Mozilla Error Reporting Version Check<br />

<strong>PVS</strong> ID: 2285 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host has just sent an error report to Mozilla.org. According to the Mozilla error<br />

message, the remote host is running Mozilla version %L<br />

Solution: Ensure that this reporting is in alignment with existing corporate policies and standards.<br />

CVE Not available<br />

PHP Arbitrary File Upload<br />

<strong>PVS</strong> ID: 2286 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:14770<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a 'file upload' flaw.\n\nThe remote web<br />

server is configured to be PHP-enabled. It is reported that versions of PHP up to 5.0.2 and<br />

4.3.9 are prone to a file upload vulnerability. An attacker may upload an arbitrary file on<br />

the web server in the context of the PHP application. For your information, the server is<br />

running PHP version: \n %L<br />

Solution: Upgrade to version 4.3.9, 5.0.2 or higher.<br />

CVE Not available<br />

Mozilla-based Web Browser Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2287 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running a Mozilla-based web browser. It is reported that web browsers based<br />

on versions of Mozilla up to and including 1.7.2 are prone to multiple vulnerabilities<br />

including overflows and cross-site scripting issues. An attacker may execute arbitrary code<br />

remotely, steal cookie-based authentication credentials or gather intelligence about the host.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-0908<br />

Mozilla / Mozilla Thunderbird Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2288 FAMILY: SMTP Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a vulnerable version of Mozilla or Mozilla Thunderbird mail client. It is reported<br />

that this version of Mozilla or Mozilla Thunderbird is vulnerable to several flaws that may<br />

allow an attacker to execute arbitrary code on the remote host. To exploit this flaw, an<br />

attacker would need to send a rogue email to a victim on the remote host.<br />

Family Internet Services 575


Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-0903<br />

SnipSnap < 1.0b1 POST Request HTTP Response Splitting<br />

<strong>PVS</strong> ID: 2289 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTTP 'response splitting'<br />

vulnerability.\n\nThe remote host seems to be running SnipSnap, a weblog application<br />

implemented in Java. It is reported that versions of SnipSnap prior 1.0.0b1 are prone to a<br />

HTTP response splitting vulnerability. An attacker may influence how the website is<br />

served, cached and interpreted by the means of a malformed link to the web site that would<br />

alter the server HTTP headers.<br />

Solution: Upgrade to SnipSnap 1.0b1 or higher.<br />

CVE-2004-1470<br />

Apache < 2.0.51 ${ENVVAR} Local Overflow<br />

<strong>PVS</strong> ID: 2290 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a vulnerable version of Apache. It is reported that versions prior 2.0.51 are prone to<br />

a local buffer overflow when processing ${ENVVAR} constructs in .htaccess and<br />

httpd.conf files. An attacker with interactive access to the computer may use this flaw to<br />

execute arbitrary code in the context of the web server.<br />

Solution: Upgrade to Apache 2.0.51 or higher.<br />

CVE-2004-0747<br />

Apache < 2.0.51 mod_dav DAV LOCK Command Remote DoS<br />

<strong>PVS</strong> ID: 2291 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running a vulnerable version of Apache. It is reported that versions prior<br />

2.0.51 are prone to a remote denial of service issue. An attacker may issue a specific<br />

sequence of DAV LOCK commands to crash the process. If Apache is configured to use<br />

threads, it may completely crash the Apache process.<br />

Solution: Upgrade to Apache 2.0.51 or higher.<br />

CVE-2004-0809<br />

Apache < 2.0.51 IPv6 Remote Buffer Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 576


<strong>PVS</strong> ID: 2292 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a vulnerable version of Apache. It is reported that versions prior to 2.0.51 are prone<br />

to a remote buffer overflow when parsing an URI sent over IPv6. An attacker may use this<br />

vulnerability to execute arbitrary code on the remote host or to deny service to legitimate<br />

users.<br />

Solution: Upgrade to Apache 2.0.51 or higher.<br />

CVE-2004-0786<br />

myServer < 0.7.1 Directory Traversal Arbitrary File Access<br />

<strong>PVS</strong> ID: 2293 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running myServer 0.7.0 or older. There is a<br />

flaw in the remote version of this software that may allow an attacker to read arbitrary files<br />

on the remote host with the privileges of the web server process using malformed URI.<br />

Solution: Upgrade to version 0.7.1 or higher.<br />

CVE-2004-2516<br />

vBulletin authorize.php x_invoice_num Parameter SQL Injection<br />

<strong>PVS</strong> ID: 2294 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running a version of vBulletin, a forum application<br />

implemented in PHP, that is vulnerable to a SQL injection issue. It is reported that versions<br />

3.0.0 through to 3.0.3 are prone to this issue. An attacker may steal content from the<br />

underlying database or attack it.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-2695<br />

Mozilla / Firefox enablePrivilege Dialog Weakness<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2295 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection attack.\n\nThe remote host<br />

appears to be running Mozilla or Firefox. It is reported that versions up to and including<br />

0.9.3 of Firefox and up to and including 1.7.2 of Mozilla are prone to a security weakness<br />

in the enablePrivilege dialog that is displayed to authorize signed code execution. An<br />

attacker may display an arbitrary string in the security dialog to entice an user into<br />

executing a malicious script.<br />

Family Internet Services 577


Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Toshiba Software Auto-Update Detection<br />

<strong>PVS</strong> ID: 2296 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote Toshiba %L is running the Toshiba auto-update client (Pinger.exe) that<br />

automatically connects to the Internet and downloads software from the Toshiba Software<br />

Upgrade FTP site.solution<br />

Solution: N/A<br />

CVE Not available<br />

Real<strong>Network</strong> RealPlayer Version Detection<br />

<strong>PVS</strong> ID: 2297 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is running Real<strong>Network</strong>s RealPlayer Version %L<br />

Solution: N/A<br />

CVE Not available<br />

Microsoft Winerr Plaintext Report Detection<br />

<strong>PVS</strong> ID: 2298 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote Windows Client is reporting the following Windows error via the network \n<br />

%L<br />

Solution: Ensure that passing such reports via the Internet adheres to existing corporate policies.<br />

CVE Not available<br />

GNU Radius < 1.2.94 SNMP Request Remote DoS<br />

<strong>PVS</strong> ID: 2299 FAMILY: SNMP Traps<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host appears to be running GNU Radius, an open-source remote authentication<br />

dial-up service implementation. The running version is vulnerable to a remote denial of<br />

service when processing certain SNMP requests. As we determined the software version<br />

using its SNMP banner, it appears this option is being used.<br />

Solution: Upgrade to version 1.2.94 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 578


CVE-2004-0849<br />

GNU Radius < 1.2.94 SNMP Request Remote DoS<br />

<strong>PVS</strong> ID: 2300 FAMILY: SNMP Traps<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host appears to be running GNU Radius, an open-source remote authentication<br />

dial-up service implementation. The running version is vulnerable to a remote denial of<br />

service when processing certain SNMP requests. As we determined the software version<br />

using its SNMP banner, it appears that this option is being used.<br />

Solution: Upgrade to version 1.2.94 or higher.<br />

CVE-2004-0849<br />

Microsoft Internet Explorer 6 SV 1 XHTML Comment User Confirmation Bypass<br />

<strong>PVS</strong> ID: 2301 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a script injection attack.\n\nThe remote host<br />

is running Internet Explorer 6 SV1, the version that is part of Windows XP SP2. It is<br />

reported that the user confirmation asked before to load client-side JavaScript and ActiveX<br />

embedded in web pages can be trivially bypassed. An attacker may run malicious script on<br />

the remote host. For your information, the reported MSIE version number was: \n %L \n<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-1686<br />

Snitz Forum < 3.4.05 HTTP Response Splitting<br />

<strong>PVS</strong> ID: 2302 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTTP 'response splitting'<br />

vulnerability.\n\nThe remote host appears to be running Snitz Forum, a web forum<br />

application implemented in ASP. It is reported that versions of Snitz Forum prior 3.4.0.04<br />

are prone to a HTTP response splitting vulnerability. An attacker may influence how the<br />

website is served, cached and interpreted by the means of a malformed link to the web site<br />

that would alter the server HTTP headers.<br />

Solution: Upgrade to Snitz Forum 3.4.05 or higher.<br />

CVE-2004-1687<br />

HTML Comment 'href' Link Obfuscation<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2303 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 579


Description: The remote web server was observed responding to a web request with HTML code that<br />

consisted of a 'href' link obfuscated within the HTML comments. The 'href' link observed<br />

was: \n %L \n\nThe request which generated this response was: \n%P<br />

Solution: Whenever possible, remove information that attackers may find useful for future attacks.<br />

CVE Not available<br />

Xine-lib < 1.0 RC6a Heap and Stack Overflows<br />

<strong>PVS</strong> ID: 2304 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple buffer overflows.\n\nThe remote<br />

host is using a software linked again xine-lib, an open-source multimedia library. It is<br />

reported that versions up to 1.0 rc6a are vulnerable to multiple overflows in the DVD,<br />

subtitles and Video-CD modules. An attacker may craft a malicious multimedia file that<br />

may execute arbitrary code on the remote host if played with a xine-lib based software.<br />

Solution: Upgrade to Xine-lib 1.0 RC6a or higher.<br />

CVE-2004-1476<br />

YaBB Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2305 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a vulnerable version of YaBB. It is reported that versions up to and including 1<br />

Gold SP 1.3.1 are prone to multiple security flaws including administrator authentication<br />

bypassing and cross-site scripting issues. By crafting a malformed URL, an attacker may<br />

issue administrator commands or steal cookie-based authentication credentials from an<br />

unsuspecting user.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-2402<br />

Google Toolbar HTML Injection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2306 FAMILY: Web Clients RISK: HIGH NESSUS ID:17656<br />

Description: Synopsis : \n\nThe remote host is vulnerable to an HTML injection attack.\n\nThe remote<br />

host is running a vulnerable version of Google Toolbar. It is reported that versions prior to<br />

2.0.114.2 are vulnerable to an HTML injection issue in the ABOUT.HTML page. An<br />

attacker may inject malicious script code in this page. An unsuspecting user viewing this<br />

page will have the malicious code executed within a less restricted context. The reported<br />

version of GoogleToolbar is: \n %L<br />

Family Internet Services 580


Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-2475<br />

Rhinosoft DNS4Me Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2307 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running Rhinosoft DNS4Me, a dynamic DNS software for Windows<br />

systems. DNS4Me includes a small web server that can serve static content. It is reported<br />

that this embedded web server is prone to multiple security flaws including remote denial<br />

of service and cross-site scripting. An attacker can crash the server by sending an<br />

abnormally long request or steal cookie-based authentication credentials by sending a<br />

malformed link to this site.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-1691<br />

Tutos Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2308 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to SQL injection<br />

and cross-site scripting attacks.\n\nThe remote host is running a vulnerable version of<br />

Tutos. It is reported that Tutos 1.1.20040414 is prone to multiple input validation<br />

weaknesses. Due to insufficient user input validation, an attacker may carry out SQL<br />

injection or cross-site scripting attacks on this host.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-2162<br />

Apache < 2.0.52-dev 'Satisfy' Directive Access Control Bypass<br />

<strong>PVS</strong> ID: 2309 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running Apache Web Server 2.0.51. It is reported that<br />

this version of Apache is vulnerable to an access control bypass attack. This issue occurs<br />

when using the 'Satisfy' directive. An attacker may gain unauthorized access to restricted<br />

resources if access control relies on this directive.<br />

Solution: Upgrade to version 2.0.52-dev or higher.<br />

CVE-2004-0811<br />

Alt-N MDaemon Multiple Buffer Overflows<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 581


<strong>PVS</strong> ID: 2310 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Alt-N MDaemon, a SMTP/IMAP server for Windows operating systems. It is<br />

reported that versions up to and including 6.5.1 are prone to multiple buffer overflows. An<br />

attacker may deny service to legitimate users or execute arbitrary code on the remote<br />

server. The attacker needs to authenticate in order to exploit these vulnerabilities against<br />

the IMAP server but it doesn't need to do so against the SMTP server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-1546<br />

Alt-N MDaemon Multiple Buffer Overflows<br />

<strong>PVS</strong> ID: 2311 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Alt-N MDaemon, a SMTP/IMAP server for Windows operating systems. It is<br />

reported that versions up to and including 6.5.1 are prone to multiple buffer overflows. An<br />

attacker may deny service to legitimate users or execute arbitrary code on the remote<br />

server. The attacker needs to authenticate in order to exploit these vulnerabilities against<br />

the IMAP server but it doesn't need to do so against the SMTP server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-1546<br />

YaBB < Gold SP 1.3.2 Multiple Input Validation Vulnerabilities<br />

<strong>PVS</strong> ID: 2312 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running a vulnerable version of YaBB. It is reported that versions up to and<br />

including 1 Gold SP 1.3.1 are prone to multiple input validation vulnerabilities. Using these<br />

weaknesses, an attacker may influence how web content is served, cached and interpreted<br />

or perform cross-site scripting attacks to steal cookie-based authentication credentials from<br />

an unsuspecting user.<br />

Solution: Upgrade to YaBB Gold SP 1.3.2 or higher.<br />

CVE-2004-2139<br />

Host DHCP Address Release<br />

<strong>PVS</strong> ID: 2313 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host released its DHCP lease.<br />

Solution: N/A<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 582


CVE Not available<br />

EmuLive Server4 Authentication Bypass / DoS<br />

<strong>PVS</strong> ID: 2314 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running EmuLive Server4. It is reported that versions up to and including Build 7569 are<br />

prone to an authentication bypass vulnerability and remote denial of service. An attacker<br />

may directly access the administration console to bypass the authentication or deny service<br />

to legitimate users. Note that Build 7569 is only vulnerable to the denial of service issue.<br />

Solution: No solution is known at this time.<br />

CVE-2004-1695<br />

Subversion (SVN) Unreadable Path Metadata Information Disclosure<br />

<strong>PVS</strong> ID: 2315 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:14800<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running Subversion, an open-source file management<br />

product. According to the version number, the remote system is prone to an information<br />

disclosure issue. An attacker may gather information about the remote host using metadata<br />

in unreadable paths.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-0749<br />

Macromedia JRun Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2316 FAMILY: Web Servers RISK: HIGH NESSUS ID:14810<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\n The remote host is<br />

running JRun, a J2EE application server running on top of IIS or Apache. There are<br />

multiple vulnerabilities in the remote version of this software :\n- The JSESSIONID<br />

variable is not implemented securely. An attacker may use this flaw to guess the session id<br />

number of other users\n- There is a code disclosure issue that may allow an attacker to<br />

obtain the contents of a .cfm file by appending ';.cfm' to the file name\n- There is a buffer<br />

overflow vulnerability if the server connector is configured in 'verbose' mode. An attacker<br />

may exploit this flaw to execute arbitrary code on the remote host.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-2182<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Full Revolution aspWebCalendar calendar.asp SQL Injection<br />

Family Internet Services 583


<strong>PVS</strong> ID: 2317 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running Full Revolution aspWebCalendar, a web calendar<br />

application implemented in ASP. It is reported that this version of the software is prone to<br />

multiple SQL injection vulnerabilities. An attacker may access the underlying database in<br />

order to access sensitive information or to corrupt data.<br />

Solution: No solution is known at this time.<br />

CVE-2004-1552<br />

Full Revolution album.asp aspWebAlbum SQL Injection<br />

<strong>PVS</strong> ID: 2318 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running Full Revolution aspWebAlbum, a web photo album<br />

application implemented in ASP. It is reported that this version of the software is prone to<br />

multiple SQL injection vulnerabilities. An attacker may access the underlying database in<br />

order to access sensitive information or to corrupt data.<br />

Solution: No solution is known at this time.<br />

CVE-2004-1552<br />

Canon ImageRUNNER Printer Email Arbitrary Content Printing / DoS<br />

<strong>PVS</strong> ID: 2319 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:14819<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host seems to be a Canon ImageRUNNER printer, running an SMTP service. It is<br />

possible to send an email to the remote service and it will print its content. An attacker may<br />

use this flaw to send an endless stream of emails to the remote device and cause a denial of<br />

service by using all the paper in printer.<br />

Solution: Disable the email printing service using the web interface.<br />

CVE-2004-2166<br />

Generic Shell Detectors (Checkpoint Telnet)<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2320 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: A shell server was noted on the host. Typically, shells are used by remote users to manage<br />

operating systems. Shells that pass traffic in plaintext introduce a risk to confidentiality. In<br />

addition, many shells are used by malicious individuals as part of a Trojan program or<br />

remote buffer overflow exploit.<br />

Family Internet Services 584


Solution: Ensure that the remote shell is secured against data leakage and that it is a valid and<br />

approved means of managing the remote machine.<br />

CVE Not available<br />

Generic Shell Detectors (Windows 2000 Telnet)<br />

<strong>PVS</strong> ID: 2321 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: A shell server was noted on the host. Typically, shells are used by remote users to manage<br />

operating systems. Shells that pass traffic in plaintext introduce a risk to confidentiality. In<br />

addition, many shells are used by malicious individuals as part of a Trojan program or<br />

remote buffer overflow exploit.<br />

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid and<br />

approved means of managing the remote machine.<br />

CVE Not available<br />

Generic Shell Detectors (3COM SuperStack Telnet)<br />

<strong>PVS</strong> ID: 2322 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: A shell server was noted on the host. Typically, shells are used by remote users to manage<br />

operating systems. Shells that pass traffic in plaintext introduce a risk to confidentiality. In<br />

addition, many shells are used by malicious individuals as part of a Trojan program or<br />

remote buffer overflow exploit.<br />

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid and<br />

approved means of managing the remote machine.<br />

CVE Not available<br />

Identd Service Detection<br />

<strong>PVS</strong> ID: 2323 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running an ident (also known as 'auth') daemon. The 'ident'<br />

service provides sensitive information to potential attackers. It mainly says which accounts<br />

are running which services. This helps attackers to focus on valuable services (those owned<br />

by root). If you do not use this service, disable it.<br />

Solution: Under Unix systems, comment out the 'auth' or 'ident' line in /etc/inetd.conf and restart<br />

inetd.<br />

CVE Not available<br />

Identd Service Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2324 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 585


Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running an ident (also known as 'auth') daemon. The 'ident'<br />

service provides sensitive information to potential attackers. It mainly says which accounts<br />

are running which services. This helps attackers to focus on valuable services (those owned<br />

by root). If you do not use this service, disable it.<br />

Solution: Under Unix systems, comment out the 'auth' or 'ident' line in /etc/inetd.conf and restart<br />

inetd.<br />

CVE Not available<br />

Identd Service Detection<br />

<strong>PVS</strong> ID: 2325 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running an ident (also known as 'auth') daemon. The 'ident'<br />

service provides sensitive information to potential attackers. It mainly says which accounts<br />

are running which services. This helps attackers to focus on valuable services (those owned<br />

by root). If you do not use this service, disable it.<br />

Solution: Under Unix systems, comment out the 'auth' or 'ident' line in /etc/inetd.conf and restart<br />

inetd.<br />

CVE Not available<br />

Identd Service Detection<br />

<strong>PVS</strong> ID: 2326 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running an ident (also known as 'auth') daemon. The 'ident'<br />

service provides sensitive information to potential attackers. It mainly says which accounts<br />

are running which services. This helps attackers to focus on valuable services (those owned<br />

by root). If you do not use this service, disable it.<br />

Solution: Under Unix systems, comment out the 'auth' or 'ident' line in /etc/inetd.conf and restart<br />

inetd.<br />

Zinf .pls File Overflow<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2327 FAMILY: Peer-To-Peer File Sharing<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running 'Zinf' version 2.2.1. This version of Zinf is reported prone to a remote buffer<br />

overflow when downloading a malicious playlist.<br />

Family Internet Services 586


Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-0964<br />

BroadBoard Message Board Detection<br />

<strong>PVS</strong> ID: 2328 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running BroadBoard Message Board.<br />

Solution: Ensure that you are running the most recent version of BroadBoard.<br />

CVE-2004-1555<br />

BroadBoard Message Board SQL Injection<br />

<strong>PVS</strong> ID: 2329 FAMILY: Web Servers RISK: HIGH NESSUS ID:14828<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running a vulnerable version of BroadBoard. An attacker<br />

exploiting this flaw would be able to overwrite arbitrary files and/or execute system<br />

commands on the remote web server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-1555<br />

MegaBBS ASP Forum SQL Injection<br />

<strong>PVS</strong> ID: 2330 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running a vulnerable version of MegaBBS ASP Forum. An<br />

attacker exploiting this flaw would be able to overwrite arbitrary files and/or execute<br />

system commands on the remote web server.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

YahooPOPs! Proxy Detection<br />

<strong>PVS</strong> ID: 2331 FAMILY: POP Server<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is running the YahooPOPs! Proxy. This proxy is a gateway to send and<br />

receive Yahoo mail via a proxy. Such a configuration may bypass existing corporate<br />

policies regarding appropriate email usage.<br />

Solution: Ensure that the use of the YahooPOPs! proxy is appropriate for your environment.<br />

Family Internet Services 587


CVE-2004-1558<br />

Intellipeer User Account Enumeration<br />

<strong>PVS</strong> ID: 2332 FAMILY: POP Server<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:14829<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running a POP3 service that allows a remote attacker to<br />

determine when a user account is valid. An attacker exploiting this flaw would only need to<br />

connect to the port repeatedly while sending different user names. The server will alert the<br />

attacker whenever a valid username is sent. This vulnerability is known to affect Intellipeer<br />

POP3 server (versions less than or equal to 1.0.1).<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-2150<br />

@lex Guestbook livre_include.php Remote File Inclusion<br />

<strong>PVS</strong> ID: 2333 FAMILY: Web Servers RISK: HIGH NESSUS ID:14830<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the @lex guestbook. @lex is a web-based guestbook. Some versions of @lex are<br />

prone to a remote exploitation via PHP script upload.<br />

Solution: No solution is known at this time.<br />

CVE-2004-1554<br />

MySQL < 4.1.5 Bounded Parameter Overflow<br />

<strong>PVS</strong> ID: 2334 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:14831<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an flaw that allows attackers to execute<br />

arbitrary commands.\n\nYou are running a version of MySQL 4.1.x which is older than<br />

version 4.1.5. There is a flaw in the remote version of this software that may allow an<br />

attacker to execute arbitrary commands on the remote host with the privileges of the user<br />

running the mysqld process (typically 'mysql').<br />

Solution: Upgrade to at least version 4.1.5 or higher.<br />

CVE-2004-2149<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Icecast < 2.0.2 Multiple HTTP Headers Remote Overflow<br />

<strong>PVS</strong> ID: 2335 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 588


Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a vulnerable version of Icecast, an open-source streaming server. An attacker<br />

exploiting this flaw would only need to be able to connect to the Icecast HTTP port and<br />

send multiple (32) headers. A successful attack would give the attacker the ability to<br />

execute arbitrary code.<br />

Solution: Upgrade to Icecast 2.0.2 or higher.<br />

CVE-2004-1561<br />

Serendipity < 0.7-beta3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2336 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running a vulnerable version of Serendipity Web Log.<br />

Version 0.7beta1 is prone to both cross-site scripting (XSS) and SQL Injection attacks.<br />

Versions prior to 0.7beta3 should also be upgraded.<br />

Solution: Upgrade to version 0.7beta3 or higher.<br />

CVE-2004-2157<br />

Samba < 2.2.11 Remote Arbitrary File Access<br />

<strong>PVS</strong> ID: 2337 FAMILY: Samba<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:15394<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote Samba server, according to its version number ('%L'),<br />

may be vulnerable to a remote file access vulnerability.\n This vulnerability may allow an<br />

attacker to access arbitrary files that exist outside of the share's defined path.\nAn attacker<br />

needs a valid account to exploit this vulnerability.<br />

Solution: Upgrade to Samba 2.2.11 or higher.<br />

CVE-2004-0815<br />

Samba < 3.0.6 Remote Arbitrary File Access<br />

<strong>PVS</strong> ID: 2338 FAMILY: Samba<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:15394<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote Samba server, according to its version number, may<br />

be vulnerable to a remote file access vulnerability.\n This vulnerability may allow an<br />

attacker to access arbitrary files that exist outside of the share's defined path.\nAn attacker<br />

needs a valid account to exploit this vulnerability.<br />

Solution: Upgrade to Samba 3.0.6 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 589


CVE-2004-0815<br />

W-Agora Multiple Input Validation Vulnerabilities<br />

<strong>PVS</strong> ID: 2339 FAMILY: Web Servers RISK: HIGH NESSUS ID:15402<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running W-Agora, a web-based forum management software<br />

written in PHP.\nThere are multiple input validation flaws in the remote version of this<br />

software :\n\n - There is an SQL injection vulnerability in the file 'redir_url.php' that may<br />

allow an attacker to execute arbitrary SQL statements in the remote database ;\n - There is a<br />

cross site scripting issue that may allow an attacker to steal the cookies of the legitimate<br />

users of the remote site by sending them a specially malformed link ;\n - There is an HTTP<br />

response splitting vulnerability that may also allow an attacker to perform cross-site<br />

scripting attacks against the remote host.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-1565<br />

Kerio MailServer < 6.0.3 Unspecified Code Execution<br />

<strong>PVS</strong> ID: 2340 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:15404<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of Kerio MailServer prior to 6.0.3.\n\nThere is an undisclosed flaw in the<br />

remote version of this server that might allow an attacker to execute arbitrary code on the<br />

remote host.<br />

Solution: Upgrade to Kerio MailServer 6.0.3 or higher.<br />

CVE-2004-2441<br />

Local POP Account Detection<br />

<strong>PVS</strong> ID: 2341 FAMILY: SMTP Clients RISK: LOW NESSUS ID:Not Available<br />

Description: <strong>PVS</strong> observed at least one POP session originating from this server address. <strong>PVS</strong><br />

maintains the most recently seen POP account used to download email to this server.<br />

The detected user login string was:\n %L<br />

realtime<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

AJ-Fork Permission Weakness Information Disclosure<br />

<strong>PVS</strong> ID: 2342 FAMILY: Web Servers NESSUS ID:Not Available<br />

Family Internet Services 590


RISK:<br />

MEDIUM<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\n<strong>PVS</strong> observed that the remote webserver is running the AJ-Fork<br />

service version %L .\nThis version of AJ-Fork is vulnerable to a remote attack wherein the<br />

critical system files used by AJ-Fork can be read and written by any anonymous remote<br />

user. All versions of AJ-Fork up to and including version 167 are reported vulnerable.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-1573<br />

Bblog Blog Software Detection<br />

<strong>PVS</strong> ID: 2343 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\n<strong>PVS</strong> observed that the remote webserver is running Bblog. Bblog is a web blog<br />

that has, in the past, been vulnerable to SQL injection and Cross-Site Scripting (XSS)<br />

vulnerabilities.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-1570<br />

RealPlayer Multiple Remote Overflows<br />

<strong>PVS</strong> ID: 2344 FAMILY: Web Clients RISK: HIGH NESSUS ID:15395<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of RealPlayer that is vulnerable to multiple undisclosed remote buffer<br />

overflows.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-0190<br />

Mozilla/Firefox Linux Installation Arbitrary File Deletion<br />

<strong>PVS</strong> ID: 2345 FAMILY: Web Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:15408<br />

Description: Synopsis :\n\nThe remote Firefox browser can be tricked into deleting potentially sensitive<br />

files.\n\nThe remote host appears to be running Mozilla or Firefox. It is reported that<br />

versions up to 0.10.1 of Firefox are prone to an improper file permission issue when<br />

bookmarking a 'link'. An attacker crafting a malicious link can cause Firefox to overwrite<br />

or delete files within the download directory.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

Family Internet Services 591


CVE-2004-2225<br />

BugPort < 1.134 Remote Privilege Escalation<br />

<strong>PVS</strong> ID: 2346 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML injection attack.\n\nThe remote<br />

host is running a version of BugPort. BugPort is a PHP application that is used to track<br />

bugs and development items within an organization. According to its version number, this<br />

instance is vulnerable to a remote attack where a remote user can upload a malicious script<br />

or file in order to escalate privileges.<br />

Solution: Upgrade to at least version 1.134 or higher.<br />

CVE Not available<br />

Vypress < 4.0 First Message Field Overflow<br />

<strong>PVS</strong> ID: 2347 FAMILY: Peer-To-Peer File Sharing RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of Vypress Messenger, %L , that is vulnerable to a remote buffer<br />

overflow. An attacker exploiting this flaw would only need to be able to send a message or<br />

file to the Vypress service (listens on port 7777 by default). A successful exploit would<br />

allow the remote attacker the ability to overwrite and control the program's memory.<br />

Solution: Upgrade to version 4.0 or higher.<br />

CVE-2004-1574<br />

<strong>Network</strong>Active Web Server Resource Exhaustion DoS<br />

<strong>PVS</strong> ID: 2348 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running <strong>Network</strong>Active Web Server. <strong>Network</strong>Active Web Server is a small<br />

application that can be downloaded and run on any Windows desktop. An attacker<br />

exploiting this flaw would need to be able to connect to the server (typically on port 80)<br />

and send long requests. By sending enough requests, the attacker would be able to exhaust<br />

the resources of the Web server and cause it to crash.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

IBM DB2 < 8.2 Multiple Vulnerabilities (2)<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2349 FAMILY: Database RISK: HIGH NESSUS ID:15486<br />

Family Internet Services 592


Description: Synopsis :\n\nThe remote host is vulnerable to multiple flaws which impact confidentiality,<br />

integrity, and availability.\n\nThe remote host is running an IBM DB/2 Universal Database<br />

Server. It is reported that versions up to 8.2 may be vulnerable to multiple remote<br />

overflows. IBM DB/2 passes database versions over the network. <strong>PVS</strong> has noted that the<br />

DB/2 version is less than 8.2.<br />

Solution: Upgrade to version 8.2 or higher.<br />

CVE-2005-0417<br />

PHPLinks SQL Injection<br />

<strong>PVS</strong> ID: 2350 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running PHPLinks. PHPLinks is a PHP application that<br />

gathers 'links'. This version is prone to a bug where an attacker can cause the server to<br />

execute arbitrary script code. Further, the application is reported to be prone to SQL<br />

Injection flaws. An attacker exploiting either of these flaws would be able to run commands<br />

with the privileges of the Web Server.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

Jetty Web Server < 4.2.4 Directory Traversal Arbitrary File Access<br />

<strong>PVS</strong> ID: 2351 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a directory traversal flaw.\n\nThe remote<br />

host is running Jetty prior to version 4.2.4. Jetty is a Java web server that is downloadable<br />

off of the Internet and is currently bundled with some IBM applications. An attacker<br />

exploiting this flaw would only need to be able to request web pages from the Jetty server.<br />

A successful attack would allow the attacker to navigate outside the web directories and<br />

download potentially confidential data.<br />

Solution: Upgrade to version 4.2.4 or higher.<br />

CVE-2004-2478<br />

PHP-Fusion Database Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2352 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host is running a version of PHP-Fusion that is prone to a SQL injection issue.<br />

In versions prior to and including 4.01, an attacker may be able to manipulate and obtain<br />

potentially confidential data. In addition, there is also a flaw in the way that this version of<br />

PHP-Fusion handles upload code. An attacker exploiting this flaw would be able to upload<br />

malicious code that would then be run by unsuspecting web users. Finally, there is a flaw in<br />

the way that PHP-Fusion handles user-supplied input via the forum_search.php script. An<br />

Family Internet Services 593


attacker can potentially read confidential data from protected areas of the server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-2437<br />

Symantec Norton Antivirus Detection<br />

<strong>PVS</strong> ID: 2353 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running Symantec's Norton Antivirus version %L<br />

Solution: Ensure that you are running the latest version of Symantec NAV.<br />

CVE Not available<br />

PHP < 5.0.2 Open Bracket Memory Disclosure<br />

<strong>PVS</strong> ID: 2354 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running a version of PHP that is older than 5.0.2. This<br />

version has a bug that allows an attacker to insert an arbitrary value into an array. When the<br />

PHP parser handles the array, it may leak memory information back to the web client. A<br />

successful attacker would be able to retrieve information from the server that is potentially<br />

confidential in nature.<br />

Solution: Upgrade to PHP 5.0.2 or higher.<br />

CVE Not available<br />

DCP-Portal < 6.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2355 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is running a version of DCP-Portal that is reported prone to three distinct<br />

vulnerabilities. DCP-Portal is software that handles content management submitted by<br />

various clients or users. This version is vulnerable to Cross-Site Scripting (XSS), HTML<br />

injection, and HTML-splitting attacks. An attacker exploiting these flaws would be able to<br />

modify HTTP data and/or create malicious links or code for other visiting users to execute.<br />

Solution: Upgrade to version 6.1 or higher.<br />

CVE-2004-2511<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

WordPress BLOG < 1.2.1 wp-login.php HTTP Response Splitting<br />

<strong>PVS</strong> ID: 2356 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 594


Description: Synopsis :\n\nThe remote host is vulnerable to a HTTP 'splitting' attack.\n\nThe remote<br />

host is running WordPress BLOG. WordPress BLOG is a PHP software package that is<br />

used to generate HTML BLOGS via a web interface. This version is vulnerable to an<br />

HTTP-splitting attack where an attacker can insert CRLF characters and then entice an<br />

unsuspecting user into accessing the URL. The client will parse and possibly act on the<br />

secondary header that was supplied by the attacker.<br />

Solution: Upgrade to version 1.2.1 or higher.<br />

CVE-2004-1584<br />

Helix RealServer Remote Integer Handling DoS<br />

<strong>PVS</strong> ID: 2357 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS)<br />

attack.\n\nRealServer versions 9.0.4.958 and prior as well as 10.3.1.716 and prior are<br />

vulnerable to a remote Denial of Service (DoS) attack when they are presented with an<br />

invalid (negative) integer for the Content-Length field. An attacker exploiting this flaw<br />

would need to be able to connect to the RealServer (default port 554) and issue a<br />

malformed request. A successful attack would consume large amounts of memory on the<br />

RealServer, eventually ending in the unavailability of the server.<br />

Solution: Upgrade to version 9.0.4.960, 10.3.1.718 or higher.<br />

CVE-2004-0774<br />

Microsoft SMTP DNS Lookup Overflow (885881)<br />

<strong>PVS</strong> ID: 2358 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:15464<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of Microsoft SMTP server that is vulnerable to a buffer overflow<br />

issue.\n\nAn attacker may exploit this flaw to execute arbitrary commands on the remote<br />

host with the privileges of the SMTP server process.<br />

Solution: http://www.microsoft.com/technet/security/bulletin/MS04-035.mspx<br />

CVE-2004-0840<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Microsoft NNTP Component Remote Overflow (883935)<br />

<strong>PVS</strong> ID: 2359 FAMILY: Generic RISK: HIGH NESSUS ID:15465<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of Microsoft NNTP server that is vulnerable to a buffer overflow<br />

issue.\n\nAn attacker may exploit this flaw to execute arbitrary commands on the remote<br />

host with the privileges of the NNTP server process.<br />

Family Internet Services 595


Solution: http://www.microsoft.com/technet/security/bulletin/MS04-036.mspx<br />

CVE-2004-0840<br />

Microsoft NNTP Component Remote Overflow (883935)<br />

<strong>PVS</strong> ID: 2360 FAMILY: Generic RISK: HIGH NESSUS ID:15465<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of Microsoft NNTP server that is vulnerable to a buffer overflow<br />

issue.\n\nAn attacker may exploit this flaw to execute arbitrary commands on the remote<br />

host with the privileges of the NNTP server process.<br />

Solution: http://www.microsoft.com/technet/security/bulletin/MS04-036.mspx<br />

CVE-2004-0840<br />

MySQL < 3.23.59 Multiple Vulnerabilities (2)<br />

<strong>PVS</strong> ID: 2361 FAMILY: Database RISK: HIGH NESSUS ID:15449<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of the MySQL database that is older than 3.23.59.\n\nMySQL is a<br />

database that runs on both Linux/BSD and Windows platforms.\nThe remote version of this<br />

software is vulnerable to specially crafted ALTER TABLE SQL query that can be<br />

exploited to bypass some applied security restrictions or cause a denial of service.\n\nTo<br />

exploit this flaw, an attacker would need the ability to execute arbitrary SQL statements on<br />

the remote host.<br />

Solution: Upgrade to version 3.23.59 or higher.<br />

CVE-2004-0835<br />

MySQL < 4.0.21 Multiple Vulnerabilities (2)<br />

<strong>PVS</strong> ID: 2362 FAMILY: Database RISK: HIGH NESSUS ID:15449<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of the MySQL database that is older than 4.0.21.\n\nMySQL is a<br />

database that runs on both Linux/BSD and Windows platforms.\nThe remote version of this<br />

software is vulnerable to specially crafted ALTER TABLE SQL query that can be<br />

exploited to bypass some applied security restrictions or cause a denial of service.\n\nTo<br />

exploit this flaw, an attacker would need the ability to execute arbitrary SQL statements on<br />

the remote host.<br />

Solution: Upgrade to version 4.0.21 or higher.<br />

CVE-2004-0835<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Squid < 2.5.STABLE7 SNMP ASN.1 Parser Remote DoS<br />

Family Internet Services 596


<strong>PVS</strong> ID: 2363 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:15463<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote Squid caching proxy, according to its version number, may be vulnerable to a<br />

remote denial of service.\n\nThis flaw is caused due to an input validation error in the<br />

SNMP module.\n\nAn attacker can exploit this flaw to crash the server with a specially<br />

crafted UDP packet.<br />

Solution: Upgrade to Squid 2.5.STABLE7 or higher.<br />

CVE-2004-0918<br />

CJOverkill < 4.0.4 trade.php XSS<br />

<strong>PVS</strong> ID: 2364 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:15462<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack\n\nThe<br />

remote server runs a version of CJOverkill, a free traffic trading script that is as old as or<br />

older than version 4.0.3.\nThe remote version of this software is vulnerable to a cross-site<br />

scripting attack.\n\nAs a result of this vulnerability, it is possible for a remote attacker to<br />

create a malicious link containing script code that will be executed in the browser of an<br />

unsuspecting user when followed.\n\nThis may facilitate the theft of cookie-based<br />

authentication credentials as well as other attacks.<br />

Solution: Upgrade to version 4.0.4 or higher.<br />

CVE-2004-2193<br />

IceWarp Web Mail < 5.3.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2365 FAMILY: Web Servers RISK: HIGH NESSUS ID:15469<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running IceWarp Web Mail, a webmail solution available for the Microsoft Windows<br />

platform.\n\nThe remote version of this software is vulnerable to multiple input validation<br />

issues that may allow an attacker to compromise the integrity of the remote host.<br />

Solution: Upgrade to IceWarp Web Mail 5.3.0 or higher.<br />

CVE-2004-1674<br />

Gaim < 1.0.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2366 FAMILY: Internet Messengers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 597


Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host<br />

appears to be running Gaim, a popular open-source multi-protocol instant messenger. It is<br />

reported that this version of Gaim is prone to multiple vulnerabilities that may allow an<br />

attacker to disable this client remotely or to execute arbitrary code on the remote host.<br />

Solution: Update to Gaim 1.0.2 or higher.<br />

CVE Not available<br />

Serendipity < 0.7.0rc1 HTTP Response Splitting<br />

<strong>PVS</strong> ID: 2367 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:15543<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running Serendipity, a weblog written in PHP.\nThe remote version of this<br />

software is vulnerable to a HTTP response splitting vulnerability that may allow an attacker<br />

to perform a cross-site scripting attack against the remote host.<br />

Solution: Upgrade to Serendipity 0.7.0rc1 or higher.<br />

CVE-2004-1620<br />

MacOS X Application Crash Plaintext Report<br />

<strong>PVS</strong> ID: 2368 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote MacOS X Client is reporting a MacOS application error via the network.<br />

Solution: Ensure that passing such reports via the Internet is in accordance with existing corporate<br />

policies. The reports usually include crash dumps that may contain sensitive information<br />

about the remote host environment.<br />

CVE Not available<br />

MySQL < 4.0.21 Remote FULLTEXT Search DoS<br />

<strong>PVS</strong> ID: 2369 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:15477<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running a version of MySQL that is older than version 4.0.21.\nIt is<br />

vulnerable to a flaw that may allow an attacker to cause a Denial Of Service. An attacker<br />

can exploit this vulnerability by using the FULLTEXT search functionality.<br />

Solution: Upgrade to version 4.0.21 or higher.<br />

CVE-2004-0956<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 598


MySQL < 4.0.21 Remote GRANT Privilege Escalation<br />

<strong>PVS</strong> ID: 2370 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:15477<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running a version of MySQL that is older than<br />

version 4.0.21.\nIt is vulnerable to a flaw that may allow an attacker to gain access to<br />

unauthorized databases. An attacker can exploit this vulnerability if he has GRANT<br />

privileges on databases containing '_'.<br />

Solution: Upgrade to version 4.0.21 or higher.<br />

CVE-2004-0957<br />

PuTTY < 0.56 Remote SSH2_MSG_DEBUG Buffer Overflow<br />

<strong>PVS</strong> ID: 2371 FAMILY: SSH<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using a vulnerable version of PuTTY, a SSH client built for Linux and UNIX variants as<br />

well as Microsoft Windows operating systems. It has been reported that PuTTY does not<br />

safely handle SSH2_MSG_DEBUG messages. As a result, an attacker may be able to<br />

exploit it by setting up a mallicious SSH server. The version of PuTTY installed on the<br />

remote host is: %L<br />

Solution: Upgrade to PuTTY 0.56 or higher.<br />

CVE-2004-1008<br />

Bugzilla Authentication Bypass and Information Disclosure<br />

<strong>PVS</strong> ID: 2372 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:15562<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote server is running Bugzilla, a bug tracking system. There is a<br />

flaw in the remote installation of Bugzilla that may allow an attacker to bypass<br />

authentication or to get access to private bug reports.<br />

Solution: Upgrade to version 2.14.5, 2.16.2, 2.17.3 or higher.<br />

CVE-2004-1634<br />

Opera < 7.55.0 Cross-Domain Dialog Box Spoofing<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2373 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 599


Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is using a version of Opera that is prone to a security flaw where a malicious<br />

website can spoof a cross-domain dialog box that may entice the local user to enter<br />

information based on the bogus domain. For example, if the malicious website were to<br />

spoof a trusted domain, the user may enter confidential information into the dialog box.<br />

These sort of exploits are commonly referred to as 'Phishing' scams.<br />

Solution: Install Opera 7.55.0 or higher.<br />

CVE Not available<br />

Konqueror < 3.2.2-2 Cross-Domain Dialog Box Spoofing<br />

<strong>PVS</strong> ID: 2374 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is using a version of Konqueror that is prone to a security flaw where a<br />

malicious website can spoof a cross-domain dialog box that may entice the local user to<br />

enter information based on the bogus domain. For example, if the malicious website were<br />

to spoof a trusted domain, the user may enter confidential information into the dialog box.<br />

These sort of exploits are commonly referred to as 'Phishing' scams.<br />

Solution: Upgrade to version 3.2.2-2 or higher.<br />

CVE Not available<br />

Ability FTP Server Remote Buffer Overflow<br />

<strong>PVS</strong> ID: 2375 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the Ability FTP Server. It is reported that Ability FTP Server is prone to a remote<br />

buffer overflow via the STOR command. An attacker exploiting this flaw would only need<br />

to be able to craft and send a query to the FTP server on its service port (usually 21)<br />

Solution: No solution is known at this time.<br />

CVE-2004-1626<br />

NetCaptor Cross-Domain Dialog Spoofing<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2376 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running NetCaptor. NetCaptor is a web browser that is installed 'over'<br />

Internet Explorer, using the IE core engine while adding functionality to the GUI. This<br />

version of NetCaptor is vulnerable to a flaw where a malicious website can spoof a domain<br />

via the Dialog box. An attacker exploiting this flaw may be able to access confidential data<br />

from the client.<br />

Family Internet Services 600


Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Hummingbird Inetd FTP Server XCWD Command Remote Overflow<br />

<strong>PVS</strong> ID: 2377 FAMILY: FTP Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the Hummingbird Inetd FTP Server. It is reported that Hummingbird FTP Server is<br />

prone to a remote buffer in the XCWD command. An attacker exploiting this flaw would<br />

only need to be able to craft and send a query to the FTP server on its service port (usually<br />

21)<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-2728<br />

PHPList < 2.6.5 Multiple Remote Vulnerabilities<br />

<strong>PVS</strong> ID: 2378 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running PHPList. PHPList is an application that gathers and<br />

handles mailing and customer lists. This version is reported to be prone to multiple<br />

vulnerabilities that may include: Cross-Site scripting (XSS), SQL Injection, HTML<br />

Injection, and possibly others. An attacker exploiting these flaws would be able to run<br />

commands with the privileges of the Web Server.<br />

Solution: Upgrade to version 2.6.5 or higher.<br />

CVE-2004-2744<br />

Konqueror Cross-Domain Scripting<br />

<strong>PVS</strong> ID: 2379 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-site scripting (XSS) attack.\n\nThe<br />

remote host is using a version of Konqueror, a web browser, which is prone to a security<br />

flaw wherein a malicious website can spoof a third party domain within frames. An attacker<br />

exploiting this flaw would get the local user to 'trust' a remote spoofed domain. For<br />

example, if the malicious website were to spoof a trusted domain, the user may enter<br />

confidential information into the spoofed frame.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-0746<br />

Quicktime Multiple Integer Overflows<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 601


<strong>PVS</strong> ID: 2380 FAMILY: Web Clients RISK: HIGH NESSUS ID:17637<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running an older version of Quicktime player for Microsoft Windows. This version is<br />

vulnerable to a remote overflow. A remote attacker exploiting this flaw would need to<br />

create a malicious Quicktime file and entice the user to play it. A successful exploit would<br />

allow the attacker to execute random code within the context of the local machine.<br />

Additionally, there is a similar flaw within the Quicktime library that displays JPEG files.<br />

An attacker exploiting this second flaw would need to be able to convince a user into<br />

viewing a malicious JPEG file within the Quicktime viewer. Successful exploitation would<br />

result in arbitrary code being executed on the victim system.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-0988<br />

RealPlayer Skin File Handling Buffer Overflow<br />

<strong>PVS</strong> ID: 2381 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of RealPlayer which is vulnerable to an overflow via a malformed skin<br />

file. As skin files are downloaded, typically, without any sort of warning or prompt to the<br />

user, the remote attacker need only create a website with a malformed skins file and entice<br />

the user to visit the site.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-1094<br />

Caudium Web Server < 1.4.4 RC2 Malformed URI DoS<br />

<strong>PVS</strong> ID: 2382 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running Caudium Web Server. The version being run is vulnerable to an<br />

attack where a malformed URI causes the web server to stop responding to requests. An<br />

attacker exploiting this flaw would only need to be able to connect to the Webserver and<br />

issue an HTTP 'GET' request.<br />

Solution: Upgrade to version 1.4.4 RC2 or higher.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Cherokee Web Server < 0.4.17.1 auth_pam Authentication Format String<br />

<strong>PVS</strong> ID: 2383 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 602


Description: Synopsis :\n\nThe remote host is vulnerable to a remote 'format string' flaw.\n\nThe remote<br />

host is running the Cherokee web server. This version is vulnerable to a remote format<br />

string overflow. An attacker exploiting this flaw would only need to be able to connect to<br />

the web server and issue an HTTP 'GET' request. Upon successful exploitation, the attacker<br />

would be able to execute commands within the context of the web server.<br />

Solution: Upgrade to version 0.4.17.1 or higher.<br />

CVE-2004-1097<br />

MailEnable SMTP Server < 1.5.1 Undisclosed Vulnerabilities<br />

<strong>PVS</strong> ID: 2384 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:15611<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is running a version of MailEnable Professional that is older than version 1.5.1.<br />

The remote version of this software is known to be prone to an undisclosed vulnerability<br />

that has been fixed in version 1.5.1.<br />

Solution: Upgrade to version 1.5.1 or higher.<br />

CVE Not available<br />

ArGoSoft FTP Server < 1.4.2.2 Shortcut File Upload<br />

<strong>PVS</strong> ID: 2385 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running the ArGoSoft FTP Server. It is<br />

reported that ArGoSoft FTP Server is prone to a vulnerability that allows a shortcut link<br />

upload. An attacker exploiting this flaw may be able to have read and write access to any<br />

files and directories on the FTP server.<br />

Solution: Upgrade to version 1.4.2.2 or higher.<br />

CVE-2004-1428<br />

MailPost.exe Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2386 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:15626<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is using a version of TIPS MailPost that is vulnerable to several flaws.\nTIPS MailPost is<br />

an HTML form content email application designed to facilitate\nthe emailing of HTML<br />

form data to a third party.\nThere are various flaws in the remote version of this software<br />

:\n- A remote file enumeration vulnerability that may allow an attacker to determine if a file<br />

exists or not\n\n- Two cross-site scripting vulnerabilities that may allow an attacker to steal<br />

the cookies of third-parties users\n\n- An information disclosure vulnerability that may<br />

allow an attacker to gain more information about the remote host<br />

Family Internet Services 603


Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-1103<br />

IceWarp Web Mail < 5.3.1 Multiple Vulnerabilities (2)<br />

<strong>PVS</strong> ID: 2387 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:15643<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running IceWarp Web Mail, a webmail solution available for the Microsoft Windows<br />

platform.\n\nThe remote version of this software is vulnerable to multiple input validation<br />

issues that may allow an attacker to compromise the integrity of the remote host.<br />

Solution: Upgrade to IceWarp Web Mail 5.3.1 or higher.<br />

CVE Not available<br />

Moodle < 1.4.3 Glossary Module SQL Injection<br />

<strong>PVS</strong> ID: 2388 FAMILY: Web Servers RISK: HIGH NESSUS ID:15639<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running a version of the Moodle suite, an open-source course<br />

management system written in PHP, that is older than version 1.4.3.\nThe remote version<br />

of this software is vulnerable to a SQL injection issue in the 'glossary' module due to a lack<br />

of user input sanitization.<br />

Solution: Upgrade to Moodle 1.4.3 or higher.<br />

CVE-2004-1425<br />

Gallery < 1.4.4-p12 Unspecified HTML Injection<br />

<strong>PVS</strong> ID: 2389 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:15624<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML Injection attack.\n\nThe remote<br />

host is running the Gallery web-based photo album.\nThere is a flaw in the remote version<br />

of this software that may allow an attacker to inject arbitrary HTML tags in the remote web<br />

server.<br />

Solution: Upgrade to Gallery 1.4.4-pl2 or higher.<br />

CVE-2004-1106<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Helm Control Panel < 3.1.20 Multiple Input Validation Vulnerabilities<br />

<strong>PVS</strong> ID: 2390 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 604


Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL<br />

injection attack.\n\nThe remote host is using Helm Control Panel, a web based<br />

mangement system.\nThere are multiple flaws in the remote version of this<br />

software that may allow an attacker to perform a SQL injection or a cross-site<br />

scripting attack against the remote host.\nTo exploit these flaws, an attacker would<br />

need a valid login and password to log into the service.<br />

Solution: Upgrade to Helm 3.1.20 or higher.<br />

CVE-2004-1499<br />

cPanel Front Page Extension Installation Information Disclosure<br />

<strong>PVS</strong> ID: 2391 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of cPanel that is older or as old as version 9.9.1.\n\nThe remote version<br />

of this software is vulnerable to two flaws :\n- An information disclosure flaw if the<br />

FrontPage Extension is installed that may allow a local attacker to read arbitrary files on the<br />

remote host with the privileges of the 'cpsvrd' process.\n - A file ownership problem in the<br />

FrontPage Extension that may allow a local attacker to read the content of a .htaccess file<br />

;\n<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-1603<br />

cPanel Remote Backup Module Information Disclosure<br />

<strong>PVS</strong> ID: 2392 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18540<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running a version of cPanel which is older or<br />

as old as version 9.4.1.\nThe remote version of this software is vulnerable to a file<br />

disclosure flaw in the Remote Backup module that may allow a local attacker to read<br />

arbitrary files on the remote system.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-1603<br />

ProFTPD < 1.2.11 Remote User Enumeration<br />

<strong>PVS</strong> ID: 2393 FAMILY: FTP Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:15484<br />

Family Internet Services 605


Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote ProFTPd server is as old or older than 1.2.10.\nIt is possible to<br />

determine which user names are valid on the remote host based on timing analysis attack of<br />

the login procedure.\nAn attacker may use this flaw to set up a list of valid usernames for a<br />

more efficient brute-force attack against the remote host.<br />

Solution: Upgrade to version 1.2.11 or higher.<br />

CVE-2004-1602<br />

Mantis < 0.19.1 Multiple Information Disclosure Vulnerabilities<br />

<strong>PVS</strong> ID: 2394 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host appears to be running a vulnerable version of Mantis, a bug<br />

tracker web application written in PHP. It is reported that versions up to 0.19.0 are prone to<br />

multiple information disclosure vulnerabilities flaws that may allow an attacker to view<br />

stats of all projects or receive information from a project he was removed.<br />

Solution: Upgrade to Mantis version 0.19.1 or higher.<br />

CVE Not available<br />

SlimFTPd < 3.16 Multiple Command Remote Overfow<br />

<strong>PVS</strong> ID: 2395 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host<br />

seems to be running a vulnerable version of SlimFTPd, a small FTP server for Windows. It<br />

is reported that versions up to 3.15 are prone to a buffer overflow vulnerability that may<br />

allow an attacker to execute arbitrary code on this host. A attacker needs a valid FTP<br />

account on the server to exploit this vulnerability.<br />

Solution: Upgrade to SlimFTPd version 3.16 or higher.<br />

CVE-2004-2418<br />

Pavuk < 0.9.31 Multiple Unspecified Remote Buffer Overflows<br />

<strong>PVS</strong> ID: 2396 FAMILY: Web Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an flaw that allows attackers to execute<br />

arbitrary commands.\n\nThe remote host is using a version of Pavuk, a web spider, that is<br />

vulnerable to multiple unspecified buffer overflows. An attacker can construct a malicious<br />

website that is designed to trigger the vulnerability and run arbitrary code on the client<br />

machine.<br />

Family Internet Services 606


Solution: Upgrade to Pavuk 0.9.31 or higher.<br />

CVE Not available<br />

Samba < 3.0.8 Remote Wild Card DoS and QFILEPATHINFO Remote Overflow<br />

<strong>PVS</strong> ID: 2397 FAMILY: Samba<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote Samba<br />

server, according to its version number, may be vulnerable to a remote Denial Of Service<br />

vulnerability and a remote buffer overflow.\n The Wild Card DoS vulnerability may allow<br />

an attacker to make the remote server consume excessive CPU cycles.\nThe<br />

QFILEPATHINFO remote buffer overflow vulnerability may allow an attacker to execute<br />

code on the server.\n An attacker needs credentials to exploit those flaws.<br />

Solution: Upgrade to Samba 3.0.8 or higher.<br />

CVE-2004-0882<br />

eGroupWare < 1.0.0.006 JiNN Application Unspecified Vulnerability<br />

<strong>PVS</strong> ID: 2398 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is running eGroupWare, a web-based groupware solution. It is reported that<br />

versions prior 1.0.0.006 are prone to an unspecified vulnerability.<br />

Solution: Upgrade to eGroupWare 1.0.0.006 or higher.<br />

CVE-2005-1202<br />

EZ-IPupdate show_message() Remote Format String<br />

<strong>PVS</strong> ID: 2399 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote 'format string' flaw.\n\nThe remote<br />

host is using a version of EZ-IPupdate, a tool to update DNS records, that is vulnerable to a<br />

remote format string flaw. This vulnerability is present only if EZ-IPupdate runs in daemon<br />

mode<br />

Solution: No solution is known at this time.<br />

CVE-2004-0980<br />

04WebServer Multiple Remote Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2400 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 607


Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running a version of 04WebServer that is older or as old as version<br />

1.42.\nThe remote version of this software is vulnerable to cross-site scripting and log<br />

injection vulnerabilities.<br />

Solution: No solution is known at this time.<br />

CVE-2004-1513<br />

SquirrelMail < 1.4.4 decodeHeader HTML Injection<br />

<strong>PVS</strong> ID: 2401 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host allows attackers to bypass user authentication.\n\nThe<br />

remote host is running SquirrelMail, a webmail system written in PHP. Versions of<br />

SquirrelMail prior to 1.4.4 are vulnerable to an email HTML injection vulnerability. A<br />

remote attacker can exploit this flaw to gain access to users' accounts.<br />

Solution: Upgrade to SquirrelMail 1.4.4 or higher.<br />

CVE Not available<br />

Firefox < 1.0.0 IMG Tag Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2402 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:15712<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is using Firefox. The remote version of this software contains a security issue<br />

that may allow an attacker to determine existence of local files, cause a DoS and steal<br />

passwords (Windows only). The security vulnerability is due to the fact that Firefox does<br />

not handle correctly tags.<br />

Solution: Upgrade to Firefox 1.0.0 or higher.<br />

CVE-2005-0150<br />

BNC < 2.9.1 getnickuserhost IRC Server Response Buffer Overflow<br />

<strong>PVS</strong> ID: 2403 FAMILY: IRC Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of BNC, an IRC proxy that is vulnerable to a remote buffer overflow. An<br />

attacker may use this issue to execute code on remote server.<br />

Solution: Upgrade to version 2.9.1 or higher.<br />

CVE-2004-1052<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 608


BNC IRC Server < 2.9.1 Authentication Bypass<br />

<strong>PVS</strong> ID: 2404 FAMILY: IRC Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the<br />

bypassing of authentication.\n\nThe remote host is running a version of BNC,<br />

an IRC proxy, that is vulnerable to an authentication bypass vulnerability. An<br />

attacker may use this issue to access the remote IRC proxy server.<br />

Solution: Upgrade to version 2.9.1 or higher.<br />

CVE-2004-2612<br />

Skype < 1.0.0.100 CallTo URI Buffer Remote Overflow<br />

<strong>PVS</strong> ID: 2405 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using Skype, a peer to peer chat and VoIP software. The remote version of this software<br />

contains a security issue that may allow an attacker to execute code on the remote<br />

host.\nAn attacker needs to send a malicious URI to the user to exploit this flaw.<br />

Solution: Upgrade to Skype 1.0.0.100 or higher.<br />

Skype Detection (Host)<br />

CVE-2004-1114<br />

<strong>PVS</strong> ID: 2406 FAMILY: Internet Messengers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy\n\nThe remote host is using the Skype program, a peer to peer chat and<br />

VoIP software.<br />

Solution: Ensure that the use of this software is in accordance with organizational security policies.<br />

CVE Not available<br />

miniBB < 1.7f index.php user Parameter SQL Injection<br />

<strong>PVS</strong> ID: 2407 FAMILY: CGI RISK: HIGH NESSUS ID:15763<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is using the miniBB forum management system.\nAccording to<br />

its version number, this forum is vulnerable to a SQL injection attack that may allow an<br />

attacker to execute arbitrary SQL statements against the remote database.<br />

Solution: Upgrade to miniBB 1.7f or higher.<br />

CVE-2004-2456<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 609


Ipswitch IMail Server < 8.14.0 Delete Command Buffer Overflow<br />

<strong>PVS</strong> ID: 2408 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of Ipswitch IMail that is older than version 8.14.0. The remote version of<br />

this software is vulnerable to a buffer overflow when it processes the argument of the<br />

'delete' command. An attacker may exploit this flaw to execute arbitrary code on the remote<br />

host.<br />

Solution: Upgrade to IMail 8.14.0 or higher.<br />

CVE-2004-1520<br />

PowerPortal index.php index_page Parameter SQL Injection<br />

<strong>PVS</strong> ID: 2409 FAMILY: CGI RISK: HIGH NESSUS ID:15760<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is using PowerPortal, a content management system written in<br />

PHP. A vulnerability exists in the remote version of this product that may allow a remote<br />

attacker to perform a SQL injection attack against the remote host. An attacker may exploit<br />

this flaw to execute arbitrary SQL statements against the remote database and possibly to<br />

execute arbitrary commands on the remote host.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

phpScheduleIt < 1.0.1 Reservation.class.php Arbitrary Reservation Modification<br />

<strong>PVS</strong> ID: 2410 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:15772<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running phpScheduleIt, a web-based reservation<br />

system written in PHP. According to its banner, this version is reported vulnerable to an<br />

undisclosed issue that may allow an attacker to modify or delete phpScheduleIt<br />

reservations.<br />

Solution: Upgrade to version 1.0.1 or higher.<br />

CVE-2004-2469<br />

phpBB Login Form SQL Injection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2411 FAMILY: CGI RISK: HIGH NESSUS ID:15780<br />

Family Internet Services 610


Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running phpBB. There is a flaw in the remote software that may allow anyone to inject<br />

arbitrary SQL commands in the login form. An attacker may exploit this flaw to bypass the<br />

authentication of the remote host or execute arbitrary SQL statements against the remote<br />

database.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

CCProxy < 6.3 Logging Function HTTP GET Request Remote Overflow<br />

<strong>PVS</strong> ID: 2412 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:15774<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running CCProxy, an application proxy supporting many protocols (Telnet, FTP, WWW,<br />

and more). There is a buffer overflow in the remote version of this software that may allow<br />

an attacker to execute arbitrary code on the remote host with the privileges of the user<br />

running the proxy.<br />

Solution: Upgrade to CCProxy 6.3 or higher.<br />

CVE-2004-2416<br />

Digital Mappings Systems POP3 Server Remote Buffer Overflow<br />

<strong>PVS</strong> ID: 2413 FAMILY: POP Server RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Digital Mappings Systems POP3 server which is vulnerable to a remote buffer<br />

overflow. An attacker exploiting this flaw will be able to execute code on the remote host<br />

by sending a malicious username string.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-1533<br />

WebGUI < 6.2.9 Unspecified Vulnerability<br />

<strong>PVS</strong> ID: 2414 FAMILY: CGI RISK: HIGH NESSUS ID:15787<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is running WebGUI, a content management framework.\n\nThe remote version<br />

of this software is vulnerable to an undisclosed vulnerability.<br />

Solution: Upgrade to WebGUI 6.2.9 or higher.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

PHP-Kit < 1.6.04 Multiple Input Validation Vulnerabilities<br />

Family Internet Services 611


<strong>PVS</strong> ID: 2415 FAMILY: CGI RISK: HIGH NESSUS ID:15784<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running PHP-Kit, an open-source content management system written in PHP.\nThe<br />

remote version of this software is vulnerable to multiple flaws that may allow an attacker to<br />

execute arbitrary SQL statements against the remote database or to perform a cross-site<br />

scripting attack.<br />

Solution: Upgrade to PHPKit 1.6.04 or higher.<br />

CVE-2006-1773<br />

phpMyAdmin Detection<br />

<strong>PVS</strong> ID: 2416 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running phpMyAdmin, an open-source software written in PHP to<br />

handle the administration of MySQL over the Web.\nThe remote host is running<br />

phpMyAdmin %L.<br />

Solution: N/A<br />

CVE Not available<br />

phpMyAdmin < 2.6.0-p13 Multiple XSS<br />

<strong>PVS</strong> ID: 2417 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:15770<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running phpMyAdmin, an open-source software written in PHP to handle the<br />

administration of MySQL over the Web.\nThis version is vulnerable to cross-site scripting<br />

attacks through multiple scripts.\n\n With a specially crafted URL, an attacker may use the<br />

remote host to perform a cross site scripting attack.<br />

Solution: Upgrade to phpMyAdmin 2.6.0-pl3 or higher.<br />

CVE-2004-1055<br />

phpMyAdmin sql.php Traversal Arbitrary File Access<br />

<strong>PVS</strong> ID: 2418 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11116<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running phpMyAdmin, an open-source<br />

software written in PHP to handle the administration of MySQL over the Web.\nIt is<br />

possible to make the remote phpMyAdmin installation read arbitrary data on the remote<br />

host by using a malformed URL.\nAn attacker may use this flaw to read /etc/passwd or any<br />

file that the web server has the right to access.<br />

Family Internet Services 612


Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2001-0478<br />

phpMyAdmin < 2.5.6-rc1 Traversal Arbitrary File Access (2)<br />

<strong>PVS</strong> ID: 2419 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:12041<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running phpMyAdmin, an open-source<br />

software written in PHP to handle the administration of MySQL over the Web.\nIt is<br />

possible to make the remote phpMyAdmin installation read arbitrary data on the remote<br />

host by using a malformed URL.\nAn attacker may use this flaw to read /etc/passwd or any<br />

file that a web server has the right to access.<br />

Solution: Upgrade to phpMyAdmin 2.5.6-rc1 or higher.<br />

CVE-2004-0129<br />

phpMyAdmin < 2.5.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2420 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11761<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running phpMyAdmin, an open-source software written in<br />

PHP to handle the administration of MySQL over the Web.\nThe remote version of this<br />

software is vulnerable to several flaws :\n- It may be tricked into disclosing the physical<br />

path of the remote PHP installation\n- It is vulnerable to cross-site scripting, which may<br />

allow an attacker to steal the cookies of your users\n - It is vulnerable to a flaw that may<br />

allow an attacker to list the content of arbitrary directories on the remote server.\nAn<br />

attacker may use these flaws to gain more knowledge about the remote host and therefore<br />

set up more complex attacks against it.<br />

Solution: Upgrade to phpMyAdmin 2.5.2 or higher.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

phpMyAdmin < 2.6.0-p12 Multiple Remote Command Execution<br />

<strong>PVS</strong> ID: 2421 FAMILY: CGI RISK: HIGH NESSUS ID:11761<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an arbitrary 'command insertion'<br />

flaw.\n\nThe remote host is running phpMyAdmin, an open-source software written in PHP<br />

to handle the administration of MySQL over the Web.\nThe remote version of this software<br />

is vulnerable to arbitrary command execution due to a lack of user-supplied data<br />

sanitization.\n<br />

Solution: Upgrade to phpMyAdmin 2.6.0-pl2 or higher.<br />

Family Internet Services 613


CVE-2004-2630<br />

Invision PowerBoard < 2.0.3 SQL Injection<br />

<strong>PVS</strong> ID: 2422 FAMILY: CGI RISK: HIGH NESSUS ID:18011<br />

Description: The remote host is running Invision Power Board, a CGI suite designed to set up a bulletin<br />

board system on the remote web server.\nA vulnerability has been discovered in the remote<br />

version of this software that may allow unauthorized users to inject SQL commands in the<br />

remote SQL database.\n An attacker may use this flaw to gain the control of the remote<br />

database and possibly to overwrite files on the remote host.\n\nIn addition, a remote HTML<br />

injection flaw has been identified within \nInvision Power Board. An attacker exploiting<br />

this flaw would be\nable to control the way that the website is presented. In order<br />

to\nexploit such a vulnerability, the attacker would need to be able to\nconvince a user to<br />

visit a malicious website.<br />

Solution: Upgrade to version 2.0.3 or higher.<br />

CVE-2004-1531<br />

Nucleus CMS Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2423 FAMILY: CGI RISK: HIGH NESSUS ID:15788<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running Nucleus CMS, an open-source content management<br />

system.\nThe remote version of this software is vulnerable to various flaws that may allow<br />

an attacker to perform a cross-site scripting attack using the remote host and to perform a<br />

SQL injection attack on the remote database.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

OmniWeb Browser Cross-Domain Dialog Box Spoofing<br />

<strong>PVS</strong> ID: 2424 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is using Omniweb, an alternative web browser for the MacOS platform.\nThere<br />

is a cross-domain dialog box spoofing vulnerability affecting the remote version of this<br />

software. An attacker may exploit this flaw to trick a user into downloading a file from a<br />

third party site.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Cyrus IMAPD < 2.2.10 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 614


<strong>PVS</strong> ID: 2425 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nAccording to its<br />

banner, the remote Cyrus IMAPD server is vulnerable to a pre-login buffer overflow. Cyrus<br />

IMAP server is also vulnerable to three other buffer overflows after authentication. An<br />

attacker with or without a valid login could exploit these issues, and would be able to<br />

execute arbitrary commands as the owner of the Cyrus process.<br />

Solution: Upgrade to Cyrus IMAPD 2.2.10 or higher.<br />

CVE-2004-1067<br />

Nullsoft Winamp < 5.0.7 IN_CDDA.dll Remote Buffer Overflow<br />

<strong>PVS</strong> ID: 2426 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote client is<br />

running a version of the Nullsoft Winamp media player that may be vulnerable to a remote<br />

buffer overflow. This vulnerability may be used to remotely execute arbitrary code on the<br />

host by invoking a malicious playlist. IN_CDDA.dll will fail to parse it correctly and an<br />

attacker will be able to exploit the buffer overflow.<br />

Solution: Upgrade to Winamp 5.0.7 or higher.<br />

CVE-2004-1119<br />

Van Dyke SecureCRT < 4.1.9 Telnet URI Remote Command Execution<br />

<strong>PVS</strong> ID: 2427 FAMILY: SSH<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using a vulnerable version of SecureCRT, a SSH/Telnet client built for Microsoft Windows<br />

operating systems. It has been reported that SecureCRT does not safely check the protocol<br />

handler. As a result, an attacker may be able to exploit it by setting up a malicious SMB<br />

share.<br />

Solution: Upgrade to SecureCRT 4.1.9 or higher.<br />

CVE-2004-1541<br />

ProZilla Multiple Remote Buffer Overflows<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2428 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is using Prozilla, a download accelerator for Linux and Unix systems. The remote version<br />

of this software contains multiple security issues that may allow an attacker to execute code<br />

on the remote host.\nAn attacker needs to create a malicious HTTP server and entice the<br />

user to download a file on this server.<br />

Family Internet Services 615


Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-1120<br />

AppServ Open Project Remote Insecure Default Password<br />

<strong>PVS</strong> ID: 2429 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote MySQL server appears to allow connections as root without a<br />

password. AppServ Open Project, an installation utility for APACHE/PHP/MySQL under<br />

Windows, creates a passwordless database by default. Anyone can log into the database and<br />

change data or increase their privileges.<br />

Solution: Connect to the remote MySQL database and set a password.<br />

CVE-2004-1532<br />

Alt-N MDaemon File Creation Local Privilege Escalation<br />

<strong>PVS</strong> ID: 2430 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a local buffer overflow.\n\nThe remote host<br />

is running ALT-N MDaemon, a mail server for Microsft Windows. There is a local<br />

privilege escalation vulnerability in the remote version of this software that may allow a<br />

local attacker to execute arbitrary code on the remote host with the SYSTEM privileges.<br />

Solution: No solution is known at this time.<br />

CVE-2004-2504<br />

Brooky CubeCart < 2.0.2 index.php cat_id Parameter SQL Injection<br />

<strong>PVS</strong> ID: 2431 FAMILY: CGI RISK: HIGH NESSUS ID:15442<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is using Brooky CubeCart, an online storefront application<br />

written in PHP. A vulnerability exists in the remote version of this product that may allow a<br />

remote attacker to perform a SQL injection attack against the remote host. An attacker may<br />

exploit this flaw to execute arbitrary SQL statements against the remote database and<br />

possibly execute arbitrary commands on the remote host.<br />

Solution: Upgrade to Brooky CubeCart 2.0.2 or higher.<br />

CVE-2004-1580<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Youngzsoft CMailServer < 5.2.1 Multiple Remote Vulnerabilities<br />

<strong>PVS</strong> ID: 2432 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 616


Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running YoungZSoft CMail Server, a mail server for<br />

Microsoft Windows. There are multiple remote vulnerabilities such as buffer overflows,<br />

SQL injection, and HTML injection in the remote version of this software that may allow<br />

an attacker to execute arbitrary code on the remote host.<br />

Solution: Upgrade to version 5.2.1 or higher.<br />

CVE-2004-1129<br />

KorWeblog < 1.6.2 Remote Directory Listing<br />

<strong>PVS</strong> ID: 2433 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is using KorWeblog, a web-based log application written in<br />

PHP. A vulnerability exists in the remote version of this product that may allow a remote<br />

attacker to disclose directory listings. Information disclosures could help the attacker in<br />

further attacks.<br />

Solution: Upgrade to version 1.6.2 or higher.<br />

CVE-2004-1427<br />

Open DC Hub RedirectAll Value Remote Buffer Overflow<br />

<strong>PVS</strong> ID: 2434 FAMILY: Peer-To-Peer File Sharing<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of Open DC Hub, a peer to peer file sharing application, that is<br />

vulnerable to a remote buffer overflow. A successful exploit would allow a remote attacker<br />

to execute code on the remote host. It must be noted that the remote attacker needs<br />

administrative access to this application.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-1127<br />

MailEnable < 1.53 IMAP Service Multiple Remote Pre-Authentication Buffer Overflows<br />

<strong>PVS</strong> ID: 2435 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:15852<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of MailEnable Professional that is older than version 1.53. The remote<br />

version of this software is known to be prone to multiple remote buffer overflow<br />

vulnerabilities that have been fixed in version 1.53.<br />

Solution: Upgrade to version 1.53 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 617


CVE-2004-2501<br />

WS_FTP Server < 5.04 Multiple Vulnerabilities (2)<br />

<strong>PVS</strong> ID: 2436 FAMILY: FTP Servers RISK: HIGH NESSUS ID:15857<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThis host is running a<br />

vulnerable version of WS_FTP Server. Versions up to and including 5.03 are reported<br />

prone to multiple buffer overflows that may be used by an attacker to execute arbitary code<br />

on the remote system.<br />

Solution: Upgrade to version 5.04 or higher.<br />

CVE-2004-1135<br />

JanaServer < 2.4.5 Multiple Remote DoS<br />

<strong>PVS</strong> ID: 2437 FAMILY: Web Servers RISK: HIGH NESSUS ID:15862<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running a version of JanaServer that is vulnerable to various denial of service<br />

issues.\nAn attacker may exploit these vulnerabilities by sending a malformed request to<br />

the remote service and cause it to enter an infinite loop, thus refusing connections and using<br />

100% of the CPU of the remote host.<br />

Solution: Upgrade to JanaServer 2.4.5 or higher.<br />

CVE Not available<br />

Mercury Mail Remote IMAP Stack Buffer Overflow<br />

<strong>PVS</strong> ID: 2438 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Mercury Mail server, an IMAP server for Windows operating systems. It is<br />

reported that versions up to and including 4.01 are prone to stack buffer overflow<br />

vulnerabilities. An authenticated attacker may execute arbitrary code on the remote server.<br />

The attacker needs to authenticate in order to exploit these vulnerabilities against the IMAP<br />

server.<br />

Solution: No solution is known at this time.<br />

CVE-2004-1211<br />

YaBB Shadow BBCode Tag XSS<br />

<strong>PVS</strong> ID: 2439 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:15859<br />

Family Internet Services 618


Description: Synopsis :\n\nThe remote host is vulnerable to a script injection attack\n\nThe remote host<br />

is using the YaBB web forum software.\nAccording to its version number, the remote<br />

version of this software is vulnerable to JavaScript injection issues using shadow or glow<br />

tags. This may allow an attacker to inject hostile JavaScript into the forum system to steal<br />

cookie credentials or misrepresent site content. When the form is submitted the malicious<br />

JavaScript will be incorporated into dynamically generated content.<br />

Solution: Upgrade to YaBB 1 Gold SP 1.4 or higher.<br />

CVE Not available<br />

Post-Nuke pnTresMailer Directory Traversal Arbitrary File Access<br />

<strong>PVS</strong> ID: 2440 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:15858<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a directory traversal flaw.\n\nThe remote<br />

host is running a version of the pnTresMailer PostNuke module that is vulnerable to a<br />

directory traversal attack.\nAn attacker may use this flaw to read arbitrary files on the<br />

remote web server with the privileges of the web server process.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-1205<br />

Paros Web Proxy Detection<br />

<strong>PVS</strong> ID: 2441 FAMILY: Policy RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote host is running Paros version: %L \n \n Paros is a web<br />

proxy that is used to test the security of web applications and servers. A remote user<br />

running Paros can surrepititiously test the web server for SQL injection, cross-site<br />

scripting, buffer overflows, and more.<br />

Solution: Ensure that the remote Paros server is authorized for use within your environment.<br />

CVE Not available<br />

Visionael Scanner Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2442 FAMILY: Policy RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote host is running Visionael Scanner. Visionael scanner is a<br />

network discovery and penetration testing tool. The presence of this tool typically indicates<br />

that someone is scanning the network for vulnerabilities.<br />

Solution: Ensure that the remote Visionael server is authorized for use within your environment.<br />

Family Internet Services 619


CVE Not available<br />

Make Love Not Spam Screen Saver Detection<br />

<strong>PVS</strong> ID: 2443 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote host is running the 'Make Love Not Spam' screensaver.<br />

This screensaver, downloaded from Lycos, participates in a Denial of Service (DoS) attack<br />

against known spammers.<br />

Solution: Ensure that running this client is within acceptable use.<br />

CVE Not available<br />

Mac OS X Multiple Vulnerabilities (<strong>Security</strong> Update 2004-12-02)<br />

<strong>PVS</strong> ID: 2444 FAMILY: Operating System Detection RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is missing <strong>Security</strong> Update 2004-12-02. This security update contains a number<br />

of enhancements for the following programs :\n\n - Apache\n - Apache2\n - AppKit\n -<br />

Cyrus IMAP\n - HIToolbox\n - Kerberos\n - Postfix\n - PSNormalizer\n - QuickTime<br />

Streaming Server\n - Safari\n - Terminal<br />

Solution: http://docs.info.apple.com/article.html?artnum<br />

CVE-2004-1089<br />

PAFileDB Multiple Information Disclosure Vulnerabilities<br />

<strong>PVS</strong> ID: 2445 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:15911<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is using PAFileDB.\nAccording to its version number, the<br />

remote version of this software is vulnerable to path and password hash disclosure. This<br />

may allow an attacker to perform brute force attack on the password hash and gain access<br />

to account information.<br />

Solution: No solution is known at this time.<br />

CVE-2004-1219<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

ViewCVS < 1.0-dev Multiple Unspecified Vulnerabilities<br />

<strong>PVS</strong> ID: 2446 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 620


Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is using the ViewCVS, a tool to browse CVS repositories.\nAccording to its<br />

version number, the remote version of this software is vulnerable to multiple unspecified<br />

vulnerabilities.<br />

Solution: Upgrade to version 1.0-dev or higher.<br />

CVE-2004-0915<br />

PHP Live! < 2.8.2 Remote Configuration File Include<br />

<strong>PVS</strong> ID: 2447 FAMILY: CGI RISK: HIGH NESSUS ID:15928<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a script injection attack.\n\nThe remote host<br />

is running PHP Live!, a live support system for web sites.\nThe remote version of this<br />

software contains an unspecified flaw that may allow an attacker to include a configuration<br />

file hosted on a third party server.\nAn attacker may exploit this flaw to execute arbitrary<br />

PHP code on the remote host.<br />

Solution: Upgrade to version 2.8.2 or higher.<br />

CVE-2004-2485<br />

Squid Proxy Failed DNS Lookup Random Error Messages Information Disclosure<br />

<strong>PVS</strong> ID: 2448 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:15929<br />

Description: Synopsis :\n\nThe remote proxy can be tricked into disclosing portions of its<br />

memory.\n\nThe remote host running a Squid proxy on this port.\nThere is a vulnerability<br />

in the remote version of this software that may allow an attacker to disclose the content of<br />

its memory by causing the use of a freed pointer.<br />

Solution: Upgrade to Squid 2.5.STABLE8 or 3.0-PRE4 or apply the vendor patches.<br />

CVE-2004-2479<br />

GNU WGet Multiple Remote Vulnerabilities<br />

<strong>PVS</strong> ID: 2449 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is using a version of wget that contains bugs that may allow a malicious to server to<br />

overwrite or inject data in files or perform a directory traversal.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-1487<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 621


OpenText FirstClass HTTP Daemon Search DoS<br />

<strong>PVS</strong> ID: 2450 FAMILY: Web Servers RISK: HIGH NESSUS ID:15934<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running OpenText FirstClass, a web based unified messaging system.\nThe<br />

remote version of this software is vulnerable to an unspecified Denial of Service attack that<br />

may allow an attacker to disable this service remotely.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-2496<br />

IlohaMail < 0.8.14-RC1 Unspecified Vulnerability<br />

<strong>PVS</strong> ID: 2451 FAMILY: CGI RISK: HIGH NESSUS ID:15935<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe target is running<br />

at least one instance of IlohaMail version 0.8.13 or earlier.\nThe remote version of this<br />

software is vulnerable to an unspecified vulnerability announced by the vendor.<br />

Solution: Upgrade to IlohaMail version 0.8.14RC1 or higher.<br />

CVE-2004-2500<br />

phpMyAdmin < 2.6.1-pl1 Remote Command Execution<br />

<strong>PVS</strong> ID: 2452 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an flaw that allows attackers to execute<br />

arbitrary commands.\n\nThe remote host is running phpMyAdmin, an open-source software<br />

written in PHP to handle the administration of MySQL over the Web.\nThe remote version<br />

of this software is vulnerable to arbitrary command execution due to a lack of user-supplied<br />

data sanitization.\nIn addition, the remote host is vulnerable to multiple remote Cross-Site<br />

Scripting (XSS) flaws. An attacker exploiting these flaws would need to be able to<br />

convince a user into clicking on a malicious URL. Upon successful exploitation, the<br />

attacker would be able to steal credentials or execute code within the browser.\nThirdly, the<br />

remote host is vulnerable to a flaw in the way that it handles user-supplied variables that<br />

are used within included files. An attacker exploiting this flaw would pass malicious data to<br />

the server that the server would then include within the executing script code. A successful<br />

exploit would result in the attacker being able to execute arbitrary code on the server.<br />

Solution: Upgrade to phpMyAdmin 2.6.1-pl1 or higher.<br />

CVE-2005-0543<br />

phpDig < 1.8.5 Unspecified Vulnerability<br />

<strong>PVS</strong> ID: 2453 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:15949<br />

Family Internet Services 622


Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running phpDig, an open-source search engine<br />

written in PHP.\nThe remote version of this software is vulnerable to a flaw that may allow<br />

an attacker to tamper with the integrity of the remote host.<br />

Solution: Upgrade to version 1.8.5 or higher.<br />

CVE Not available<br />

Citadel/UX Remote Format String<br />

<strong>PVS</strong> ID: 2454 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Citadel/UX, a BBS software for Unix systems.\nThere is a format string issue in<br />

the remote version of this software that may be exploited by an attacker to execute arbitrary<br />

commands on the remote host. The remote version of Citadel/UX is also known to be<br />

vulnerable to a buffer overflow in the way that select() function is performed.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Nullsoft Winamp Large MP4 / M4A File Remote DoS<br />

<strong>PVS</strong> ID: 2455 FAMILY: Generic RISK: LOW NESSUS ID:15952<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using WinAMP, a popular media player that handles many files format (mp3, wavs and<br />

more).\nThe remote version of this software is vulnerable to a denial of service<br />

vulnerability when it processes malformed .mp4 and .m4a files. An attacker may exploit<br />

this flaw by sending malformed files to a victim on the remote host.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-1396<br />

Serendipity < 0.7.1 compat.php searchTerm Parameter XSS<br />

<strong>PVS</strong> ID: 2456 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:15914<br />

Description: The remote host is running Serendipity. Serendipity is a blogging software that is<br />

implemented in PHP. This version of Serendipity is vulnerable to a remote Cross-Site<br />

Scripting (XSS) attack.<br />

Solution: Upgrade to Serendipity 0.7.1 or higher.<br />

CVE-2004-2525<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 623


PHPGroupWare Multiple XSS and SQL Injection Vulnerabilities<br />

<strong>PVS</strong> ID: 2457 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host seems to be running PHPGroupWare, a groupware system<br />

implemented in PHP. This version is reported to be vulnerable to a cross-site scripting issue<br />

and a SQL injection vulnerability. An attacker may gain access to unauthorized information<br />

or may steal cookie-based authentication credentials from a legitimate user by sending the<br />

user a malformed link to this web site.<br />

Solution: No solution is known at this time.<br />

CVE-2004-1383<br />

MPlayer < 1.0pre5try2 Get_Header Remote Client-Side Buffer Overflow<br />

<strong>PVS</strong> ID: 2458 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using a version of Mplayer, a multimedia video and audio application, that contains bugs<br />

that may allow a malicious server to overwrite a buffer and execute code.<br />

Solution: Upgrade to Mplayer 1.0pre5try2 or higher.<br />

CVE Not available<br />

Xine-Lib < 1.0-rc8 Remote Client-Side Buffer Overflow<br />

<strong>PVS</strong> ID: 2459 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using Xine, an open-source multimedia player. It is reported that versions up to 1.0 rc7 are<br />

vulnerable to a buffer overflow. An attacker may craft a malicious multimedia file that may<br />

execute arbitrary code on the remote host if played with Xine.<br />

Solution: Upgrade to Xine 1.0-rc8 or higher.<br />

CVE Not available<br />

PHP < 4.3.10 / 5.0.3 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2460 FAMILY: Web Servers RISK: HIGH NESSUS ID:15973<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a script injection attack.\n\nThe remote host<br />

is running a version of PHP which is older than 5.0.3 or 4.3.10.\nThe remote version of this<br />

software is vulnerable to various security issues that may, under certain circumstances,<br />

allow attackers to execute arbitrary code on the remote host, provided that they can pass<br />

arbitrary data to some functions or bypass safe_mode. The reported version of PHP is: \n<br />

%L<br />

Family Internet Services 624


Solution: Upgrade to PHP 5.0.3 or 4.3.10 or higher.<br />

CVE-2004-1065<br />

IBM WebSphere Commerce Database Update Default User Information Disclosure<br />

<strong>PVS</strong> ID: 2461 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote WebSphere webserver is vulnerable to an<br />

information leak. User information is sometimes stored under the profile of the<br />

'default' user. Unintended users may gain access to this information and use the<br />

information to elevate privileges on the remote machine. It is also possible that the<br />

default user account may disclose information regarding other users.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Ikonboard < 3.1.3 ikonboard.cgi Multiple Parameter SQL Injection<br />

<strong>PVS</strong> ID: 2462 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host appears to be running Ikonboard, a bulletin board service<br />

implemented in Perl. This version is reported vulnerable to a SQL injection vulnerability.<br />

An attacker may gain access to unauthorized information or may steal authentication<br />

credentials by sending malformed string to ikonboard.cgi.<br />

Solution: Upgrade to Ikonboard 3.1.3 or higher.<br />

CVE-2004-1406<br />

Samba < 3.0.10 Directory Access Control List Remote Integer Overflow<br />

<strong>PVS</strong> ID: 2463 FAMILY: Samba<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote overflow.\n\nThe remote Samba<br />

server, according to its version number ('%L'), may be vulnerable to a remote buffer<br />

overflow.\nThe remote integer overflow vulnerability may allow an attacker to execute<br />

code on the server.\n An attacker needs access to a vulnerable share to exploit this issue.<br />

Solution: Upgrade to Samba 3.0.10 or higher.<br />

CVE-2004-1154<br />

JSBoard Remote Arbitrary Script Upload<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2464 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 625


Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host seems to be running Ikonboard, a bulletin board service<br />

implemented in Perl. This version is reported vulnerable to a SQL injection vulnerability.<br />

An attacker may gain access to unauthorized information or may steal authentication<br />

credentials by sending malformed string to ikonboard.cgi.<br />

Solution: Upgrade to Ikonboard 2.0.9, Ikonboard-win32 1.3.13 or higher.<br />

CVE Not available<br />

WordPress < 1.2.2 Multiple Vulnerabilities (XSS, HTML Injection, SQL Injection)<br />

<strong>PVS</strong> ID: 2465 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:15443<br />

Description: The remote host is running WordPress, a web blog manager written in PHP.\nThe remote<br />

version of this software is vulnerable to various flaws that may allow an attacker to perform<br />

an HTML injection attack against the remote host or to allow an attacker to execute<br />

arbitrary SQL statements against the remote database.<br />

Solution: Upgrade to WordPress 1.2.2 or higher.<br />

CVE-2004-1584<br />

Singapore Gallery Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2466 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:15987<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nSingapore is a<br />

PHP based photo gallery web application. The remote version of this software is vulnerable<br />

to multiple flaws that may allow an attacker to read arbitrary files on the remote host or to<br />

execute arbitrary PHP commands.<br />

Solution: Upgrade to Singapore 0.9.11 or higher.<br />

CVE-2004-1408<br />

Opera < 7.54u1 Download Box Spoofing<br />

<strong>PVS</strong> ID: 2467 FAMILY: Web Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote browser allows attackers to spoof download file<br />

extensions.\n\nThe remote host is using a version of Opera that is prone to a security flaw<br />

where a malicious website can spoof a filename within a download dialog box. An attacker<br />

exploiting this flaw would need to be able to entice a local user to browse to a malicious<br />

website. Upon visiting the website, the user would download a file with an obfuscated<br />

name.<br />

Family Internet Services 626


Solution: Install Opera 7.54u1 or higher.<br />

CVE-2004-1490<br />

Netscape < 7.2 Cross-domain Window Injection<br />

<strong>PVS</strong> ID: 2468 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote browser allows attackers to spoof popup windows.\n\nThe<br />

remote host is using the Netscape 7 web browser. There is a flaw in this version of<br />

Netscape browser that allows an attacker to spoof popup windows from trusted hosts. An<br />

attacker exploiting this flaw would need to be able to entice a user to browse a malicious<br />

website while browsing a trusted site in another browser window. These sort of attacks are<br />

commonly referred to as 'Phishing' attacks. \nThe remote host is running Netscape version<br />

%L<br />

Solution: Upgrade to Netscape 7.2 or higher.<br />

Retina REM Detection<br />

CVE-2004-1160<br />

<strong>PVS</strong> ID: 2469 FAMILY: Policy RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote host is running the EEYE REM server. This server is used<br />

to manage multiple EEYE Retina scanners. The presence of this server indicates that a<br />

group is scanning the network for vulnerabilities. \nThe version of the REM server is %L<br />

Solution: Ensure that these servers are authorized for your network.<br />

CVE Not available<br />

CVSTrac < 1.1.5 Unspecified XSS<br />

<strong>PVS</strong> ID: 2470 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is using the CVSTrac, a tool to browse CVS repositories.\nAccording to its<br />

version number, the remote version of this software is vulnerable to an unspecified<br />

cross-site scripting vulnerability.<br />

Solution: Upgrade to version 1.1.5 or higher.<br />

CVE-2004-1146<br />

GREED Multiple Remote Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2471 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 627


Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nThe remote host is using GREED, a wget-like tool to fetch HTTP and FTP<br />

data from a command-line.\nThis software is unmaintained and contains multiple flaws that<br />

may allow an attacker to execute arbitrary commands on the remote host by sending<br />

malformed replies to the client requests.<br />

Solution: Discontinue the usage of this software.<br />

CVE Not available<br />

RealPlayer Unspecified Remote Buffer Overflow<br />

<strong>PVS</strong> ID: 2472 FAMILY: Web Clients RISK: HIGH NESSUS ID:14278<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nAccording to its<br />

version number, the version of Realplayer is vulnerable to several remote<br />

overflows.\nRealplayer is a multimedia player. An attacker exploiting this flaw would need<br />

to be able to convince a local user into visiting a malicious URL or downloading a<br />

malicious RealPlayer media file that would execute code with the privileges of the local<br />

user.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-0550<br />

ArGoSoft Mail Server < 1.8.7.0 Unspecified XSS<br />

<strong>PVS</strong> ID: 2473 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:16012<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running the ArGoSoft Mail Server. It is reported that ArGoSoft Mail Server<br />

is prone to a HTML injection vulnerability. An attacker exploiting this flaw may be able to<br />

steal cookie-based authentication credentials.<br />

Solution: Upgrade to version 1.8.7.0 or higher.<br />

CVE Not available<br />

Namazu < 2.0.14 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2474 FAMILY: CGI RISK: HIGH NESSUS ID:16045<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack\n\nThe<br />

remote host is running Namazu, a web-based search engine.\nThe remote version of this<br />

software is vulnerable to various flaws that may allow an attacker to perform a cross-site<br />

scripting attack using the remote host or to execute arbitrary code on the remote system<br />

with the privileges of the web server.<br />

Solution: Upgrade to Namazu 2.0.14 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 628


2BGal SQL Injection<br />

CVE-2004-1318<br />

<strong>PVS</strong> ID: 2475 FAMILY: CGI RISK: HIGH NESSUS ID:16046<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack\n\nThe remote host<br />

appears to be running 2BGal, a photo gallery software written in PHP.\nThere is a flaw in<br />

the remote software which may allow anyone to inject arbitrary SQL commands, which<br />

may in turn be used to gain administrative access on the remote host.<br />

Solution: Upgrade to the latest version of this software<br />

CVE-2004-1415<br />

SHOUTcast < 1.9.5 Filename Remote Format String<br />

<strong>PVS</strong> ID: 2476 FAMILY: Web Servers RISK: HIGH NESSUS ID:16064<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote 'format string' flaw.\n\nThe remote<br />

host is running SHOUTcast server.\nThe remote version of this software is vulnerable to a<br />

format string attack that may let an attacker execute arbitrary code on the remote host by<br />

sending a malformed request to it.<br />

Solution: Upgrade to SHOUTcast 1.9.5 or higher.<br />

CVE-2004-1373<br />

Help Center Live Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2477 FAMILY: CGI RISK: HIGH NESSUS ID:18296<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote web server is running Help Center Live, a help desk<br />

application written in PHP.\nThe remote version of this software is vulnerable to various<br />

flaws that may allow an attacker to execute arbitrary commands on the remote host.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-1674<br />

ViewCVS < 1.0.0 HTTP Response Splitting<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2478 FAMILY: CGI RISK: HIGH NESSUS ID:16062<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a HTTP response splitting attack.\n\nThe<br />

remote host is running ViewCVS, a tool to browse CVS repositories over the web. There is<br />

a flaw in the remote ViewCVS server that may allow an attacker to steal the credentials of<br />

third-party users via an HTTP response splitting attack.<br />

Family Internet Services 629


Solution: Upgrade to version 1.0.0 or higher.<br />

CVE-2005-4831<br />

Owl < 0.74.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2479 FAMILY: CGI RISK: HIGH NESSUS ID:16063<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is using Owl Intranet Engine, an open-source file sharing utility written in PHP.\nThe<br />

remote version of this software is vulnerable to various flaws that may allow an attacker to<br />

execute arbitrary SQL statements against the remote database or to perform a cross-site<br />

scripting attack against third party users by using the remote server.<br />

Solution: Upgrade to Owl 0.74.0 or higher.<br />

CVE-2005-0264<br />

PHProxy index.php error Parameter XSS<br />

<strong>PVS</strong> ID: 2480 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS)<br />

attack.\n\nThe remote host is using PHProxy, an open-source HTTP proxy written<br />

in PHP.\nThe remote version of this software is vulnerable to a cross-site scripting<br />

flaw that may allow an attacker to steal user credentials.<br />

Solution: No solution is known at this time.<br />

CVE-2004-2604<br />

Mozilla < 1.7.5 <strong>Network</strong> News Transport Protocol Remote Heap Overflow<br />

<strong>PVS</strong> ID: 2481 FAMILY: Web Clients RISK: HIGH NESSUS ID:16085<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a heap overflow.\n\nThe remote host is<br />

using Mozilla.\nThe remote version of this software is vulnerable to a heap overflow<br />

against its NNTP functionality. This may allow an attacker to execute arbitrary code on the<br />

remote host. To exploit this flaw, an attacker would need to set up a rogue website and lure<br />

a victim on the remote host into visiting it.<br />

Solution: Upgrade to Mozilla 1.7.5 or higher.<br />

CVE-2005-0150<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Macallan Mail Solution < 4.1.1.0 Multiple HTTP Vulnerabilities<br />

<strong>PVS</strong> ID: 2482 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 630


Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote<br />

host is running Macallan Mail Solution, a mail server (POP,SMTP,HTTP) for<br />

Windows. It is reported that Macallan Mail Solution is prone to a HTTP GET<br />

buffer overflow vulnerability and to an authentication bypass vulnerability. An<br />

attacker exploiting those flaws may be able to access an administrative interface,<br />

crash the service or execute arbitrary code.<br />

Solution: Upgrade to version 4.1.1.0 or higher.<br />

CVE Not available<br />

FlatNuke < 2.5.2 Form Submission Arbitrary Script Injection<br />

<strong>PVS</strong> ID: 2483 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection attack.\n\nThe remote host<br />

is running FlatNuke, an open-source content management system.\nThe remote version of<br />

this software is prone to a form submission vulnerability. This may allow an attacker to<br />

execute script on the remote host.<br />

Solution: Upgrade to version 2.5.2 or higher.<br />

CVE-2005-0267<br />

All Enthusiast PhotoPost PHP Pro < 4.8.6 Multiple XSS<br />

<strong>PVS</strong> ID: 2484 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS)<br />

attack.\n\nThe remote host is running All Enthusiast PhotoPost PHP, a web-based<br />

gallery application.\nThe remote version of this software is prone to multiple<br />

cross-site scripting vulnerabilities. This may allow an attacker to steal<br />

authentication credentials.<br />

Solution: Upgrade to version 4.8.6 or higher.<br />

CVE-2005-0273<br />

MyBulletinBoard Multiple SQL Injection Vulnerabilities<br />

<strong>PVS</strong> ID: 2485 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:19525<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL<br />

injection attack.\n\nThe remote host is running MyBulletinBoard, a PHP-based<br />

bulletin board. The remote version of this software is prone to SQL injection<br />

attacks due to its failure to sanitize user-supplied input to various scripts before<br />

using it in database queries. This may allow an attacker to uncover sensitive<br />

information (such as password hashes), access the Admin Control Panel without<br />

authentication, modify existing data, and launch attacks against the underlying<br />

Family Internet Services 631


database.<br />

Solution: No solution is known at this time.<br />

CVE-2005-0282<br />

All Enthusiast ReviewPost PHP Pro < 2.5.2 Multiple Input Validation Vulnerabilities<br />

<strong>PVS</strong> ID: 2486 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running All Enthusiast ReviewPost, a web-based bulletin board written in PHP.\nThe<br />

remote version of this software is prone to multiple input validation vulnerabilities. This<br />

may allow an attacker to steal authentication credentials, inject SQL data or run arbitrary<br />

scripts.<br />

Solution: Upgrade to version 2.5.2 or higher.<br />

CVE-2004-2175<br />

b2evolution index.php SQL Injection<br />

<strong>PVS</strong> ID: 2487 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running b2evolution, a web-based blog engine written in<br />

PHP.\nThe remote version of this software is prone to a SQL injection vulnerability. This<br />

may allow an attacker to steal authentication credentials or run arbitrary code on the remote<br />

host.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

Google API "Google Hacking" Detection<br />

<strong>PVS</strong> ID: 2488 FAMILY: Internet Services RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote host appears to be using the Google API to execute<br />

'Google hacking' queries. Many vulnerabilities can be found by querying for the error string<br />

(or similar) coming from an incorrectly configured or broken web application. An attacker<br />

queries the Google cache for these error strings which then gives them a list of potential<br />

targets.<br />

Solution: Ensure that this behavior is in accordance with corporate standards and policies.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Lotus Domino Default Administration Database Detection<br />

Family Internet Services 632


<strong>PVS</strong> ID: 2489 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10629<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote Lotus Domino server is running with the default<br />

administrative databases. An attacker finding these databases may be able to pull<br />

confidential data from the remote database.<br />

Solution: Restrict access to these databases.<br />

CVE-2002-0664<br />

Big Sister Information Leak<br />

<strong>PVS</strong> ID: 2490 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running Big Sister network monitoring software. Big Sister<br />

gives anonymous users quite a bit of information regarding critical servers, uptime,<br />

response times, and more. An attacker accessing these pages would be able to map out<br />

potential targets<br />

Solution: Use ACLs or firewalls to prevent network-based access.<br />

CVE Not available<br />

Squid Server Report Information Disclosure<br />

<strong>PVS</strong> ID: 2491 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running the Squid proxy. The server has web-based proxy<br />

reporting enabled. An attacker viewing these pages would be able to gain information that<br />

may be useful in future attacks.<br />

Solution: Use ACLs to protect the Squid proxy reports.<br />

CVE Not available<br />

Ganglia Cluster Report Information Disclosure<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2492 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running the Ganglia Cluster Toolkit. This toolkit is used to<br />

manage and display information regarding critical servers. Anonymous users who access<br />

this toolkit would be able to peruse the different machines in the cluster. In addition, they<br />

would be able to query each specific machine for information regarding OS level, current<br />

load and more.<br />

Family Internet Services 633


Solution: Use ACLs to protect the Ganglia Cluster Report.<br />

CVE Not available<br />

WebLog Information Disclosure<br />

<strong>PVS</strong> ID: 2493 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running the WebLog report generator. This application<br />

parses the web logs and gives information regarding files accessed, errors, site referers and<br />

more. An attacker perusing this page would be able to gather information useful in further<br />

attacks against the web server.<br />

Solution: Use ACLs to protect the WebLog Reports.<br />

CVE Not available<br />

Getstats Report Information Disclosure<br />

<strong>PVS</strong> ID: 2494 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running the Getstats Report generator. Getstats parses web<br />

logs and gives a potential attacker information regarding the hosts that have accessed the<br />

server, resources accessed, total statistics for the Web server, version of Web server and<br />

more.<br />

Solution: Use ACLs to protect the Getstats Report.<br />

CVE Not available<br />

wwwstat Report Information Disclosure<br />

<strong>PVS</strong> ID: 2495 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running the wwwstat Report generator. Wwwstat parses web<br />

logs and gives a potential attacker information regarding the hosts that have accessed the<br />

server, resources accessed, total statistics for the Web server, version of Web server and<br />

more.<br />

Solution: Use ACLs to protect the wwwstat report.<br />

CVE Not available<br />

Hassan Shopping Cart Detection<br />

<strong>PVS</strong> ID: 2496 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 634


Description: The remote server is running the Hassan Shopping Cart script. This script is used to<br />

manage online shopping carts. There have been many vulnerabilities noted in the Hassan<br />

CGI scripts. \nThe version of Hassan Shopping Cart is %L<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Cisco 'tech-support' Anonymous User Debugging Information Disclosure<br />

<strong>PVS</strong> ID: 2497 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nCisco routers and switches ship with a default web interface that<br />

allows remote administrators to view the entire configuration via the web. Unfortunately,<br />

many of these devices are not password protected and allow anonymous users to download<br />

critical router/switch configuration information.\nAn attacker can download the Cisco<br />

configuration file by browsing to /exec/show/tech-support/cr<br />

Solution: Enable passwords for the Cisco IOS web server.<br />

CVE Not available<br />

Xerox Default Administrative Web Page Detection<br />

<strong>PVS</strong> ID: 2498 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nThe remote Xerox printer does not have a protected default configuration<br />

web page. An attacker connecting to the Xerox web server would be able to view and<br />

modify the printer configuration.<br />

Solution: Enable passwords for the XEROX printer.<br />

CVE Not available<br />

Mnogosearch search.cgi Detection<br />

<strong>PVS</strong> ID: 2499 FAMILY: Web Servers RISK: HIGH NESSUS ID:11735<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nThe remote host is running the mnogosearch search.cgi CGI program. There<br />

is a flaw in older versions of this software that may allow an attacker to gain a shell on this<br />

host.<br />

Solution: Upgrade or patch according to vendor recommendations, or discontinue use of the script.<br />

CVE-2003-0437<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 635


Gallery Configuration Mode Authentication Bypass<br />

<strong>PVS</strong> ID: 2500 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the<br />

bypassing of authentication.\n\nThe remote server is running Gallery in<br />

configuration mode. Gallery is a software tool for webservers that allows for<br />

easy creation of online photo albums. This version of Gallery has been installed<br />

but not yet configured. Any remote user discovering the configuration screen<br />

may be able to modify web content on the remote server.<br />

Solution: Configure Gallery, then disable configuration mode.<br />

CVE Not available<br />

Policy - Xlink Online Gaming Client Detection (TCP)<br />

<strong>PVS</strong> ID: 2501 FAMILY: Policy<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote client is running the Xlink gaming console. Xlink allows individuals to connect<br />

Xbox, Playstation2, Gamecube, and other gaming clients up to central servers and play<br />

games against other Internet hosts.<br />

Solution: Ensure that this behavior is authorized for your network.<br />

CVE Not available<br />

Policy - Xlink Online Gaming Server Detection<br />

<strong>PVS</strong> ID: 2502 FAMILY: Policy<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is running the Xlink Gaming Server. Xlink allows individuals to connect<br />

Xbox, Playstation2, Gamecube, and other gaming clients up to central servers and play<br />

games against other Internet hosts.<br />

Solution: Ensure that this behavior is authorized for your network.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Policy - Xlink Online Gaming Client Detection (UDP)<br />

<strong>PVS</strong> ID: 2503 FAMILY: Policy RISK: LOW NESSUS ID:Not Available<br />

Description: The remote client is running the Xlink gaming console. Xlink allows individuals to connect<br />

Xbox, Playstation2, Gamecube, and other gaming clients up to central servers and play<br />

games against other Internet hosts.<br />

Solution: Ensure that this behavior is authorized for your network.<br />

Family Internet Services 636


CVE Not available<br />

Awstats Web Statistics Server Detection<br />

<strong>PVS</strong> ID: 2504 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote web server is running the awstats statistics program. Awstats parses<br />

the web logs and gives a potential attacker information regarding hosts that have accessed<br />

the server, resources accessed, total statistics for the Web server, version of Web server,<br />

and more.<br />

Solution: Use ACLs to protect the awstats report.<br />

CVE Not available<br />

Exim < 4.44 Illegal IPv6 Address / SPA Authentication Buffer Overflow<br />

<strong>PVS</strong> ID: 2505 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Exim, a message transfer agent (SMTP). It is reported that Exim is prone to an<br />

IPv6 address and a SPA authentication buffer overflow . An attacker exploiting those flaws<br />

may be able to execute arbitrary code on the remote host. Exim must be configured with<br />

SPA Authentication or with IPv6 support to exploit those flaws.<br />

Solution: Upgrade to version 4.44 or higher.<br />

CVE-2005-0022<br />

Webalizer Report Information Disclosure<br />

<strong>PVS</strong> ID: 2506 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running the Webalizer Report generator. Webalizer parses<br />

web logs and gives a potential attacker information regarding hosts that have accessed the<br />

server, resources accessed, total statistics for the Web server, version of Web server, and<br />

more.\nThe version of Webalizer is: %L<br />

Solution: Use ACLs to protect the Webalizer report.<br />

CVE Not available<br />

osCommerce Admin Interface Detection<br />

<strong>PVS</strong> ID: 2507 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 637


Description: The remote server is running the admin interface of osCommerce. OsCommerce is an<br />

application for deploying and managing e-commerce servers.<br />

Solution: Ensure that only valid Administrators can access the Admin interface. Also ensure<br />

that you are running the latest version of osCommerce.<br />

CVE Not available<br />

Terminal Services Web Detection<br />

<strong>PVS</strong> ID: 2508 FAMILY: Web Servers RISK: NONE NESSUS ID:12234<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host appears to be configured to facilitate the client download of an<br />

ActiveX Terminal Services Client. Users can access the web page and click a 'connect'<br />

button that will prompt a client-side download of a .cab file that will be used to connect the<br />

client directly to a terminal services server using Remote Desktop Protocol -- RDP. You<br />

will want to manually inspect this page for possible information regarding systems offering<br />

RDP access, system information, IP addressing information, and more.<br />

Solution: Password protect access to the 'tsweb' resource.<br />

CVE Not available<br />

Nessus Scan Report Disclosure<br />

<strong>PVS</strong> ID: 2509 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote web server is hosting a Nessus scan report at the following location<br />

: \n%P\nAn anonymous user reading this report will be able to obtain information useful in<br />

attacking vulnerable hosts on the network.<br />

Solution: Remove or protect the scan report data.<br />

CVE Not available<br />

ISS Scan Report Disclosure<br />

<strong>PVS</strong> ID: 2510 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote web server is hosting an ISS scan report at the following URL :<br />

\n%P\nAn anonymous user reading this report will be able to obtain information useful in<br />

attacking vulnerable hosts on the network.<br />

Solution: Remove or protect the scan report data.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 638


Big Brother Information Disclosure<br />

<strong>PVS</strong> ID: 2511 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running Big Brother network monitoring software. Big<br />

Brother gives anonymous users information regarding critical servers, uptime, response<br />

times, and more. An attacker accessing these pages would be able to map out potential<br />

targets. \nThe remote host is running Big Brother version: %L<br />

Solution: Protect the servers by using ACLs or firewalls.<br />

CVE Not available<br />

Dillo < 0.8.4-rc1 Interface Message Format String<br />

<strong>PVS</strong> ID: 2512 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote 'format string' flaw.\n\nThe remote<br />

host is using Dillo, an alternative web browser for Unix and Linux.\nThe remote version of<br />

this software is vulnerable to a format string vulnerability. This may allow an attacker to<br />

overwrite data in memory.<br />

Solution: Upgrade to version 0.8.4-rc1 or higher.<br />

CVE-2005-0012<br />

PHPWind Board < 2.0.2 faq.php Remote File Inclusion<br />

<strong>PVS</strong> ID: 2513 FAMILY: CGI RISK: HIGH NESSUS ID:16122<br />

Description: The remote host is running PHPWind Board, a web based bulletin board. There is a remote<br />

file inclusion vulnerability in older versions of this software that may allow an attacker to<br />

gain a shell on this host.<br />

Solution: Upgrade to version 2.0.2 or higher.<br />

CVE Not available<br />

SNAP <strong>Network</strong> Attached Server Administration Page<br />

<strong>PVS</strong> ID: 2514 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is running the SNAP <strong>Network</strong> Attached Server. A SNAP server is a device<br />

that allows easy creation of network-attached services. SNAP ships with a default web<br />

server that allows anonymous users to peruse device configuration information, user lists,<br />

Administrative tasks, and more.<br />

Solution: Use ACLs to protect the SNAP <strong>Network</strong> Attached Server web pages.<br />

Family Internet Services 639


CVE Not available<br />

MikroTik Router Detection<br />

<strong>PVS</strong> ID: 2515 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is a MikroTik router.<br />

Solution: Ensure that this router and default web pages are in accordance with corporate policies.<br />

CVE Not available<br />

Oracle HTTP Listener Default Web Page Detection<br />

<strong>PVS</strong> ID: 2516 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10849<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running the Oracle HTTP Configuration interface. This<br />

interface allows anonymous users to view configuration details. In addition, an attacker<br />

may be able to make configuration changes if the default settings are in place.<br />

Solution: Lock down or remove the Oracle HTTP Configuration interface.<br />

CVE Not available<br />

HylaFAX < 4.2.1 Remote Access Control Bypass<br />

<strong>PVS</strong> ID: 2517 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the<br />

bypassing of authentication.\n\nThe remote host is running HylaFAX, a fax<br />

transmission software. It is reported that HylaFAX is prone to an access control<br />

bypass vulnerability. An attacker exploiting this flaw may be able to gain<br />

unauthorized access to the service.<br />

Solution: Upgrade to version 4.2.1 or higher.<br />

CVE Not available<br />

POP Password Changer Unauthorized Password Change<br />

<strong>PVS</strong> ID: 2518 FAMILY: POP Server<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication\n\nThe remote host is running POP Password Changer, a server used to<br />

change POP users' passwords, that is vulnerable to unauthorized access. An attacker<br />

exploiting this flaw will be able to change users' passwords.<br />

Family Internet Services 640


Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Apple iTunes < 4.7.1 Playlist Buffer Overflow<br />

<strong>PVS</strong> ID: 2519 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is using iTunes, a media player application for Windows and Mac OS X. The<br />

remote version of this software is vulnerable to a buffer overflow. This may allow an<br />

attacker to execute code on the remote host. An attacker needs to send a malicious playlist<br />

to the user to exploit this flaw.<br />

Solution: Upgrade to version 4.7.1 or higher.<br />

CVE-2005-0043<br />

Squid Proxy < 2.5.STABLE8 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2520 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote Squid caching proxy, according to its version number, may be vulnerable to a<br />

remote denial of service.\n\nThis flaw is caused due to an input validation error in the<br />

NTLM module.\n\nAn attacker can exploit this flaw to crash the server with a specially<br />

crafted packet.\n\nThe remote Squid proxy is also vulnerable to a cache-corruption flaw<br />

due to incorrect parsing of malformed HTTP headers. An attacker exploiting this flaw<br />

would be able to poison the cache.\n\nThe remote Squid proxy is vulnerable to an<br />

authentication bypass\nin the squid_ldap_auth module as well as a remote overflow due to<br />

oversized HTTP headers.<br />

Solution: Upgrade to Squid 2.5.STABLE8 or higher.<br />

CVE-2005-0211<br />

Gracebyte <strong>Network</strong> Assistant Remote DoS<br />

<strong>PVS</strong> ID: 2521 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is using Gracebyte <strong>Network</strong> Assistant, a chat and instant messenger program<br />

for home and small office. The remote version of this software is vulnerable to a denial of<br />

service flaw. This may allow an attacker to crash the remote service.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

VideoDB < 2.0.2 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 641


<strong>PVS</strong> ID: 2522 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is VideoDB, a web based video database manager written in<br />

PHP.\nThe remote version of this software is vulnerable to a SQL injection vulnerability<br />

due to a lack of filtering on user-supplied input. An attacker may exploit this flaw to<br />

modify the remote database.\nThis software may be vulnerable to an unauthorized access<br />

vulnerability in the file 'edit.php' that may allow an attacker to edit database entries.<br />

Solution: Upgrade to VideoDB 2.0.2 or higher.<br />

CVE Not available<br />

GNU Mailman Multiple Unspecified Remote Vulnerabilities<br />

<strong>PVS</strong> ID: 2523 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a cross-site scripting (XSS) attack.\n\nThe<br />

remote host is running GNU Mailman, a web based software to manage mailing lists. There<br />

are multiple flaws such as information disclosure and cross-site scripting in the remote<br />

version of this software that may allow an attacker to steal user cookies to gain<br />

unauthorized access.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

BiTBOARD IMG BBCode Tag JavaScript XSS<br />

<strong>PVS</strong> ID: 2524 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection attack\n\nThe remote host<br />

is running BiTBOARD, a web based bulletin board written in PHP. There is a JavaScript<br />

injection vulnerability in the remote version of this software that may allow an attacker to<br />

steal user's cookie to gain unauthorized access.<br />

Solution: No solution is known at this time.<br />

CVE-2005-0374<br />

launch.yahoo.com Streaming Client Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2525 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote client is streaming video or audio from the Yahoo Launch servers. Yahoo<br />

Launch is a service that allows Yahoo users to download and view videos and songs from a<br />

variety of artists. This can potentially impact performance of bandwidth and user<br />

productivity.<br />

Solution: Ensure that this activity is sanctioned by policy and guidelines regarding acceptable<br />

Family Internet Services 642


network usage.<br />

CVE Not available<br />

Windows Media Player Version Information<br />

<strong>PVS</strong> ID: 2526 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Windows Media Player version %L<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Siteman forum.php page Parameter XSS<br />

<strong>PVS</strong> ID: 2527 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running SiteMan, a content-management system written in PHP.\nThe<br />

remote version of this software is vulnerable to a remote cross-site scripting (XSS) attack.<br />

An attacker exploiting this flaw would be able to inject and run code on unsuspecting<br />

users.\nThe remote host is running Siteman version %L<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

MaxDB WebSQL < 7.5.00.18 Remote Overflow<br />

<strong>PVS</strong> ID: 2528 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the MaxDB SAP Web server that includes an administrative CGI called WebSQL.<br />

It has been reported that there is a remote buffer overflow within the WebSQL logon form.<br />

Specifically, a large username is reported to trigger a buffer overflow. More generally, the<br />

existence of the WebSQL script indicates that regardless of the version, the site<br />

administrators have allowed remote plaintext administration of the server. An attacker can<br />

use anonymous access to gain information regarding configured databases, server name,<br />

physical path of files, and more.<br />

Solution: Upgrade to version 7.5.00.18 or higher. In addition, use access control lists to block<br />

anonymous access to the webserver configuration pages.<br />

CVE-2005-0111<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Konqueror < 3.3.2 Multiple Remote Java Sandbox Bypass<br />

<strong>PVS</strong> ID: 2529 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 643


Description: Synopsis :\n\nThe remote host is vulnerable to a cross-site scripting (XSS) attack.\n\nThe<br />

remote host is using a version of Konqueror that is prone to a security flaw where a<br />

malicious website can bypass the browser Java sandbox.\nAs a result, an attacker may be<br />

able to read arbitrary files on the remote host by luring a victim into visiting a rogue<br />

website hosting a malicious Java applet.<br />

Solution: Install Konqueror 3.3.2 or higher.<br />

CVE Not available<br />

iCab Web Browser Remote Window Hijacking<br />

<strong>PVS</strong> ID: 2530 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is using a version of iCab that is prone to a security flaw that may allow a<br />

malicious website to influence a pop up window from a trusted site.\nAn attacker may<br />

exploit this flaw to impersonate third-party web servers and convince a victim on the<br />

remote host into revealing personal information.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

Konqueror Web Browser < 3.3.3 Remote Window Hijacking<br />

<strong>PVS</strong> ID: 2531 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a cross-site scripting (XSS) attack.\n\nThe<br />

remote host is using a version of Konqueror that is prone to a security flaw that may allow<br />

a malicious website to influence a pop up window from a trusted site.\nAn attacker may<br />

exploit this flaw to impersonate third-party web servers and convince a victim on the<br />

remote host into revealing personal information.<br />

Solution: Install Konqueror 3.3.3 or higher.<br />

CVE-2004-1158<br />

Bugzilla < 2.18.0 Internal Error XSS<br />

<strong>PVS</strong> ID: 2532 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote server is running Bugzilla, a bug tracking system. There is a flaw in the remote<br />

installation of Bugzilla that may allow an attacker to perform a cross-site scripting attack<br />

by exploiting a bug in the way Bugzilla displays internal errors mixed with user-supplied<br />

data.<br />

Solution: Upgrade to Bugzilla 2.18.0 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 644


CVE-2004-1061<br />

Gallery Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2533 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:16185<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running the Gallery web-based photo album.\nThere are various flaws in the<br />

remote version of this software that may allow an attacker to perform a cross-site scripting<br />

attack using the remote host, or to exploit an information disclosure flaw to gain more<br />

knowledge about the remote system.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

AWStats < 6.3 awstats.pl configdir Parameter Remote Command Execution<br />

<strong>PVS</strong> ID: 2534 FAMILY: CGI RISK: HIGH NESSUS ID:16189<br />

Description: The remote host is running AWStats, a CGI log analyzer.\nThere are various flaws in the<br />

remote version of this software that may allow an attacker to execute code on the remote<br />

host.<br />

Solution: Upgrade to AWStats 6.3 or higher.<br />

CVE-2005-0116<br />

VBulletin Init.PHP Unspecified Remote Vulnerability<br />

<strong>PVS</strong> ID: 2535 FAMILY: CGI RISK: HIGH NESSUS ID:16203<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running a version of vBulletin, a forum application<br />

implemented in PHP, that is vulnerable to an unspecified remote vulnerability. It is reported<br />

that versions prior to 3.0.5 are prone to this issue. Additionally, versions of vBulletin prior<br />

to 3.0.5 are vulnerable to a content-parsing flaw within the forumdisplay.php script. An<br />

attacker exploiting this flaw would be able to run arbitrary commands on the remote web<br />

server.<br />

Solution: Upgrade to vBulletin 3.0.5 or higher.<br />

CVE-2005-0429<br />

SparkleBlog journal.php SQL Injection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2536 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 645


Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running SparkleBlog, a web blog. An attacker exploiting this<br />

flaw would only need to be able to craft a web request against the web server using the<br />

'journal.php' script.\nThe remote version is: %L<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

Squid Proxy < 2.5.STABLE8 Gopher, WCCP, and Cache Poisoning Vulnerabilities<br />

<strong>PVS</strong> ID: 2537 FAMILY: Web Servers RISK: HIGH NESSUS ID:16190<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote Squid caching proxy, according to its version number, is vulnerable to several<br />

security flaws :\n\n- There is a buffer overflow issue when handling the reply of a rogue<br />

gopher site. To exploit this issue, an attacker would need to use the remote proxy to visit a<br />

specially setup gopher site generating malformed replies \n\n- There is a denial of service<br />

vulnerability in the WCCP code of the remote proxy. To exploit this flaw, an attacker<br />

would need to guess the IP of the WCCP router used by the proxy and spoof a malformed<br />

UDP packet using the router IP address. There are several flaws in the way that the Squid<br />

proxy caches pages.\nAn attacker exploiting these flaws would be able to poison the<br />

Squid\ncache.<br />

Solution: Upgrade to Squid 2.5.STABLE8 or higher.<br />

CVE-2005-0241<br />

NETGEAR Router Detection<br />

<strong>PVS</strong> ID: 2538 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a NETGEAR VPN router. A VPN is a connection protocol that allows<br />

users or companies to connect to remote networks seamlessly.\nThe NETGEAR version<br />

number is: %L<br />

Solution: Ensure that you are running the latest firmware for this version.<br />

CVE Not available<br />

NETGEAR Router Log Viewer XSS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2539 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running a NETGEAR VPN router with Firmware version 2.4. A VPN is a<br />

connection protocol that allows users or companies to connect to remote networks<br />

seamlessly. Firmware version 2.4 of the NETGEAR router is reported to be prone to code<br />

injection and/or cross-site scripting (XSS) attacks.<br />

Family Internet Services 646


Solution: No solution is known at this time.<br />

CVE-2005-0291<br />

Ocean12 ASP Calendar Administrative Interface Access<br />

<strong>PVS</strong> ID: 2540 FAMILY: Web Servers RISK: HIGH NESSUS ID:15974<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running Ocean12 ASP Calendar, a web<br />

based\napplication written in ASP.\n\nThere is a flaw in the remote software that may<br />

allow anyone\nto execute admnistrative commands on the remote host by requesting\nthe<br />

page /admin/main.asp.\n\nAn attacker may exploit this flaw to deface the remote site<br />

without\nany credentials.\n<br />

Solution: No solution is known at this time.<br />

CVE-2004-1400<br />

Microsoft Anti-Spyware Detection<br />

<strong>PVS</strong> ID: 2541 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nThe remote host is running the Microsoft Anti-Spyware tool. Further, the<br />

administrators have not disabled the default 'Spyware Community' feature. The Spyware<br />

Community feature allows Microsoft to centrally track information regarding infected files,<br />

versions, locations, and more. When a file is flagged as being spyware, the remote host will<br />

automatically send this information (via the Internet) to Microsoft servers.<br />

Solution: Ensure that the 'Spyware Community' feature is in alignment with corporate policies and<br />

procedures.<br />

Tor Tunnel Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 2542 FAMILY: Backdoors<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote client just started a Tor tunnel for routing network traffic over the Tor Tunnel<br />

network. The Tor tunnel allows users to run applications such as peer-to-peer clients,<br />

instant messaging and web browsers over a single encrypted tunnel. Tor also tunnels and<br />

encrypts the DNS requests associated with such applications. By sending traffic over the<br />

Tor network, users can bypass corporate policies, firewalls, and guidelines.<br />

Solution: Ensure that the usage of the Tor network is in alignment with corporate polices and<br />

guidelines.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 647


Tor Tunnel Detection<br />

<strong>PVS</strong> ID: 2543 FAMILY: Policy RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote client is routing network traffic over the Tor Tunnel<br />

network. The Tor tunnel allows users to run applications such as peer-to-peer clients,<br />

instant messaging, web browsers over a single encrypted HTTP tunnel. Tor also tunnels<br />

and encrypts the DNS requests associated with such applications. By sending traffic over<br />

the Tor network, users can bypass corporate policies, firewalls, and guidelines.<br />

Solution: Ensure that the usage of the Tor network is in alignment with corporate polices and<br />

guidelines.<br />

CVE Not available<br />

CMSimple < 2.4 Beta 5 Multiple Remote Input Validation Vulnerabilities<br />

<strong>PVS</strong> ID: 2544 FAMILY: CGI RISK: LOW NESSUS ID:19693<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML injection attack.\n\nThe remote<br />

host is running a version of CMSimple, a content management system. The remote version<br />

of this software is prone to multiple input validation vulnerabilities. An attacker may<br />

exploit these flaws to inject arbitrary code to steal authentication cookies.<br />

Solution: Upgrade to CMSimple 2.4 Beta 5 or higher.<br />

CVE Not available<br />

Siteman < 1.1.11 Page User Database Privilege Escalation<br />

<strong>PVS</strong> ID: 2545 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:16216<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running Siteman, a web-based content management<br />

system written in PHP. The remote version of this software is vulnerable to a privilege<br />

escalation vulnerability. An attacker with a valid username and password may escalate<br />

privileges by making a specially crafted request to the remote server.<br />

Solution: Upgrade to SiteMan 1.1.11 or higher.<br />

CVE-2005-0305<br />

ExBB Nested BBcode XSS<br />

<strong>PVS</strong> ID: 2546 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:16223<br />

Family Internet Services 648


Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection attack.\n\nThe remote host<br />

is running ExBB, a bulletin board system written in PHP.\nThe remote version of this<br />

software is vulnerable to a script injection vulnerability.\nAn attacker may post a forum<br />

comment in the remote application containing rogue JavaScript tags that will be executed in<br />

the browsers of legitimate visitors of the remote web site.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

Konversation IRC Client < 0.15.1 Multiple Remote Vulnerabilities<br />

<strong>PVS</strong> ID: 2547 FAMILY: IRC Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running a Konversation, an IRC client. The remote version of this software<br />

may be vulnerable to a remote Denial of Service attack and shell code execution attack.<br />

Solution: Upgrade to Konversation 0.15.1 or higher.<br />

CVE-2005-0131<br />

Cisco IOS Telephony SCCP Control DoS (CSCee08584)<br />

<strong>PVS</strong> ID: 2548 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:16217<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote router contains a version of IOS that has flaw in its telephony\nservice.\n\nIf the<br />

remote router is configured for ITS, CME or SRST, then an attacker\n\nmay send<br />

malformed TCP queries to the remote host resulting in a reboot\n\nof the router.\nCISCO<br />

identifies this vulnerability as Bug ID CSCee08584<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-0186<br />

JSBoard < 2.0.10 session.php Arbitrary File Access<br />

<strong>PVS</strong> ID: 2549 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host appears to be running Ikonboard, a bulletin board<br />

service implemented in Perl. This version is reported to be vulnerable to a file disclosure<br />

flaw within the session.php file. Specifically, when the server is configured with PHP<br />

'magic_quotes_gpc' disabled, a remote attacker can use session.php to read any file on the<br />

web server that is readable by the web process owner.<br />

Family Internet Services 649


Solution: Upgrade to version 2.0.10 or higher.<br />

CVE-2005-0300<br />

SquirrelMail < 1.4.4-RC1 webmail.php XSS<br />

<strong>PVS</strong> ID: 2550 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running SquirrelMail, a webmail system written in PHP. Versions of<br />

SquirrelMail prior to 1.4.4-RC1 are vulnerable to a cross-site scripting (XSS) vulnerability.<br />

A remote attacker can exploit this flaw to run malicious code within a web browser.<br />

Solution: Upgrade to version 1.4.4-RC1 or higher.<br />

CVE-2005-0075<br />

MercuryBoard < 1.1.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2551 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running MercuryBoard, a web-based message board. This<br />

version of MercuryBoard is vulnerable to multiple vulnerabilities that include: cross-site<br />

scripting (XSS), SQL Injection, and path disclosure. An attacker exploiting these flaws<br />

would be able to elevate privileges and/or execute code.<br />

Solution: Upgrade to version 1.1.2 or higher.<br />

CVE-2005-0307<br />

3[APA3A] Proxy Remote Overflow<br />

<strong>PVS</strong> ID: 2552 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the 3[APA3A] Proxy. There is a flaw in this version of the proxy engine that<br />

allows remote attackers to potentially overwrite critical memory, thus allowing for remote<br />

code execution.\nThe remote proxy is running version: %L<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

3[APA3A] Proxy Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2553 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the 3[APA3A] Proxy version %L.<br />

Solution: Ensure that the proxy is authorized in accordance to policies and procedures<br />

regarding appropriate network use.<br />

Family Internet Services 650


CVE Not available<br />

Comersus Default Install Script Admin Access<br />

<strong>PVS</strong> ID: 2554 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running Comersus, a web application shopping cart.<br />

This version of Comersus is vulnerable to a remote attack where anonymous users can gain<br />

administrative access by requesting a .asp script that was a part of the install process but<br />

never deleted after the install.<br />

Solution: Delete all /comersus_backoffice_install scripts. In addition, upgrade or patch according to<br />

vendor recommendations.<br />

CVE Not available<br />

Mac OS X Multiple Vulnerabilities (<strong>Security</strong> Update 2005-001)<br />

<strong>PVS</strong> ID: 2555 FAMILY: Operating System Detection RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is missing <strong>Security</strong> Update 2005-001. This security update contains a number<br />

of enhancements for the following programs :\n\n - at commands\n - ColorSync\n -<br />

libxml2\n - Mail\n - PHP\n - Safari\n - SquirrelMail\n<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-0525<br />

ISC BIND < 8.4.6 q_usedns Array Remote Overflow DoS<br />

<strong>PVS</strong> ID: 2556 FAMILY: DNS Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:16260<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS)<br />

attack.\n\nThe remote BIND DNS server is, according to its version number,<br />

vulnerable to a remote buffer overflow in the 'q_usedns' buffer. An attacker may be<br />

able to launch a denial of service attack against the remote BIND Server.<br />

Solution: Upgrade to Bind 8.4.6 or higher or the newest version of BIND 9.<br />

CVE-2005-0033<br />

ISC BIND < 8.4.6 dnssec authvalidated Crafted Packet Remote DoS<br />

<strong>PVS</strong> ID: 2557 FAMILY: DNS Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:16261<br />

Family Internet Services 651


Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote BIND server, according to its version number, has a flaw in the way<br />

'authvalidator()' is implemented. An attacker may be able to launch a denial of service<br />

attack against the remote service.<br />

Solution: Upgrade to Bind 8.4.6 or higher or the newest version of BIND 9.<br />

CVE-2005-0034<br />

Cisco IOS 12.0 IPv6 Remote DoS<br />

<strong>PVS</strong> ID: 2558 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\n The<br />

remote Cisco device has enabled IPv6. On many Cisco devices, it may be possible to make<br />

the remote device crash when sending it malformed IPv6 packets. These vulnerabilities<br />

would allow a remote attacker to potentially cause the Cisco machine to reboot repeatedly,<br />

causing a loss of availability.<br />

Solution: Ensure that IPv6 functionality is required and then ensure that a patched version of Cisco<br />

IOS is installed.<br />

CVE Not available<br />

gpsd < 2.8 gpsd_report() Function Remote Format String<br />

<strong>PVS</strong> ID: 2559 FAMILY: Generic RISK: HIGH NESSUS ID:16265<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote 'format string' flaw.\n\nThe remote<br />

host is running GPSD, a daemon that monitors a GPS device\nand publishes its data over<br />

the network.\n\nThe remote version of this software is vulnerable to format string<br />

attack\ndue to the way it uses the syslog() call. An attacker may exploit this flaw\nto<br />

execute arbitrary code on the remote host.<br />

Solution: Upgrade to gpsd 2.8 or higher.<br />

gpsd Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 2560 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running GPSD, a daemon that monitors a GPS device and publishes its<br />

data over the network.<br />

Solution: Ensure that this server/service is in alignment with corporate policies and guidelines.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 652


Juniper Router Detection<br />

<strong>PVS</strong> ID: 2561 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Juniper Router JUNOS version %L<br />

Solution: Ensure that the host is operating within acceptable corporate policies and standards.<br />

CVE Not available<br />

Juniper Router JUNOS Remote DoS<br />

<strong>PVS</strong> ID: 2562 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running a vulnerable version of the Juniper JUNOS.\nThere is a reported<br />

flaw in this version of JUNOS that would allow a remote attacker to cause the Juniper<br />

router to fail.<br />

Solution: Ensure that the host is operating within acceptable corporate policies and standards.<br />

CVE-2004-0467<br />

Nullsoft Winamp < 5.0.8c IN_CDDA.dll Library Remote Overflow<br />

<strong>PVS</strong> ID: 2563 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:16152<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using Winamp, a popular media player that handles many file formats (mp3, wavs and<br />

more).\nThe remote version of this software is vulnerable to an overflow in the<br />

IN_CDDA.dll library. An attacker can entice a user to open a file or track with a long name<br />

to trigger an overflow on the remote machine.<br />

Solution: Upgrade to Winamp 5.0.8c or higher.<br />

CVE-2004-1150<br />

WarFTPd < 1.82.00-RC9 CWD Command Remote Overflow<br />

<strong>PVS</strong> ID: 2564 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:16270<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

version of WarFTPd running on this host contains a vulnerability that may allow a potential<br />

intruder to craft an FTP 'CWD' command such that it causes the WarFTPd server to crash.<br />

Solution: Upgrade to version 1.82.00-RC9 or higher.<br />

CVE-2005-0312<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 653


MRTG Web Application Detection<br />

<strong>PVS</strong> ID: 2565 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running Multi Router Traffic Grapher (MRTG). MRTG is a web-based<br />

tool that collects data from routers and switches and then displays the information in a<br />

graph format. An attacker perusing this page would be able to gain information regarding<br />

routers, interfaces, traffic patterns, and more. This information could then be used to launch<br />

more sophisticated, targeted attacks.\nThe remote version of MRTG is %L<br />

Solution: Ensure that the page is protected by a password and/or ACLs.<br />

CVE Not available<br />

Mercury Test Director Application Detection<br />

<strong>PVS</strong> ID: 2566 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running Mercury Test Director. Test Director is a web-based<br />

application that is used to aid in the planning, deployment, and testing of Internet<br />

applications. The application leaks information regarding broken applications, servers, and<br />

more.\nThe remote server is running version %L<br />

Solution: Ensure that the application utilizes strong ACLS and/or encryption.<br />

CVE Not available<br />

Lotus Domino Address Book Information Disclosure<br />

<strong>PVS</strong> ID: 2567 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running Lotus Domino's names.nsf application. This<br />

application allows web clients to browse address books via the web. An attacker can use<br />

this information to mount more sophisticated attacks.<br />

Solution: Remove the application or use Access Control Lists (ACLs) to filter access to the<br />

application.<br />

CVE Not available<br />

UW-imapd CRAM-MD5 Authentication Bypass<br />

<strong>PVS</strong> ID: 2568 FAMILY: IMAP Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThere is a flaw in the remote UW-IMAP server that allows an<br />

authenticated user to log into the server as any user. The flaw is in the CRAM-MD5<br />

authentication theme. An attacker exploiting this flaw would only need to identify a<br />

Family Internet Services 654


vulnerable UW-IMAP server that had enabled the CRAM-MD5 authentication scheme. The<br />

attacker would then be able to log in as any valid user.\nIt is important to note that the<br />

IMAP daemon will automatically enable CRAM-MD5 if the /etc/cram-md5.pwd file exists.<br />

Solution: Upgrade or patch according to vendor recommendations. In addition, the fact that<br />

CRAM-MD5 is enabled indicates that the server is storing the IMAP passwords in<br />

plaintext. Ensure that the /etc/cram-md5.pwd file is mode 0400.<br />

CVE-2005-0198<br />

CoolForum < 0.8 SQL Injection<br />

<strong>PVS</strong> ID: 2569 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nCoolForum is a bulletin board written in PHP. This version of CoolForum is<br />

vulnerable to a remote SQL injection attack. An attacker exploiting this flaw would be able<br />

to manipulate data and execute commands on the remote system.<br />

Solution: Upgrade to version 0.8 or higher.<br />

CVE Not available<br />

WebWasher Proxy Server < 3.4 Detection<br />

<strong>PVS</strong> ID: 2570 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThere is a flaw in the remote WebWasher Proxy. The proxy, when issued a<br />

CONNECT command for 127.0.0.1 (or localhost/loopback), will comply with the request<br />

and initiate a connection to the local machine. This bypasses any sort of firewalling as well<br />

as gives access to local applications that are only bound to the loopback.\nThe version of<br />

WebWasher is %L<br />

Solution: upgrade to version 3.4 or higher.<br />

CVE-2005-0316<br />

WebWasher Proxy Server Detection<br />

<strong>PVS</strong> ID: 2571 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software that may be considered<br />

questionable.\n\nThe remote host is running WebWasher, an anonymizing web proxy. A<br />

user accessing this proxy can effectively obfuscate their web traffic to possibly bypass<br />

Acceptable Use Policies..<br />

Solution: Ensure that such a proxy is authorized under corporate policies and guidelines.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 655


Alt-N WebAdmin < 3.0.3 Multiple Remote Vulnerabilities<br />

<strong>PVS</strong> ID: 2572 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:16271<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Alt-N WebAdmin, a web interface to the MDaemon mail server. The remote<br />

version of this software is vulnerable to a cross-site scripting vulnerability due to a lack of<br />

filtering on user-supplied input in the file 'useredit_account.wdm' and the file<br />

'modalframe.wdm'. An attacker may exploit this flaw to steal user credentials. This<br />

software is also vulnerable to an access bypass vulnerability in the file<br />

'useredit_account.wdm'. An attacker may exploit this flaw to modify user account<br />

information. An attacker need a valid email account on the server to exploit both<br />

vulnerabilities.<br />

Solution: Upgrade to WebAdmin 3.0.3 or higher.<br />

CVE-2005-0318<br />

IceWarp Web Mail < 5.3.3 Multiple Vulnerabilities (3)<br />

<strong>PVS</strong> ID: 2573 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:16273<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running IceWarp Web Mail, a webmail solution available for the Microsoft Windows<br />

platform. The remote version of this software is vulnerable to multiple input validation<br />

issues that may allow an attacker to compromise the integrity of the remote host. An<br />

attacker needs a valid account on the webmail to perform an attack.<br />

Solution: Upgrade to IceWarp Web Mail 5.3.3 or higher.<br />

CVE-2005-0321<br />

ngIRCd < 0.8.2 Lists_MakeMask Function Remote Buffer Overflow<br />

<strong>PVS</strong> ID: 2574 FAMILY: Generic RISK: HIGH NESSUS ID:16274<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of the ngIRCd service that may be vulnerable to a buffer overflow in the<br />

way the server handles list names. An attacker may execute code on the remote host by<br />

using a malicious user information.<br />

Solution: Upgrade to ngIRCd 0.8.2 or higher.<br />

CVE-2005-0199<br />

phpPGAds/phpAdNew < 2.0.2 HTTP Response Splitting<br />

<strong>PVS</strong> ID: 2575 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:16276<br />

Family Internet Services 656


Description: Synopsis :\n\nThe remote host is vulnerable to an HTTP splitting attack.\n\nThere is a flaw<br />

in the remote phpAdNew/phpPgAds PHP Ads server, a banner management and tracking<br />

system written in PHP. This version of phpAdNew/phpPgAds is vulnerable to a HTTP<br />

response splitting vulnerability. An attacker exploiting this flaw would be able to redirect<br />

users to another site to steal their credentials.<br />

Solution: Upgrade to version 2.0.2 or higher.<br />

CVE Not available<br />

BitTorrent P2P Protocol Detection<br />

<strong>PVS</strong> ID: 2576 FAMILY: Peer-To-Peer File Sharing RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the BitTorrent P2P protocol.<br />

Solution: N/A<br />

CVE Not available<br />

BitTorrent P2P Client Detection<br />

<strong>PVS</strong> ID: 2577 FAMILY: Peer-To-Peer File Sharing<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is running the following BitTorrent Peer-to-Peer (P2P) Client: %L \n\n<br />

BitTorrent is a protocol for exchanging files in a P2P file-sharing network.<br />

Solution: Ensure that the trading of files over a peer-to-peer network is within the Acceptable Use<br />

Policy.<br />

CVE Not available<br />

BitTorrent P2P Server Detection<br />

<strong>PVS</strong> ID: 2578 FAMILY: Peer-To-Peer File Sharing RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software that may be considered<br />

questionable.\n\nThe remote host is running a BitTorrent Peer-to-Peer (P2P) Server.<br />

BitTorrent is a protocol for exchanging files in a P2P file sharing network. The BitTorrent<br />

Server is a system that is offering files for download from BitTorrent Clients.<br />

Solution: Ensure that the trading of files over a Peer-to-Peer network is within corporate guidelines<br />

and Acceptable Use Policies. You should further ensure that the BitTorrent Server is not<br />

trafficking any confidential or copyrighted materials.<br />

CVE Not available<br />

SmarterMail Attachment Upload XSS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2579 FAMILY: CGI RISK: LOW NESSUS ID:16281<br />

Family Internet Services 657


Description: The remote host is running SmarterMail. SmarterMail is a web interface to a mail server.<br />

This version of SmarterMail is vulnerable to a Cross-Site Scripting (XSS) vulnerability. An<br />

attacker exploiting this flaw would need to be able to convince a user to click on a<br />

malicious link. A successful attack would give the attacker the ability to run code within<br />

the client browser.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

XOOPS Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 2580 FAMILY: CGI RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running XOOPS, a web-portal software written in PHP.<br />

Solution: Ensure that this application is approved with respect to corporate policies and guidelines.<br />

CVE Not available<br />

Lynx Malformed HTML Tags DoS<br />

<strong>PVS</strong> ID: 2581 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is using Lynx as a web browser. The version used is vulnerable to a remote<br />

attack wherein malformed HTML can cause Lynx to go into an infinite loop. An attacker<br />

exploiting this flaw would need to be able to convince a user to browse to a malicious<br />

website. Upon a successful attack, Lynx would take up many resources on the client<br />

machine, possibly causing a crash in either Lynx or the operating system. The version of<br />

Lynx is: \n %L<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-1617<br />

SquirrelMail < 1.4.4 URI Parsing Arbitrary Code Execution<br />

<strong>PVS</strong> ID: 2582 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running SquirrelMail, a webmail system written in PHP. Versions of SquirrelMail prior to<br />

1.4.4-Stable are vulnerable to a remote buffer overflow within the URI parsing<br />

functionality of SquirrelMail. An attacker exploiting this flaw would only need to be able to<br />

send web requests to the vulnerable system.<br />

Solution: Upgrade to version 1.4.4 or higher.<br />

CVE-2005-0152<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 658


PostgreSQL < 8.0.1 Multiple Remote Vulnerabilities<br />

<strong>PVS</strong> ID: 2583 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote PostgreSQL server is vulnerable to a number of critical flaws. Some of these flaws<br />

require an attacker to have a valid account with credentials; however, some of the attacks<br />

do not require the attacker to have any sort of credentials.<br />

Solution: Upgrade to PostgreSQL 8.0.1 or higher.<br />

CVE-2005-0247<br />

Cisco IDS Plaintext Telnet Service Detection<br />

<strong>PVS</strong> ID: 2584 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nThe remote host is running the Cisco IDS %L \nThe IDS administrator has<br />

enabled the plaintext telnet service. An attacker sniffing the local network can determine<br />

the user ID and password required to administer the machine.<br />

Solution: Ensure that telnet is required in order to administer the machine.<br />

CVE Not available<br />

Newspost < 2.0-r1 socket_getline Function Remote Overflow<br />

<strong>PVS</strong> ID: 2585 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using the Newspost NNTP client. Newspost is used to automate the sending of binary files<br />

to different NNTP servers. There is a flaw in this version of Newspost that would allow the<br />

operator of a malicious news server to create a buffer overflow within the Newspost client.<br />

In order to execute this attack, the attacker would need to be able to convince a Newspost<br />

user to submit a post to the malicious NNTP server. The remote host is running Newspost<br />

version: %L<br />

Solution: Upgrade to version 2.0-r1 or higher.<br />

CVE-2005-0101<br />

Ventia DeskNow Multiple Remote Vulnerabilities<br />

<strong>PVS</strong> ID: 2586 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 659


Description: Synopsis :\n\nThe remote Ventia DeskNow server allows unauthorized access to local files<br />

and email.\n\nThe remote host is running Ventia DeskNow Mail And Collaboration Server.<br />

Ventia DeskNow allows multiple users to chat, share files, collaborate and more via a<br />

central Ventia DeskNow server. There is a flaw with the version of DeskNow that allows<br />

files to be modified on the local server, email to be tampered with, and other flaws.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-0332<br />

Savant Web Server Multiple Remote Overflows<br />

<strong>PVS</strong> ID: 2587 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Savant Web Server. This version of Savant is vulnerable to a remote overflow due<br />

to a long user request. An attacker exploiting this flaw would only need to be able to craft a<br />

query to the web server.<br />

Solution: No solution is known at this time.<br />

CVE-2005-0338<br />

Qualcomm Eudora < 6.2.1 Unspecified Remote Overflows<br />

<strong>PVS</strong> ID: 2588 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is running a version of the Eudora mail client that may be vulnerable to at least<br />

one remote buffer overflow.<br />

Solution: Upgrade to version 6.2.1 or higher.<br />

CVE Not available<br />

Mambo Content Server < 4.5.1b Detection Global Variables Overwrite<br />

<strong>PVS</strong> ID: 2589 FAMILY: Web Servers RISK: HIGH NESSUS ID:16312<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running the Mambo Content Server, an application<br />

for generating dynamic content for web servers. The remote application is vulnerable to a<br />

flaw where remote attacks can overwrite global variables used by the application. In doing<br />

so, they can alter the way that the application operates, causing a disclosure of information<br />

or a loss of availability.<br />

Solution: Upgrade to version 4.5.1b or higher.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 660


Sunshop < 3.4RC2 index.php search Parameter XSS<br />

<strong>PVS</strong> ID: 2590 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Sunshop e-commerce shopping cart. This version of<br />

Sunshop is vulnerable to a remote cross-site scripting (XSS) attack. An attacker<br />

exploiting this flaw would need to be able to convince a user to click on a malicious<br />

URL which, when executed, would run potentially malicious code within the client<br />

browser.<br />

Solution: Upgrade to version 3.4RC2 or higher.<br />

CVE Not available<br />

ngIRCd < 0.8.3 Log_Resolver() Remote Format String Overflow<br />

<strong>PVS</strong> ID: 2591 FAMILY: Generic RISK: HIGH NESSUS ID:16310<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of the ngIRCd service that may\nbe vulnerable to a buffer overflow in the<br />

way the server handles user-supplied data which is passed to syslog().<br />

Solution: Upgrade to version 0.8.3 or higher.<br />

CVE-2005-0226<br />

ht://Dig config Parameter XSS<br />

<strong>PVS</strong> ID: 2592 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: The remote version of htsearch appears to be vulnerable to a remote Cross-Site<br />

Scripting (XSS) attack. An attacker exploiting this flaw would need to be able to<br />

entice a user into clicking on a malicious URL that would contain embedded script<br />

code designed to exploit trust and execute within the client browser.\nThe remote<br />

host is running %L<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-0085<br />

WWWBoard Password File Disclosure<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2593 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host appears to be running WWWBoard.<br />

WWWBoard is a web-based forum written in Perl. There is a flaw in the default<br />

configuration of WWWBoard that would allow a remote attacker to retrieve the password<br />

file. To exploit the flaw, the attacker would only need to be able to request the<br />

/wwwboard/passwd.txt file. The attacker could then crack the password file and log into the<br />

machine with enhanced access rights.<br />

Family Internet Services 661


Solution: Upgarde or patch according to vendor recommendations.<br />

CVE-1999-0953<br />

RaidenHTTPd < 1.1.31 Crafted Request Remote File Access<br />

<strong>PVS</strong> ID: 2594 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running RaidenHTTPd. RaidenHTTPd is a<br />

web server that is designed for the Microsoft platform. This version of RaidenHTTPd is<br />

vulnerable to a flaw where an attacker can read any file on the web server by using the<br />

header 'Host: localhost'.\nThe remote version of RaidenHTTPd is %L<br />

Solution: Upgrade to version 1.1.31 or higher.<br />

CVE Not available<br />

3Com 3CServer FTP Server < 2.0 Remote Overflow<br />

<strong>PVS</strong> ID: 2595 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

vulnerable to several remote overflows. An attacker exploiting these flaws would need to<br />

be able to log into the FTP server and run standard FTP commands. If anonymous access is<br />

enabled, the 'Anonymous' account would be sufficient to generate the overflow on the<br />

remote machine.<br />

Solution: Upgrade to version 2.0 or higher.<br />

CVE-2005-0277<br />

BXCP < 0.2.9.8 index.php show Parameter PHP Content Disclosure<br />

<strong>PVS</strong> ID: 2596 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to<br />

retrieve sensitive files or data.\n\nThe remote host is running BXCP. BXCP is a web<br />

application which does content management. There is a flaw in this version of<br />

BXCP that would allow an attacker to view the source code (or content) of any PHP<br />

script on the system. The flaw is due to how the index.php script handles the 'show'<br />

parameter. An attacker exploiting this flaw would be able to use a '../../' directory<br />

traversal syntax within the 'show' parameter, thereby rendering the code of any PHP<br />

script on the system.\nThe remote host is running BXCP version %L<br />

Solution: Upgrade to 0.2.9.8 or higher.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 662


PerlDesk < 2 kb.cgi view Parameter SQL Injection<br />

<strong>PVS</strong> ID: 2597 FAMILY: CGI RISK: HIGH NESSUS ID:16323<br />

Description: The remote host is running PerlDesk, a web-based help desk application\nwritten in<br />

perl.\n\nThe remote version of this software is vulnerable to several SQL\ninjection<br />

vulnerabilities that may allow an attacker to execute\narbitrary SQL statements on the<br />

remote SQL database.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-0343<br />

PHP-Fusion viewthread.php Arbitrary Thread Access<br />

<strong>PVS</strong> ID: 2598 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running a version of PHP-Fusion that is<br />

vulnerable to an information leak via the viewthread.php script. Specifically,<br />

viewthread.php does not properly sanitize $_GET variables. An attacker exploiting this<br />

flaw would be able to view all threads (to include protected threads).<br />

Solution: No solution is known at this time.<br />

CVE-2005-0345<br />

MSN Messenger Version Detection<br />

<strong>PVS</strong> ID: 2599 FAMILY: Internet Messengers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Microsoft MSN Messenger %L<br />

Solution: Ensure that you are running the latest version of MSN Messenger.<br />

CVE Not available<br />

MSN Messenger UserID Detection<br />

<strong>PVS</strong> ID: 2600 FAMILY: Internet Messengers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Microsoft MSN Messenger. <strong>PVS</strong> tracks the most recent UserID<br />

that is logging into the MSN Messenger servers. The UserID used to access MSN<br />

Messenger is %L<br />

realtime<br />

Solution: Ensure that you are running the latest version of MSN Messenger.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 663


Microsoft Media Player Version Detection<br />

<strong>PVS</strong> ID: 2601 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running %L<br />

Solution: Ensure that you are running the latest version of Microsoft Windows Media Player.<br />

CVE Not available<br />

Microsoft Media Player Version 9 PNG Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2602 FAMILY: Generic RISK: HIGH NESSUS ID:16328<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

running Microsoft Media Player Version 9. There is a flaw in this version of Media Player<br />

that would allow a remote attacker to potentially execute code on the target host. Exploiting<br />

this flaw would require that the attacker be able to convince a local user to open an email or<br />

browse to a malicious URL.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-1244<br />

MSN Messenger < 6.2.0205 PNG File Remote Overflow<br />

<strong>PVS</strong> ID: 2603 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:16328<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote<br />

host is running Microsoft MSN Messenger. There is a flaw in this version of MSN<br />

Messenger that would allow a remote attacker to potentially execute code on the<br />

target host. The reported version number is: \n %L<br />

Solution: Upgrade to MSN Messenger 6.2.0205 or higher.<br />

CVE-2004-1244<br />

ArGoSoft FTP Server < 1.4.2.8 Shortcut File Extension Filter Bypass<br />

<strong>PVS</strong> ID: 2604 FAMILY: FTP Servers RISK: HIGH NESSUS ID:16334<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the ArGoSoft FTP Server.\n\nIt is reported that ArGoSoft FTP Server is prone to<br />

a vulnerability that\nallows a user to bypass a filter forbidding link upload. An attacker<br />

\nexploiting this flaw may be able to have read and write access to any\nfiles and<br />

directories on the FTP server.<br />

Solution: Upgrade to ArGoSoft FTP 1.4.2.8 or higher.<br />

CVE-2005-0520<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 664


Policy - RealArcade Gaming Client Detection<br />

<strong>PVS</strong> ID: 2605 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote host is running RealArcade games on the local system.<br />

RealArcade is a piece of software that facilitates the downloading or interactive playing of<br />

computer games.<br />

Solution: Ensure that such activity is allowed under corporate policies and guidelines.<br />

CVE Not available<br />

ArGoSoft Mail Server < 1.8.7.4 HTML Injection<br />

<strong>PVS</strong> ID: 2606 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:16364<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running the ArGoSoft Mail Server. This<br />

version of ArGoSoft is prone to several vulnerabilities. Specifically, an attacker can use a<br />

directory traversal attack to gain access to sensitive data. Further, an attacker can add or<br />

delete folders. Note: Both of these vulnerabilities would require that the attacker have a<br />

valid user account.<br />

Solution: Upgrade to version 1.8.7.4 or higher.<br />

CVE Not available<br />

GNU Mailman < 2.1.6 Directory Traversal Arbitrary File Access<br />

<strong>PVS</strong> ID: 2607 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:16339<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data\n\nThe remote host is running GNU Mailman, a web based software<br />

to manage mailing lists. There is a flaw in this version of Mailman that would allow a<br />

remote attacker to retrieve potentially confidential data. Specifically, the CGI script<br />

'private.py' does not properly parse user-supplied data and would allow an attacker to read<br />

any file on the operating system that was readable by the web process.<br />

Solution: Upgrade to version 2.1.6 or higher.<br />

CVE-2005-0202<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Apache mod_python < 3.1.4 Information Disclosure<br />

<strong>PVS</strong> ID: 2608 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 665


Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote Apache server is running a version of mod_python that is older than<br />

3.1.4. This version contains a flaw wherein specially formatted requests can cause<br />

mod_python to divulge information regarding paths, file locations, and more. An attacker<br />

can use this flaw in order to gain more information about the machine.<br />

Solution: Upgrade to mod_python 3.1.4 or higher.<br />

CVE-2005-0088<br />

PGP Email Client Detection<br />

<strong>PVS</strong> ID: 2609 FAMILY: SMTP Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running PGP. PGP is an encryption software often used in conjunction<br />

with email. The sending email address is\n%L<br />

realtime<br />

Solution: Ensure that the use of PGP is within corporate guidelines.<br />

CVE Not available<br />

Generic Email Client Detection<br />

<strong>PVS</strong> ID: 2610 FAMILY: SMTP Clients RISK: INFO NESSUS ID:Not Available<br />

Description: Generic check for an email client.<br />

Solution: N/A<br />

CVE Not available<br />

Generic Email Client Detection<br />

<strong>PVS</strong> ID: 2611 FAMILY: SMTP Clients RISK: INFO NESSUS ID:Not Available<br />

Description: Generic check for an email client.<br />

Solution: N/A<br />

CVE Not available<br />

IBM WebSphere JSP Engine Source Disclosure<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2612 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote WebSphere web server is vulnerable to an<br />

information leak. There is a flaw in the JSP engine that would allow a remote<br />

attacker to view the source code of any of the web server scripts. An attacker<br />

Family Internet Services 666


exploiting this flaw would only need to be able to send HTTP requests to the web<br />

server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

AWStats < 6.5 Perl Content-Parsing Code Execution<br />

<strong>PVS</strong> ID: 2613 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:19415<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an arbitrary 'command insertion'<br />

flaw.\n\nThe remote host is running AWStats, a CGI log analyzer. There are various<br />

content-parsing flaws in the remote version of this software that would allow an attacker to<br />

execute code on the remote host. An attacker exploiting this flaw would only need to be<br />

able to generate HTTP requests to the awstats.pl CGI script. A successful attack would<br />

allow the attacker to run system commands with the privileges of the CGI script.<br />

Solution: Upgrade to AWStats 6.5 or higher.<br />

CVE-2005-1527<br />

Sympa < 4.1.3 src/queue.c Remote Buffer Overflow<br />

<strong>PVS</strong> ID: 2614 FAMILY: CGI<br />

Description: The remote host is running Sympa.<br />

Solution: Upgrade to version 4.1.3 or higher.<br />

CVE-2005-0073<br />

BEA WebLogic < 8.1.0 SP4 Information Disclosure<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:16387<br />

<strong>PVS</strong> ID: 2615 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running BEA WebLogic. This version of WebLogic is<br />

vulnerable to an information disclosure flaw. Specifically, failed logins yield information<br />

regarding authentication scheme, validity of user ID, and more.<br />

Solution: Upgrade to WebLogic 8.1.0 SP4 or higher.<br />

CVE-2005-1380<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

OpenWebmail openwebmail.pl logindomain Parameter XSS<br />

<strong>PVS</strong> ID: 2616 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 667


Description: The remote host is running OpenWebmail, an open-source perl script that gives remote<br />

users a web-based interface to email. This version of OpenWebmail is vulnerable to a<br />

cross-site scripting (XSS) attack. An attacker exploiting this flaw would be need to be able<br />

to convince a user to click on a malicious URL. Upon successful exploitation, the attacker<br />

would be able to steal credentials or execute code within the browser.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-0445<br />

Brooky CubeCart Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2617 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is using Brooky CubeCart, an online storefront application written in PHP.<br />

This version of CubeCart is vulnerable to a path disclosure and cross-site scripting<br />

vulnerability.<br />

Solution: Upgrade to Brooky CubeCart 2.0.5 or higher.<br />

CVE-2005-0442<br />

ELOG < 2.5.7 Unspecified Remote Buffer Overflows<br />

<strong>PVS</strong> ID: 2618 FAMILY: CGI RISK: HIGH NESSUS ID:16469<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple remote buffer overflows.\n\nThe<br />

remote server is running ELOG, an open source logbook web application. This version of<br />

ELOG is reported to be prone to multiple remote overflows. An attacker exploiting these<br />

alleged flaws would be able to execute code on the remote webserver.<br />

Solution: Upgrade to ELOG 2.5.7 or higher.<br />

CVE-2005-0439<br />

Siteman users.php Remote Buffer Overflow<br />

<strong>PVS</strong> ID: 2619 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:16216<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Siteman, a web-based content management system. This version of Siteman is<br />

vulnerable to a remote buffer overflow in the users.php script. An attacker exploiting this<br />

flaw would be able to gain 'site owner' access.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2008-0452<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 668


Sami HTTP Server v1.0.5 Remote Overflow<br />

<strong>PVS</strong> ID: 2620 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:16468<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host<br />

appears to be running Sami HTTP Server v1.0.5 or older. A vulnerability has been reported<br />

for Sami HTTP server v1.0.5. An attacker may be capable of corrupting data such as return<br />

address, and thereby control the execution flow of the program. This may result in denial of<br />

service or execution of arbitrary code.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Kayako eSupport Multiple XSS<br />

<strong>PVS</strong> ID: 2621 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17598<br />

Description: The remote host is running Kayako eSupport, a web-based support and help desk<br />

application. This version of Kayako is vulnerable to a Cross-Site Scripting (XSS) attack.<br />

An attacker exploiting this flaw would need to be able to convince an unsuspecting user to<br />

visit a malicious website. Upon successful exploitation, the attacker would be able to<br />

possibly steal credentials or execute browser-side code.\nThe remote host is running %L<br />

Solution: Upgrade to a version greater than 2.3.1.<br />

CVE-2005-2463<br />

BrightStor ARCserve/Enterprise Backup Default Account<br />

<strong>PVS</strong> ID: 2622 FAMILY: Generic RISK: HIGH NESSUS ID:16390<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running UniversalAgent, an agent used by BrightStor<br />

ARCserve to perform backups. The remote version of this agent contains a default account<br />

with the username '\x02root\x03' and password '\x02


services, and more.\nIn addition, according to the version number, the remote host is<br />

vulnerable to a number of remote overflows.<br />

Solution: Upgrade to version 5.96 or higher.<br />

CVE-2005-4823<br />

Lighttpd < 1.3.8 CGI Source Disclosure<br />

<strong>PVS</strong> ID: 2624 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:16475<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running Lighttpd, a small webserver. This<br />

version of Lighttpd is vulnerable to a flaw where an attacker requesting a CGI script<br />

appended by a '%00' will be able to read the source of the script.<br />

Solution: Upgrade to 1.3.8 or higher.<br />

CVE-2005-0453<br />

DCP-Portal < 6.1.2 Multiple SQL Injection<br />

<strong>PVS</strong> ID: 2625 FAMILY: Web Servers RISK: HIGH NESSUS ID:16478<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running a version of DCP-Portal that is reported prone to a<br />

remote SQL injection flaw. An attacker exploiting this flaw would be able to execute<br />

commands, view data, and manipulate data by sending malformed HTTP requests to the<br />

web server.<br />

Solution: Upgrade to version 6.1.2 or higher.<br />

CVE-2005-4227<br />

PaNews Multiple Injection Vulnerabilities<br />

<strong>PVS</strong> ID: 2626 FAMILY: CGI RISK: HIGH NESSUS ID:17574<br />

Description: The remote host is running PaNews, a news management script\nwritten in PHP.\n\nThis<br />

version of PaNews is vulnerable to a Cross-Site Scripting (XSS)\nattack.\n\nAn attacker<br />

exploiting this flaw would need to be able to convince\nan unsuspecting user to visit a<br />

malicious website. Upon\nsuccessful exploitation, the attacker would be able to<br />

possibly\nsteal credentials or execute browser-side code.\n\nThe version of PaNews is also<br />

reported to be prone to several remote SQL and HTML injection attacks. An attacker<br />

exploiting these flaws would be able to potentially modify and view confidential data.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-0647<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 670


MercuryBoard < 1.1.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2627 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running MercuryBoard, a web-based Message board\nwritten<br />

in PHP.\n\nThis version of MercuryBoard is vulnerable to a Cross-Site Scripting<br />

(XSS)\nattack\n\nAn attacker exploiting this flaw would need to be able to convince\nan<br />

unsuspecting user to visit a malicious website. Upon\nsuccessful exploitation, the attacker<br />

would be able to possibly\nsteal credentials or execute browser-side code.\n\nIn addition,<br />

the remote host is vulnerable to a SQL Injection attack. An attacker exploiting this flaw<br />

would be able to read data, modify data, or execute commands.<br />

Solution: Upgrade to version 1.1.3 or higher.<br />

CVE-2005-0878<br />

WebCalendar users.php user_valid_crypt Parameter < 1.0.0 SQL Injection<br />

<strong>PVS</strong> ID: 2628 FAMILY: CGI RISK: HIGH NESSUS ID:18571<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running WebCalendar, a web-based calendar management<br />

program. This version of WebCalendar is vulnerable to a SQL injection attack via the<br />

user_valid_crypt parameter of the users.php script. An attacker exploiting this flaw would<br />

be able to read/modify data or execute commands as the web server process.<br />

Solution: Upgrade to version 1.0.0 or higher.<br />

CVE-2005-2320<br />

paFAQ Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2629 FAMILY: CGI RISK: HIGH NESSUS ID:18535<br />

Description: Synopsis :\n\nThe remote web server contains scripts that are vulnerable to a SQL<br />

injection attack.\n\nThe remote host is running paFAQ, a web-based 'Frequently<br />

Asked Questions' (FAQ) generator. This version of paFAQ is vulnerable to a SQL<br />

injection attack. An attacker exploiting this flaw would be able to read/modify data<br />

or execute commands as the web server process.\nIn addition, this version of<br />

paFAQ is vulnerable to a remote cross-site scripting (XSS) flaw as well as a flaw<br />

within the backup.php script that would allow a remote attacker full access to the<br />

application database.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-2014<br />

Yahoo! Messenger < 6.0.0.1750 Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2630 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 671


Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is running a version of Yahoo Instant Messenger that is reported vulnerable to<br />

several security flaws.<br />

Solution: Upgrade to version 6.0.0.1750 or higher.<br />

CVE-2005-0242<br />

Gaim < 1.1.3 Multiple DoS Vulnerabilities<br />

<strong>PVS</strong> ID: 2631 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host appears to be running Gaim, a popular open-source multi-protocol instant<br />

messenger. It is reported that this version of Gaim is prone to multiple Denial of Service<br />

(DoS) vulnerabilities that may allow an attacker to disable this client remotely. An attacker<br />

exploiting this flaw would need to be able to initiate a chat session with the Gaim client. A<br />

successful exploit would result in the Gaim client crashing.<br />

Solution: Update to Gaim 1.1.3 or higher.<br />

CVE-2005-0473<br />

TrackerCam Multiple Remote Overflows<br />

<strong>PVS</strong> ID: 2632 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running TrackerCam. TrackerCam is a web server that allows remote users to view<br />

real-time video streams from an attached camera. This version of TrackerCam is vulnerable<br />

to multiple remote buffer overflows. An attacker exploiting one of these flaws would<br />

connect to the web server and send a large malformed request. Successful exploitation<br />

would result in the attacker being able to run arbitrary commands on the web server.<br />

Solution: Upgrade to a version of TrackerCam higher than 5.12.<br />

CVE-2005-0482<br />

Knox Arkeia <strong>Network</strong> Backup Agent Detection<br />

<strong>PVS</strong> ID: 2633 FAMILY: Generic RISK: HIGH NESSUS ID:17157<br />

Description: The remote host is running Arkea <strong>Network</strong> Backup agent, an agent system\ndesigned to<br />

remotely perform backups of the remote host.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 672


Knox Arkeia <strong>Network</strong> Backup Server Detection<br />

<strong>PVS</strong> ID: 2634 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Arkeia <strong>Network</strong> Backup Server. This server is used to<br />

automatically connect to client machines and retrieve backups on a regular schedule.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Knox Arkeia Type 77 Request Remote Buffer Overflow<br />

<strong>PVS</strong> ID: 2635 FAMILY: Generic RISK: HIGH NESSUS ID:17158<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Arkea <strong>Network</strong> Backup agent, an agent system designed to remotely perform<br />

backups of the remote host. The remote version of this agent contains a buffer overflow<br />

vulnerability that may allow an attacker to execute arbitrary commands on the remote host<br />

with the privileges of the Arkeia daemon.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-0491<br />

ZeroBoard Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2636 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running ZeroBoard, a web-based bulletin board written in PHP. This version<br />

of Zeroboard is vulnerable to a cross-site scripting (XSS) flaw as well as a flaw in the<br />

'preg_replace' function. An attacker exploiting\n these flaws would require that the attacker<br />

be able to:\n1) convince an unsuspecting user to visit a malicious website\n2) send HTTP<br />

requests that are parsed by the 'preg_replace' function. Successful exploitation leads to<br />

arbitrary code execution on the remote system or arbitrary code executing in client<br />

browsers (after following a malicious URI).<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-1820<br />

PuTTY < 0.57 SFTP Remote Buffer Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2637 FAMILY: SSH RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using a vulnerable version of PuTTY, a SSH client built for Linux and UNIX variants as<br />

well as Microsoft Windows operating systems. This version of PuTTY does not properly<br />

handle an integer value passed from the SSH Server during an SFTP connection. An<br />

attacker exploiting this flaw would need to be able to convince a user to use PuTTY to<br />

Family Internet Services 673


initiate an SFTP connection to a malicious SSH server. Successful exploitation would result<br />

in PuTTY crashing or possibly executing arbitrary commands. The version of PuTTY<br />

installed on the remote host is: %L<br />

Solution: Upgrade to PuTTY 0.57 or higher.<br />

CVE-2005-0467<br />

Mambo Content Server Detection Global Variables Overwrite<br />

<strong>PVS</strong> ID: 2638 FAMILY: Web Servers RISK: HIGH NESSUS ID:18495<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the Mambo Content Server, an application for generating dynamic content for<br />

web servers. The remote application is vulnerable to a flaw where remote attackers can<br />

upload malicious code. The code can then be executed by simply requesting the code via an<br />

HTTP session. The specific flaw is within the Tar.php script, which does not properly<br />

sanitize user-supplied content. Versions of Mambo through 4.5.2.3 are prone to a remote<br />

'file include' flaw. An attacker exploiting this flaw would be able to specify malicious code<br />

that would be run by the Mambo server.<br />

Solution: Upgrade to a version of Mambo higher than 4.5.2.<br />

CVE-2005-3738<br />

WebConnect Multiple Remote Vulnerabilities<br />

<strong>PVS</strong> ID: 2639 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running OpenConnect WebConnect. WebConnect is a web-based graphical user interface<br />

that gives remote users console access to mainframe, midrange, and Unix systems.<br />

WebConnect can be used to launch a Java-based telnet console that communicates over the<br />

HTTP protocol. This version of WebConnect is vulnerable to several remote attacks. The<br />

impact of the attack ranges from Denial of Service (DoS) to data compromise. An attacker<br />

exploiting these flaws would only need to be able to send HTTP requests to the web server.<br />

Successful exploitation would result in compromise of data or loss of availability.\nThe<br />

remote host is running WebConnect version %L<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-0465<br />

Curl < 7.13.1 NTLM Stack-based Buffer Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2640 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using a version of curl (or libcurl) that is vulnerable to several remote buffer overflows. To<br />

exploit this vulnerability, an attacker would have to set up a rogue web server that would<br />

reply with a malicious NTLM or Kerberos authentication request. Upon successful<br />

Family Internet Services 674


exploitation, the attacker would be able to execute arbitrary commands with the rights of<br />

the web server.<br />

Solution: Upgrade to version 7.13.1 or higher.<br />

CVE-2005-0490<br />

phpBB < 2.0.12 Path Disclosure / Unauthorized unlink() Function Access<br />

<strong>PVS</strong> ID: 2641 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running phpBB, a web-based forum application written in PHP. There is a flaw in this<br />

version of phpBB that will allow a remote attacker to disclose paths. This sort of<br />

information may be useful for further attacks.\nThere is another flaw within the<br />

usercp_avatar.php script that would allow a remote user to pass arbitrary files to the<br />

unlink() function. The unlink() function deletes files. A successful attack would delete<br />

arbitrary files on the web server.<br />

Solution: Upgrade to version 2.0.12 or higher.<br />

CVE-2005-0259<br />

vBulletin < 3.0.7 misc.php PHP Code Injection<br />

<strong>PVS</strong> ID: 2642 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML injection attack.\n\nThe remote<br />

host is running a version of vBulletin, a forum application implemented in PHP, that is<br />

vulnerable to a flaw in the misc.php script. The flaw allows a remote attacker the ability to<br />

execute PHP code on the server. An attacker exploiting this flaw would pass malformed<br />

data to the 'template' parameter of the misc.php script.<br />

Solution: Upgrade to version 3.0.7 or higher.<br />

CVE-2005-0511<br />

PBLang Bulletin Board Multiple HTML Injection and XSS<br />

<strong>PVS</strong> ID: 2643 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17209<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running PBLang, a bulletin board system written in PHP. This version of PBLang is<br />

vulnerable to a remote Cross-Site Scripting (XSS) flaw. In addition, this version of PBLang<br />

is vulnerable to an HTML injection flaw within the pmpshow.php script. An attacker<br />

exploiting these flaws would be need to be able to convince a user to click on a malicious<br />

URL. Upon successful exploitation, the attacker would be able to steal credentials or<br />

execute code within the browser. A third flaw, which does not require user interaction, has<br />

Family Internet Services 675


een discovered with this version of PBLang. Specifically, files outside of the web root<br />

may be displayed to remote users. This sort of attack is known as a 'directory-traversal'<br />

attack, and would allow an attacker to craft a remote query such that the returned data<br />

would contain potentially confidential data (/etc/passwd file, HTTPD configuration files,<br />

and more.)<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-0630<br />

ProZilla < 1.3.7.4 Location Header Format String<br />

<strong>PVS</strong> ID: 2644 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote client is vulnerable to a remote overflow.\n\nThe remote host is<br />

using Prozilla, a download accelerator for Linux and Unix systems. The remote version of<br />

this software contains a flaw in the way that it handles server HTTP headers. Specifically,<br />

Prozilla does not properly handle format strings, which would allow the remote attacker to<br />

execute arbitrary code on the client (Prozilla) machine. An attacker exploiting this flaw<br />

would need to be able to convince a user to browse a malicious website. In addition, the<br />

remote host is reported vulnerable to a remote buffer overflow. The details of this overflow<br />

have not been made public at this time.<br />

Solution: Upgrade to version 1.3.7.4 or higher.<br />

CVE-2005-2961<br />

Cyrus IMAPD < 2.2.12 Multiple Remote Overflows<br />

<strong>PVS</strong> ID: 2645 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:17208<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nAccording to its<br />

banner, the remote Cyrus IMAPD server is vulnerable to multiple remote buffer overflow<br />

attacks. An attacker exploiting these flaws would need to be able to communicate with the<br />

IMAPD server (usually on TCP port 143). A successful attack would result in the attacker<br />

executing arbitrary code on the IMAPD server.<br />

Solution: Upgrade to version 2.2.12 or higher.<br />

CVE-2005-0546<br />

Fedora YUM Updater Detection<br />

<strong>PVS</strong> ID: 2646 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Fedora YUM updater.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 676


Fedora FC3 Yum Updates Detection<br />

<strong>PVS</strong> ID: 2647 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Fedora Linux (Core 3) and is using Yum to keep packages up to<br />

date. Yum is similar to the RedHat package manager and allows remote users to download,<br />

verify, and install software and/or patches via the central Fedora servers on the Internet.<br />

Solution: Ensure that both Yum and auto-patching are desired and supported with respect to existing<br />

policies and guidelines.<br />

CVE Not available<br />

Fedora FC2 Yum Update Detection<br />

<strong>PVS</strong> ID: 2648 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Fedora Linux (Core 2) and is using Yum to keep packages up to<br />

date. Yum is similar to the RedHat package manager and allows remote users to download,<br />

verify, and install software and/or patches via the central Fedora servers on the Internet.<br />

Solution: Ensure that both Yum and auto-patching are desired and supported with respect to existing<br />

policies and guidelines.<br />

CVE Not available<br />

Fedora FC1 Yum Update Detection<br />

<strong>PVS</strong> ID: 2649 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Fedora Linux (Core 1) and is using Yum to keep packages up to<br />

date. Yum is similar to the RedHat package manager and allows remote users to download,<br />

verify, and install software and/or patches via the central Fedora servers on the Internet.<br />

Solution: Ensure that both Yum and auto-patching are desired and supported with respect to existing<br />

policies and guidelines.<br />

CVE Not available<br />

IDA Pro Software Detection<br />

<strong>PVS</strong> ID: 2650 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote client is running the IDA Pro Disassembler Program. This program is used to<br />

analyze binary files.<br />

Solution: Ensure that this behavior is authorized for your network and that the version of IDA Pro is<br />

properly licensed.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 677


punBB < 1.2.2 Multiple SQL Injection and Authentication Bypass Vulnerabilities<br />

<strong>PVS</strong> ID: 2651 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running punBB, a web-based bulletin board. punBB works in<br />

conjunction with a SQL database. This version of punBB is vulnerable to several SQL<br />

injection flaws as well as an authentication bypass flaw. An attacker exploiting these flaws<br />

would only need to be able to send HTTP traffic to the web server. A successful SQL<br />

injection attack would give the attacker the ability to execute commands on the SQL server,<br />

view data, and modify data. A successful authentication bypass attack would give the<br />

attacker the ability to perform administrative tasks on the web server.<br />

Solution: Upgrade to version 1.2.2 or higher.<br />

CVE-2005-0570<br />

Firefox < 1.0.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2652 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17603<br />

Description: Synopsis : \n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is using Firefox. The remote version of this software contains the following<br />

security flaws: \n1) There is a flaw in the way that the browser handle scripting within<br />

'tabbed' cross-domains. An attacker exploiting this flaw would need to be able to coerce a<br />

user into clicking on a malicious URL which would then open a separate 'TAB' within the<br />

browser. The attacker could then retrieve data relevant to other tabbed connections or<br />

execute code locally.\n2)There is a flaw in the default about: config script that would allow<br />

an attacker to modify configuration data. In order to execute such an attack, the attacker<br />

would need to be able to entice the user into visiting or clicking on a malicious URL. A<br />

successful attacker would be able to modify the local configuration file, resulting in<br />

enhanced access rights or other potential exploits. The reported browser version (as seen on<br />

the network) is: \n %L<br />

Solution: Upgrade to Firefox 1.0.1 or higher.<br />

CVE-2005-0231<br />

Brooky CubeCart < 2.0.6 settings.inc.php XSS<br />

<strong>PVS</strong> ID: 2653 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is using Brooky CubeCart, an online storefront application written in PHP.<br />

This version of CubeCart is vulnerable to a Cross-Site Scripting (XSS) flaw within the<br />

default parser. An attacker exploiting these flaws would be need to be able to convince a<br />

user to click on a malicious URL. Upon successful exploitation, the attacker would be able<br />

to steal credentials or execute code within the browser.<br />

Solution: Upgrade to version 2.0.6 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 678


CVE-2005-0606<br />

Gaim < 1.1.4 Remote DoS<br />

<strong>PVS</strong> ID: 2654 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host appears to be running Gaim, a popular open-source multi-protocol instant<br />

messenger. It is reported that this version of Gaim is prone to a flaw in the way that it<br />

handles malformed HTML data. An attacker exploiting this flaw would need to be able to<br />

communicate with a vulnerable GAIM user. Upon successful exploitation, the Gaim client<br />

would stop responding.\nThere is a second issue with this version of Gaim that is similar to<br />

the first. Specifically, downloaded files which include bracket characters like '(' or ')' will<br />

cause the client to crash.<br />

Solution: Update to Gaim 1.1.4 or higher.<br />

Gaim Detection<br />

CVE-2005-0208<br />

<strong>PVS</strong> ID: 2655 FAMILY: Internet Messengers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host seems to be running Gaim, a popular open-source multi-protocol instant<br />

messenger.<br />

Solution: N/A<br />

CVE Not available<br />

PeerFTP Client Detection<br />

<strong>PVS</strong> ID: 2656 FAMILY: Peer-To-Peer File Sharing RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote host is running PeerFTP. PeerFTP is a peer-to-peer<br />

application that utilizes the FTP protocol. PeerFTP is both a client and a server application.<br />

The remote host is offering files for download as well as downloading files. Further, as the<br />

host is running PeerFTP version 5, there is a flaw in the way that passwords are stored. All<br />

passwords are stored locally as plaintext.<br />

Solution: No solution is known at this time.<br />

CVE-2005-0517<br />

BadBlue < 2.60 'GET' Request Remote Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2657 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 679


Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote BadBlue<br />

web server has a bug in the way it processes long 'GET' requests. An overly long request<br />

results in a buffer overflow that would give a remote attacker the abillity to execute<br />

arbitrary commands as the SYSTEM user.<br />

Solution: Upgrade to version 2.60 or higher.<br />

CVE-2005-0595<br />

phpBB < 2.0.13 Cookie Authentication Bypass<br />

<strong>PVS</strong> ID: 2658 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the<br />

bypassing of authentication.\n\nThe remote host is running phpBB, a<br />

web-based forum application written in PHP. There is a flaw in this version of<br />

phpBB that will allow a remote attacker to bypass the login process.<br />

Specifically, a malformed cookie, when processed by phpBB, will always result<br />

in a 'true' value.<br />

Solution: Upgrade to version 2.0.13 or higher.<br />

CVE-2005-0614<br />

Policy - WebMod Gaming HTTP Server Detection<br />

<strong>PVS</strong> ID: 2659 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with<br />

respect to corporate policy.\n\nThe remote host is running WebMod. WebMod is<br />

a web server that is used in popular online games (such as Half-Life). WebMod is<br />

the administrative interface to the currently-running game. The existence of<br />

WebMod indicates that there is a game server currently serving up game<br />

scenarios.<br />

Solution: Ensure that this sort of gaming is in alignment with corporate policies and guidelines.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

WebMod < 0.48 HTTP Server 'Content-Length' Heap Overflow<br />

<strong>PVS</strong> ID: 2660 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a heap overflow.\n\nThe remote<br />

host is running WebMod. WebMod is a web server that is used in popular online<br />

games (such as Half-Life). WebMod is the administrative interface to the<br />

currently-running game. This version of WebMod is vulnerable to a remote heap<br />

overflow. The flaw is in the way that WebMod handles large 'Content-Length'<br />

HTTP headers.<br />

Family Internet Services 680


Solution: Upgrade to version 0.48 or higher.<br />

CVE-2005-0608<br />

FCKeditor with PHPNuke connector.php File Upload<br />

<strong>PVS</strong> ID: 2661 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a 'file upload' flaw.\n\nThe remote<br />

host is running FCKeditor plugin for PHPNuke. FCKeditor is a web-based<br />

document editor. This version of FCKeditor is vulnerable to a flaw in the way that<br />

it verifies file extensions for file uploads. An attacker exploiting this flaw would be<br />

able to upload potentially malicious code to the web server that might, under certain<br />

circumstances, be executable via a remote HTTP request.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-0613<br />

PostNuke < 0.760 RC3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2662 FAMILY: CGI RISK: HIGH NESSUS ID:17240<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running PostNuke version 0.760 RC2 or older.<br />

These\nversions suffer from several vulnerabilities, among them :\n\n*) SQL injection<br />

vulnerability in the News, NS-Polls and\nNS-AddStory modules.\n*) SQL injection<br />

vulnerability in the Downloads module.\n*)Cross-site scripting vulnerabilities in the<br />

Downloads\nmodule.\n*) Possible path disclosure vulnerability in the News module.\n\nAn<br />

attacker may use the SQL injection vulnerabilities to obtain the\npassword hash for the<br />

administrator or to corrupt the \ndatabase used by PostNuke.\n\nExploiting the XSS flaws<br />

may enable an attacker to inject arbitrary\nscript code into the browser of site<br />

administrators leading to\ndisclosure of session cookies.\n\nThe remote host is running %L<br />

Solution: Upgrade to version 0.760 RC3 or higher.<br />

CVE-2005-0616<br />

phpCOIN 1.2.1b Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2663 FAMILY: CGI RISK: HIGH NESSUS ID:17246<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running phpCOIN version 1.2.1b or older. These\nversions<br />

suffer from several vulnerabilities, among them :\n\n*) Multiple SQL injection<br />

vulnerabilities.\nBy calling the 'faq' module with a specially crafted \n'faq_id' parameter or<br />

the 'pages' or 'site' modules with a \nspecially crafted 'id' parameter, a remote attacker may<br />

be\nable to manipulate SQL queries used by the program, thereby \nrevealing sensitive<br />

information or even corrupting the\ndatabase.\n\n*) Multiple cross-site scripting<br />

vulnerabilities.\nA remote attacker may be able to inject arbitrary code\ninto the 'helpdesk'<br />

and 'mail' modules as well as the\n'login.php' script by appending it to a valid<br />

Family Internet Services 681


equest.\nSuccessful exploitation may allow an attacker to steal\nauthentication cookies or<br />

misrepresent site content.<br />

Solution: Upgrade to phpCOIN 1.2.1b if necessary and then apply the Fix File.<br />

CVE-2005-0947<br />

RaidenHTTPd < 1.1.33 Remote Buffer Overflow<br />

<strong>PVS</strong> ID: 2664 FAMILY: Web Servers RISK: HIGH NESSUS ID:17243<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running RaidenHTTPd. RaidenHTTPd is a web server that is designed for the Microsoft<br />

platform. This version of RaidenHTTPd is vulnerable to a flaw where an attacker can<br />

execute code as the SYSTEM user. An attacker exploiting this flaw would only need to<br />

send a URI request that exceeds 524 bytes.<br />

Solution: Upgrade to RaidenHTTPd 1.1.33 or higher.<br />

CVE Not available<br />

PHPNews < 1.2.5 auth.php path Parameter Remote File Inclusion<br />

<strong>PVS</strong> ID: 2665 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17247<br />

Description: Synopsis :\n\nThe remote host may be tricked into running an executable file.\n\nThe<br />

remote host is running a version of PHPNews, an open source news\napplication, that has a<br />

remote file inclusion vulnerability in auth.php. \nBy leveraging this flaw, a attacker can<br />

cause arbitrary PHP code to be\nexecuted on the remote host using the permissions of the<br />

web server\nuser.<br />

Solution: Upgrade to version 1.2.5 or higher.<br />

CVE-2005-0632<br />

RealPlayer < 6.0.12.1059 Multiple Remote Overflows<br />

<strong>PVS</strong> ID: 2666 FAMILY: Web Clients RISK: HIGH NESSUS ID:17254<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host has<br />

the RealPlayer software installed.\n\nThere are several flaws in the remote version of this<br />

software that might allow\nan attacker to execute arbitrary code and delete arbitrary files on<br />

the remote\nhost.\n\nTo exploit these flaws, an attacker would need to send a malformed<br />

SMIL or\nWAV file to a user on the remote host and wait for the file to be opened in<br />

RealPlayer.<br />

Solution: Upgrade to version 6.0.12.1059 or higher.<br />

CVE-2005-0455<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 682


Golden FTP Server < 1.93 USER Remote Overflow<br />

<strong>PVS</strong> ID: 2667 FAMILY: FTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the Golden FTP Server. This version of Golden FTP is vulnerable to a remote<br />

buffer overflow when given a long USER name. An attacker exploiting this flaw would be<br />

able to execute arbitrary commands as the SYSTEM user.\nThe remote version of Golden<br />

FTP Server is %L<br />

Solution: Upgrade to version 1.93 or higher.<br />

CVE-2005-0634<br />

Typo3 < 1.4.2 cmw_linklist SQL Injection<br />

<strong>PVS</strong> ID: 2668 FAMILY: CGI RISK: HIGH NESSUS ID:17272<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running Typo3, a web-based content management system.<br />

This version of Typo3 is vulnerable to a remote SQL injection attack. An attacker<br />

exploiting this flaw would send a specially crafted HTTP query to the Typo3 application.<br />

Successful exploitation would result in leaking of confidential data, modification of data,<br />

and potentially executing arbitrary commands with the full rights of the web server process.<br />

Solution: Upgrade to version 1.4.2 or higher.<br />

CVE-2005-0658<br />

Squid < 2.5.STABLE10 Set-Cookie Authentication Information Disclosure<br />

<strong>PVS</strong> ID: 2669 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may facilitate the theft of authentication data.\n\nThe remote<br />

Squid caching proxy, according to its version number,\nis vulnerable to an attack where the<br />

attacker gains access to Set-Cookie headers for another user. Such an attack would allow<br />

the attacker to gain access to resources with the credentials of another user.<br />

Solution: Upgrade to squid 2.5.STABLE10 or higher.<br />

CVE-2005-1519<br />

CProxy Directory Traversal Arbitrary File Access / DoS<br />

<strong>PVS</strong> ID: 2670 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running CProxy, a Web/Mail proxy server. This version of CProxy is vulnerable to a<br />

flaw where a remote attacker can download any file from the server (even outside the<br />

webroot) by using a '../' type of query. In addition, if the requested file is a .exe which does<br />

Family Internet Services 683


not exist, then the server may crash. At the least, this would cause a Denial of Service<br />

(DoS) against the service and attached users.<br />

Solution: No solution is known at this time.<br />

CVE-2005-0657<br />

Mozilla < 1.7.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2671 FAMILY: Web Clients RISK: HIGH NESSUS ID:17604<br />

Description: Synopsis : \n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is using Mozilla, a web browser. The remote version of this software contains<br />

the following security flaws: \n1) There is a flaw in the way that the browser handles<br />

scripting within 'tabbed' cross-domains. An attacker exploiting this flaw would need to be<br />

able to convince a user to click on a malicious URL which would then open a separate<br />

'TAB' within the browser. The attacker could then retrieve data relevant to other tabbed<br />

connections or execute code locally.\n2)There is a flaw in the default about: config script<br />

that would allow an attacker to modify configuration data. In order to execute such an<br />

attack, the attacker would need to be able to entice the user into visiting or clicking on a<br />

malicious URL. A successful attacker would be able to modify the local configuration file,<br />

resulting in enhanced access rights or other potential exploits. In addition, there are other<br />

unconfirmed flaws in Mozilla version 1.7.5 and lower. The reported browser version (as<br />

seen on the network) is: \n %L<br />

Solution: Upgrade to Mozilla 1.7.6 or higher.<br />

CVE-2005-0231<br />

Sylpheed < 1.0.3 Invalid Header Overflow<br />

<strong>PVS</strong> ID: 2672 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote client is<br />

running Sylpheed, an email client for Unix and Unix-like operating systems. This version is<br />

vulnerable to a buffer overflow via invalid headers. Specifically, if a specially crafted email<br />

message is replied to, a buffer overflow may occur on the local machine. To exploit this, an<br />

attacker would need to be able to craft an email and entice a local user to both read and<br />

reply to the email. Successful exploitation would result in the attacker executing arbitrary<br />

code on the remote client.<br />

Solution: Upgrade to version 1.0.3 or higher.<br />

CVE Not available<br />

Stadtaus Form Mail < 2.4 formmail.inc.php Remote File Inclusion<br />

<strong>PVS</strong> ID: 2673 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17285<br />

Family Internet Services 684


Description: Synopsis :\n\nThe remote host is vulnerable to an arbitrary 'command insertion'<br />

flaw.\n\nThe remote host is running the Stadtaus PHP Form Mail script. This script is used<br />

to send form information to an email address. This version of Form Mail is vulnerable to a<br />

flaw where incorrect parsing of the script_root parameter of the formmail.inc.php script can<br />

lead to arbitrary code being sent to the 'include()' function call. A successful attack would<br />

give the attacker the ability to execute arbitrary code on the target server.\nThe remote host<br />

is running %L<br />

Solution: Upgrade to Form Mail 2.4 or higher.<br />

CVE-2005-0678<br />

phpBB < 2.0.14 Cookie Authentication Bypass and SQL Injection Vulnerabilities<br />

<strong>PVS</strong> ID: 2674 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17301<br />

Description: The remote host is running phpBB, a web-based forum application written in PHP. There is<br />

a flaw in this version of phpBB that will allow a remote attacker to gain elevated privileges<br />

due to a flaw in the way that phpBB handles autologin failure. Specifically, when an<br />

autologin fails, the 'user_id' value is reset, but the 'user_level' value remains the same. A<br />

successful attack would result in the attacker gaining access to potentially confidential data<br />

that may aid the attacker in gaining elevated privileges. There is a second flaw within the<br />

'file_id' parameter of the 'dlman.php' script. Specifically, a failure to properly parse out<br />

malicious characters leads to a SQL injection vulnerability. An attacker exploiting this flaw<br />

needs to be able to send HTTP requests to the server. A successful attack would lead to<br />

reading of data, writing of data, and potentially arbitrary code execution.<br />

Solution: Upgrade to version 2.0.14 or higher.<br />

CVE-2005-1026<br />

phpMyFAQ < 1.6.0 SQL Injection<br />

<strong>PVS</strong> ID: 2675 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running phpMyFAQ, a web-based<br />

Frequently-Asked-Questions (FAQ) application. This version of phpMyFAQ is vulnerable<br />

to a remote SQL injection attack. An attacker exploiting this flaw would send a specially<br />

crafted HTTP request to the application. Upon parsing the request, the server would be<br />

coerced into running commands embedded within the request. A successful attack would<br />

give the attacker the ability to view data, modify data, and potentially execute systems<br />

commands with the permission of the web server.<br />

Solution: Upgrade to version 1.6.0 or higher.<br />

CVE-2005-3049<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

CopperExport Plugin < 0.2.1 xp_publish.php SQL Injection<br />

Family Internet Services 685


<strong>PVS</strong> ID: 2676 FAMILY: CGI RISK: HIGH NESSUS ID:17306<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running CopperExport, a plug-in for Apple iPhoto and<br />

CopperMine that allows users to directly export images to a Coppermine gallery. An<br />

attacker exploiting this flaw would send a specially crafted HTTP request to the<br />

application. Upon parsing the request, the server would run commands embedded within<br />

the request. A successful attack would give the attacker the ability to view data, modify<br />

data, and potentially execute system commands with the permission of the web server. It<br />

should be noted that the vulnerability is in a CopperExport script that runs on a<br />

CopperMine server.<br />

Solution: Upgrade to version 0.2.1 or higher.<br />

CVE-2005-0697<br />

Sun WebServer Detection<br />

<strong>PVS</strong> ID: 2677 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: Sun WebServer has been detected on the remote system.<br />

Solution: NONE<br />

CVE Not available<br />

Sun AnswerBook2 < 1.4.5 XSS<br />

<strong>PVS</strong> ID: 2678 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running Sun AnswerBook2 web application. This application allows<br />

users to view and search Sun documentation online. This version of AnswerBook2 is<br />

vulnerable to a cross-site-scripting (XSS) attack. Exploiting the XSS flaws may enable an<br />

attacker to inject arbitrary script code into the browser of unsuspecting users. A successful<br />

attack would potentially allow the attacker the ability to view confidential data (cookies,<br />

authentication data, and more.) or compromise the integrity of the local system via the web<br />

browser.<br />

Solution: Upgrade to version 1.4.5 or higher.<br />

CVE-2005-0549<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Aztek Forum myadmin.php Admin Authentication Bypass<br />

<strong>PVS</strong> ID: 2679 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the<br />

bypassing of authentication.\n\nThe remote host is running Aztek Forum, a<br />

web-based forum. This version of Aztek is reported to be prone to a remote<br />

attack where administrative access may be usurped via a flaw in the<br />

myadmin.php script. The details of the vulnerability are, at this time, unknown.<br />

Family Internet Services 686


Solution: No solution is known at this time.<br />

CVE-2005-0700<br />

Oracle Database Server UTL_FILE Directory Traversal File Access<br />

<strong>PVS</strong> ID: 2680 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17654<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files.\n\nThe remote host appears to be running a vulnerable version of Oracle<br />

Database Server. An authenticated user can craft SQL queries such that they would be able<br />

to retrieve any file on the system. An attacker exploiting this flaw would need a valid<br />

account and would need to be able to connect to the Oracle service (typically on port 2972).<br />

The attacker would retrieve and/or potentially modify confidential data on the target Oracle<br />

server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-0701<br />

Yahoo! Messenger < 6.0.0.1921 Multiple DoS<br />

<strong>PVS</strong> ID: 2681 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running a version of Yahoo Instant Messenger that is reported vulnerable to<br />

a remote buffer overflow. An attacker exploiting this flaw would craft a malicious 'away'<br />

message and then entice an unsuspecting user to attempt to contact them. When the user<br />

receives the malicious 'away' message, the overflow would be triggered and code would be<br />

executed remotely. In addition, this version of Yahoo! Messenger is vulnerable to a remote<br />

Denial of Service (DoS) attack via a malformed YMSGR: URI.<br />

Solution: Upgrade to version 6.0.0.1921 or higher.<br />

CVE-2005-1618<br />

PHP-Fusion < 5.01 BBcode IMG Tag XSS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2682 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML injection attack.\n\nThe remote<br />

host is running a version of PHP-Fusion which is vulnerable to a script injection flaw. The<br />

'fusion_core.php' script is reportedly vulnerable to an attack where an attacker can inject<br />

HTML and script code through the 'BBCode IMG' tag. An attacker exploiting this flaw<br />

would create a malicious URI link and then convince an unsuspecting user to click on the<br />

link. A successful attack would yield potentially confidential data (cookies, credentials) as<br />

well as potentially execute malicious code within the context of the vulnerable server.<br />

Family Internet Services 687


Solution: Upgrade to version 5.01 or higher.<br />

CVE-2005-0692<br />

XOOPS Arbitrary Avatar File Upload<br />

<strong>PVS</strong> ID: 2683 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may be tricked into running an executable file.\n\nThe<br />

remote host is running XOOPS, a web-portal software written in PHP. This version of<br />

XOOPS is vulnerable to a flaw where remote attackers can upload arbitrary executable<br />

code and then execute the code via a web request. An attacker exploiting this flaw would be<br />

able to execute arbitrary code within the context of the web server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-0743<br />

ArGoSoft FTP Server DELE Buffer Overflow<br />

<strong>PVS</strong> ID: 2684 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the ArGoSoft FTP Server. This version of ArGoSoft FTP Server is vulnerable to a<br />

flaw when parsing a malicious DELE command from an authenticated (or anonymous)<br />

user. An attacker exploiting this flaw would be able to execute arbitrary code on the remote<br />

FTP server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-0696<br />

YaBB < 2.1 YaBB.pl username Parameter XSS<br />

<strong>PVS</strong> ID: 2685 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17305<br />

Description: The remote host is using the YaBB web forum software. This version of YaBB is<br />

vulnerable to a cross-site scripting (XSS) attack. Exploiting the XSS flaws may enable an<br />

attacker to inject arbitrary script code into the browser of unsuspecting users. A successful<br />

attack would potentially allow the attacker the ability to view confidential data (cookies,<br />

authentication data, and more.) or compromise the integrity of the local system via the web<br />

browser.<br />

Solution: Upgrade to YaBB 2.1 or higher.<br />

CVE-2005-0741<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

paFileDB < 3.2 XSS and SQL Injection Vulnerabilities<br />

Family Internet Services 688


<strong>PVS</strong> ID: 2686 FAMILY: CGI RISK: HIGH NESSUS ID:19505<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nPHP Arena paFileDB is a web application that is used to manage files. This<br />

version of paFileDB is vulnerable to a remote cross-site-scripting (XSS) flaw. Exploiting<br />

the flaw may enable an attacker to inject arbitrary script code into the browser of<br />

unsuspecting users. A successful attack would potentially allow the attacker the ability to<br />

view confidential data (cookies, authentication data, and more) or compromise the integrity<br />

of the local system via the web browser. The version of paFileDB is also vulnerable to a<br />

remote SQL injection attack. An attacker exploiting this flaw would only need to be able to<br />

send a query to the 'viewall.php' or 'category.php' script. A successful exploit would give<br />

the attacker the ability to read or write confidential data as well as potentially execute<br />

arbitrary commands on the remote web server.<br />

Solution: Upgrade to version 3.2 or higher.<br />

CVE-2005-0782<br />

NewsScript Content Management Admin Authentication Bypass<br />

<strong>PVS</strong> ID: 2687 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17309<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nThe remote host is running the NewsScript.co.uk news content management<br />

system. NewsScript is a perl script that manages news items and present them in an HTML<br />

format. There have been flaws in previous versions of NewsScript. You should manually<br />

check whether or not the application is vulnerable.<br />

Solution: No solution is known at this time.<br />

CVE-2005-0735<br />

CA License Service Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2688 FAMILY: Generic RISK: HIGH NESSUS ID:17307<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the Computer Associate License Application.\n\nThe remote version of this<br />

software is vulnerable to several flaws that\nmay allow a remote attacker to execute<br />

arbitrary code on the remote host\nwith the SYSTEM privileges.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-0583<br />

CA License Service Client Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2689 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 689


Description: The remote client is running the Computer Associate License Application.<br />

Solution: N/A<br />

CVE Not available<br />

CA License Service Detection<br />

<strong>PVS</strong> ID: 2690 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is running the Computer Associate License Application.<br />

Solution: N/A<br />

CVE Not available<br />

CA License Service Detection<br />

<strong>PVS</strong> ID: 2691 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is running the Computer Associate License Application.<br />

Solution: N/A<br />

CVE Not available<br />

Zorum < 3.6.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2692 FAMILY: CGI RISK: HIGH NESSUS ID:17312<br />

Description: Synopsis :\n\nThe remote web server contains a PHP application that is affected by<br />

numerous flaws. The remote host is running Zorum, an open-source electronic forum<br />

written in PHP. The version of Zorum installed on the remote host is prone to several<br />

vulnerabilities. Namely:\n\nAn attacker can execute arbitrary shell commands by means of<br />

specially-crafted arguments to the 'argv[1]' parameter of the 'gorum/prod.php' script<br />

provided that PHP's 'register_globals' setting is enabled and 'register_argc_argv' is<br />

disabled.\n\nAn attacker can adjust the 'id' parameter to the 'index.php' script after<br />

authentication, setting it to that of another currently authenticated user to gain their<br />

privileges.\n\nAn attacker can insert SQL code in the 'Search in messages created by user'<br />

box as well as the 'rollid' parameter to trigger an SQL error and possibly manipulate SQL<br />

queries if PHP's 'magic_quotes' is disabled.\n\nThe 'list', 'method', and 'frommethod'<br />

parameters of the 'index.php' script are not sanitized properly, allowing a remote attacker to<br />

inject arbitrary HTML or script code in a user's browser in the context of the affected web<br />

site, resulting in theft of authentication data or other such attacks.<br />

Solution: Upgrade to version 3.6.0 or higher.<br />

CVE-2005-4619<br />

Active WebCam < 5.6 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 690


<strong>PVS</strong> ID: 2693 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17315<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Active WebCam, a Java program that displays real-time video camera images<br />

over the Internet. This version of Active WebCam is vulnerable to several flaws.<br />

Specifically, it is reported that Active WebCam reveals path information and file name<br />

location (within debugging information). It is also reported that requesting a URI like<br />

'http://www.somesite.com/A:\a.txt' leads to a Denial of Service (DoS) condition on the<br />

remote application.<br />

Solution: Upgrade to version 5.6 or higher.<br />

CVE-2005-0734<br />

PhotoPost Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2694 FAMILY: CGI RISK: HIGH NESSUS ID:17314<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML injection attack.\n\nThe remote<br />

host is running PhotoPost, a web-based image gallery written in PHP. This version of<br />

PhotoPost is reported to be vulnerable to multiple flaws. Specifically, the host is reported<br />

vulnerable to an access validation flaw within the 'adm-photo.php' script. An attacker<br />

exploiting this flaw would be able to upload images under the context of another user. The<br />

second flaw is a Cross-Site Scripting (XSS) vulnerability. Exploiting the XSS flaw may<br />

enable an attacker to inject arbitrary script code into the browser of unsuspecting users. A<br />

successful attack would potentially allow the attacker the ability to view confidential data<br />

(cookies, authentication data, and more) or compromise the integrity of the local system via<br />

the web browser.<br />

Solution: Upgrade to a version of PhotoPost greater than 5.00 Release Candidate 3.<br />

CVE-2005-1629<br />

Ipswitch IMail < 8.15 Hotfix 1 IMAP EXAMINE Argument Buffer Overflow<br />

<strong>PVS</strong> ID: 2695 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:17311<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of the Ipswitch Collaboration\nSuite / Ipswitch IMail IMAP server that is<br />

prone to a buffer overflow\nwhen processing an EXAMINE command with a long<br />

argument.\nSpecifically, if an authenticated attacker sends an EXAMINE command\nwith<br />

a malformed mailbox name of 259 bytes, the attacker will overwrite the\nsaved stack frame<br />

pointer and potentially gain control of process\nexecution.<br />

Solution: Apply IMail Server 8.15 Hotfix 1 (February 3, 2005) or upgrade to a version greater<br />

than 8.15 when it becomes available.<br />

CVE-2005-0707<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 691


MySQL Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2696 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17313<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of MySQL that is older than version 4.0.24. This version of MySQL is<br />

vulnerable to multiple remote attacks. Specifically\n1) The MySQL is vulnerable to a flaw<br />

where the database temporary files are world-writeable and use a common name syntax. An<br />

attacker may be able to guess a file name and inject data into the temp file.\n2)<br />

Authenticated users that have 'CREATE TEMPORARY TABLE' privileges will be able to<br />

corrupt MySQL files with the privileges of the MySQL process\n3) Authenticated users<br />

with the 'INSERT' and 'DELETE' privileges may be able to escalate their database rights<br />

due to an input validation error in MySQL\n4) Authenticated users that have 'INSERT' and<br />

'DELETE' privileges may also abuse the 'CREATE FUNCTION' statement in order to gain<br />

access to restricted data structures.<br />

Solution: Upgrade to version 4.0.24, 4.1.10a or higher.<br />

CVE-2005-0710<br />

Xerox Document Centre Denial of Service (DoS)<br />

<strong>PVS</strong> ID: 2697 FAMILY: Generic RISK: HIGH NESSUS ID:18268<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running Xerox Document Centre, an administrative, web-based GUI to a<br />

Xerox device. This version is reportedly prone to a remote Denial of Service (DoS) attack.<br />

An attacker exploiting this flaw would only need to be able to send malformed HTTP<br />

requests to the web interface of the printer. A successful attack would result in a loss of<br />

availability to the users of the printer.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Xerox Document Centre Authentication Bypass<br />

<strong>PVS</strong> ID: 2698 FAMILY: Generic RISK: HIGH NESSUS ID:18258<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running Xerox Document Centre, an administrative,<br />

web-based GUI to a Xerox device. This version is reportedly prone to a remote<br />

authentication bypass attack. While there are no details currently available, it is believed<br />

that remote anonymous users may be able to subvert the authentication mechanism in such<br />

a way as to gain administrative access to all or portions of the web server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-1936<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 692


UBB.threads < 6.5.1.1 editpost.php SQL Injection<br />

<strong>PVS</strong> ID: 2699 FAMILY: CGI RISK: HIGH NESSUS ID:18098<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL injection attack.\n\nThe remote host<br />

is running a version of UBB.threads that fails to sufficiently sanitize the 'Number'<br />

parameter before using it in SQL queries in the editpost.php script. As a result, a remote<br />

attacker can pass malicious input to database queries, potentially resulting in data exposure,<br />

modification of the query logic, or even data modification or attacks against the database<br />

itself.<br />

Solution: Upgrade to UBB.threads version 6.5.1.1 or higher.<br />

CVE-2005-0726<br />

PlatinumFTP Server < 2.0 Remote Format String DoS<br />

<strong>PVS</strong> ID: 2700 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17321<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running PlatinumFTP Server. The remote server is vulnerable to a remote<br />

Denial of Service (DoS) attack. Specifically, a remote user attempting to authenticate 50+<br />

times with a user ID that includes '\\' will cause the server to fail. A successful attack would<br />

render the FTP server useless for valid users.<br />

Solution: Upgrade to version 2.0 or higher.<br />

CVE-2005-0779<br />

Apache Tomcat AJP12 Protocol Remote DoS<br />

<strong>PVS</strong> ID: 2701 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17322<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nIt may<br />

be possible to freeze or crash the remote Tomcat web server by sending a specially crafted<br />

HTTP request. An attacker exploiting this flaw would only need to be able to send HTTP<br />

requests to the server. Successful exploitation would result in the web server being made<br />

unavailable to valid users.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-0808<br />

PHP-Nuke paBox Module Hidden Parameter XSS<br />

<strong>PVS</strong> ID: 2702 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17336<br />

Family Internet Services 693


Description: Synopsis :\n\nThe remote host is vulnerable to an HTML injection attack.\n\nThe remote<br />

host is running paBox, a web application written in PHP. This version of paBox is<br />

vulnerable to a remote HTML/script injection flaw. An attacker exploiting this flaw would<br />

only need to be able to send HTTP requests to the vulnerable application. A successful<br />

exploit would result in potential theft of confidential data (configuration data, browser<br />

cookies, and more) or browser-side code execution.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-0674<br />

Mozilla Thunderbird < 1.0.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2703 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:17605<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a vulnerable version of Mozilla Thunderbird mail client. It is reported that this<br />

version of Mozilla or Mozilla Thunderbird is vulnerable to a flaw where embedded HTML<br />

tagging allows a remote attacker to spoof the 'Save as' dialog box and convince an<br />

unsuspecting user in download a malicious file. An attacker exploiting this flaw would<br />

need to be able to convince a remote user to click on a malicious link. Successful<br />

exploitation would result in malicious code being downloaded onto the client<br />

machine.\nSecondly, The remote version of this software is vulnerable to a heap overflow<br />

vulnerability when it processes GIF images. An attacker may exploit this flaw to execute<br />

arbitrary code on the remote host. To exploit this flaw, an attacker would need to send a<br />

malformed GIF image to a victim on the remote host and wait for him or her to open it.<br />

Solution: Upgrade to version 1.0.2 or higher.<br />

CVE-2005-0399<br />

Mozilla Firefox < 1.0.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2704 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is using Firefox. The remote version of this software contains multiple security<br />

flaws that can be exploited by a malicious website. An attacker exploiting one of these<br />

flaws would need to be able to either convince a remote user to visit a malicious website or<br />

convince the remote user to open an HTML email and save an attachment.\nIn addition,<br />

this version is vulnerable to a remote flaw that could result in arbitrary code execution.<br />

Specifically, if a malicious web page is bookmarked as a sidebar panel, the malicious page<br />

may open and inject code into privileged pages. An attacker exploiting this flaw would<br />

need to be able to convince a user to both visit and bookmark their malicious web page.<br />

The reported browser version (as seen on the network) is: \n %L<br />

Solution: Upgrade to version 1.0.2 or higher.<br />

CVE-2005-0402<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 694


Phorum < 5.0.15 HTML Injection<br />

<strong>PVS</strong> ID: 2705 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17596<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML injection attack.\n\nThe remote<br />

host is running Phorum, a web-based content management system written in PHP. This<br />

version of Phorum is vulnerable to a remote HTML injection flaw. An attacker exploiting<br />

this flaw would only need to be able to send HTTP requests to the vulnerable application. A<br />

successful exploit would result in potential theft of confidential data (configuration data,<br />

browser cookies, and more) or browser-side code execution.\nIn addition, the version of<br />

Phorum installed on the remote host does not properly sanitize input used in the Location<br />

response header. An attacker can exploit this flaw with a specially-crafted request to inject<br />

malicious code into HTTP headers, which may allow execution of arbitrary HTML and<br />

script code in a user's browser within the context of the remote host.<br />

Solution: Upgrade to version 5.0.15 or higher.<br />

CVE-2005-0784<br />

SimpGB < 1.35.2 guestbook.php quote Parameter SQL Injection<br />

<strong>PVS</strong> ID: 2706 FAMILY: CGI RISK: HIGH NESSUS ID:17328<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running SimpGB, a web-based guestbook application. This<br />

version of SimpGB is vulnerable to a remote SQL injection flaw. An attacker exploiting<br />

this flaw would only need to be able to send a malformed query to the 'quote' parameter of<br />

the 'guestbook.php' application. A successful exploit would give the attacker the ability to<br />

read or write confidential data as well as potentially execute arbitrary commands on the<br />

remote web server.<br />

Solution: Upgrade to version 1.35.2 or higher.<br />

CVE-2005-0786<br />

Cricket <strong>Network</strong> Monitor Detection<br />

<strong>PVS</strong> ID: 2707 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running Cricket, a tool for mapping and displaying network<br />

information. An attacker happening upon an installation of Cricket will be able to gain<br />

much information regarding the next phase of their attack. Cricket typically displays<br />

detailed information regarding networking equipment, connections, latency, average<br />

bandwidth, revision, uptime, etc.\nThe remote host is running %L<br />

Solution: Ensure that Cricket is not available to anonymous users.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 695


Dell Remote Access Controller Detection<br />

<strong>PVS</strong> ID: 2708 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running the Dell Remote Access Controller, a web-based<br />

management interface for Dell devices. A remote user (or administrator) can, with<br />

credentials, control the machine from within their web browser.<br />

Solution: Ensure that this application is in alignment with existing corporate policies and guidelines.<br />

If the application is not required, disable the service.<br />

CVE Not available<br />

eMule Peer-To-Peer File Sharing Server Detection<br />

<strong>PVS</strong> ID: 2709 FAMILY: Peer-To-Peer File Sharing RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote host is running eMule, a Peer-To-Peer File Sharing<br />

software that allows for uploading and downloading of files. \nFor your information, the<br />

remote host is running %L<br />

Solution: Ensure that this application is in alignment with corporate policies and guidelines.<br />

CVE Not available<br />

LimeWire < 4.8.0 Directory Traversal Arbitrary File Access<br />

<strong>PVS</strong> ID: 2710 FAMILY: Peer-To-Peer File Sharing<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17973<br />

Description: Synopsis :\n\nThe remote client is vulnerable to an arbitrary file download flaw.\n\nThe<br />

remote host is running LimeWire, a Gnutella client used for peer-to-peer file sharing. The<br />

host is running a version of Limewire that is vulnerable to a remote exploit via a parsing<br />

error. An attacker exploiting this flaw would pass the client a specially formatted request<br />

which, when processed, would give the attacker the ability to download any file on the<br />

Gnutella client.<br />

Solution: Upgrade to version 4.8.0 or higher.<br />

CVE-2005-0789<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

phpPGAds/phpAdNew < 2.0.5 adframe.php refresh Parameter XSS<br />

<strong>PVS</strong> ID: 2711 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: There is a flaw in the remote phpAdNew/phpPgAds PHP Ads server, a banner management<br />

and tracking\nsystem written in PHP.\n\nThis version of phpAdNew is vulnerable to a<br />

Cross-Site Scripting (XSS)\nvulnerability.\nAn attacker exploiting this flaw would be able<br />

steal potentially confidential\ninformation (such as cookies) or execute malicious code<br />

Family Internet Services 696


within\nthe client browser.<br />

Solution: Upgrade to version 2.0.5 or higher.<br />

CVE-2005-0791<br />

IBM WebSphere 'ResetPassword' Information Disclosure<br />

<strong>PVS</strong> ID: 2712 FAMILY: Web Servers RISK: LOW NESSUS ID:17337<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote WebSphere webserver is vulnerable to an information leak. There is<br />

a flaw in the default ResetPassword form that would allow a remote attacker to obtain<br />

potentially confidential data (such as UserID) within the web server cache. An attacker<br />

exploiting this flaw would only need to be able to browse to the affected system and view<br />

the confidential data within the form source code.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Ximian Evolution < 2.0.4 Content-Parsing DoS<br />

<strong>PVS</strong> ID: 2713 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running a version of the Ximian Evolution email client that does not properly<br />

validate malformed Unicode messages. By processing a malformed message, the client will<br />

crash.<br />

Solution: Upgrade to version 2.0.4 or higher.<br />

CVE Not available<br />

Jetty < 4.2.19 HttpRequest.java Content-Length DoS<br />

<strong>PVS</strong> ID: 2714 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17348<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running Jetty, a Java web server that can be downloaded off the Internet and<br />

is currently bundled with some IBM applications. This version of Jetty is vulnerable to a<br />

remote Denial of Service (DoS) attack. An attacker exploiting this flaw would be able to<br />

render the web server unavailable.<br />

Solution: Upgrade to version 4.2.19 or higher.<br />

CVE-2004-2381<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 697


punBB < 1.2.5 Multiple SQL Injection and Authentication Bypass Vulnerabilities<br />

<strong>PVS</strong> ID: 2715 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17363<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML injection attack.\n\nThe remote<br />

host is running punBB, a web-based bulletin board. This version of punBB ( %L ) is<br />

vulnerable to multiple remote HTML injection attacks. Specifically, failure to correctly<br />

parse the 'email' and 'Jabber' variables of the profile page leads to a condition where<br />

attackers can insert bogus HTTP headers and content into a client browser session. In order<br />

to affect such an attack, the attacker would typically need to be able to entice a remote user<br />

into perusing a malicious URI. A successful attack would lead to a loss of confidential data<br />

(such as authentication or state cookies) or the execution of malicious code within the<br />

browser.<br />

Solution: Upgrade to version 1.2.5 or higher.<br />

CVE-2005-0818<br />

Lysator < 2.0.1 LSH Unspecified Remote DoS<br />

<strong>PVS</strong> ID: 2716 FAMILY: SSH<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17352<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running Lysator's LSH, a version of Secure Shell (SSH) that is available for<br />

Unix-like platforms. This version of LSH is reported vulnerable to a Denial of Service<br />

(DoS) attack.<br />

Solution: Upgrade to version 2.0.1 of LSH (when available).<br />

CVE Not available<br />

MailEnable < 1.8.1 mailto Remote Format String Overflow<br />

<strong>PVS</strong> ID: 2717 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:17364<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote 'format string' flaw.\n\nThe remote<br />

host is running a version of MailEnable Professional which is reported to be prone to a<br />

remote format string vulnerability. Specifically, the application fails to properly parse the<br />

SMTP 'mailto:' request. An attacker exploiting this flaw would send a malformed query to<br />

the server which, upon being parsed, would either crash the remote host or possibly execute<br />

arbitrary commands on the remote host.<br />

Solution: Upgrade to version 1.8.1 or higher.<br />

CVE-2005-1015<br />

Looking Glass <strong>Network</strong> Tool Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2718 FAMILY: Policy NESSUS ID:Not Available<br />

Family Internet Services 698


RISK:<br />

MEDIUM<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote host is running Looking Glass, a tool for performing<br />

rudimentary router functions via a web interface. If available to anonymous users, this<br />

application can give away information that would enable an attacker to perform more<br />

sophisticated (or targeted) attacks against internal networks or specific networking<br />

equipment.<br />

Solution: Either disable or protect (with ACLs) the web application from anonymous,<br />

unauthenticated users.<br />

CVE Not available<br />

NTOP <strong>Network</strong> Tool Detection<br />

<strong>PVS</strong> ID: 2719 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running NTOP, a tool for viewing network configuration,<br />

usage, statistics, protocols, and much more via a web interface. If available to anonymous<br />

users, this application can give away information that would enable an attacker to perform<br />

more sophisticated (or targeted) attacks against internal networks or specific<br />

internetworking equipment.<br />

Solution: Either disable or protect (with ACLs) the web application from anonymous,<br />

unauthenticated users.<br />

CVE Not available<br />

NTOP Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2720 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is running NTOP, a tool for viewing network configuration, usage, statistics,<br />

protocols, and much more via a web interface. This version of NTOP is reported to be<br />

prone to at least four (4) vulnerabilities. An attacker exploiting these flaws would be able to<br />

execute arbitrary code on the target server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2000-0706<br />

ZoneAlarm < 5.5.062.011 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2721 FAMILY: Generic RISK: LOW NESSUS ID:14726<br />

Family Internet Services 699


Description: Synopsis :\n\nThe remote host is running an application that is vulnerable to multiple<br />

flaws.\n\nThe remote host is running ZoneAlarm, a personal firewall for the Windows<br />

platform. The client is running a version of ZoneAlarm that is less than 5.5.062.011. This<br />

version of Zonealarm is prone to at least one vulnerability that could, if exploited, damage<br />

the integrity of the firewall.<br />

Solution: Upgrade to version 5.5.062.011 or higher.<br />

ZoneAlarm Detection<br />

CVE-2005-0114<br />

<strong>PVS</strong> ID: 2722 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running ZoneAlarm, a personal firewall for the Windows platform.<br />

Solution: Ensure that you are running the latest version of Zonealarm and that Zonealarm is<br />

supported with respect to corporate policies and guidelines.<br />

CVE Not available<br />

RunCMS highlight.php Information Disclosure<br />

<strong>PVS</strong> ID: 2723 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running RunCMS, a web-based messaging system. This<br />

version of RunCMS is vulnerable to a remote information disclosure flaw. Specifically, a<br />

malformed query to the highlight.php script can result in RunCMS sending back<br />

confidential database information. This information could include user IDs and passwords.<br />

An attacker exploiting this flaw would need to have knowledge regarding the installation<br />

path of the RunCMS program. A successful exploit would result in the loss of confidential<br />

data.<br />

Solution: No solution is known at this time.<br />

CVE-2005-0828<br />

Icecast Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2724 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a vulnerable version of Icecast, an open-source streaming server. This version is<br />

reported prone to at least two (2) remote attacks. The first attack involves a content-parsing<br />

flaw within the XSL parser. An attacker exploiting this flaw would need to be able to<br />

convince an administrator into downloading and installing a malicious XSL file. The<br />

second attack allows a remote attacker to download source code by appending a '.' to a<br />

request to a XSL resource. An attacker exploiting this second flaw would only need to be<br />

able to send queries to the Icecast server. Successful exploitation would result in the<br />

Family Internet Services 700


potential leaking of confidential data which may lead to a more sophisticated future attack.<br />

Solution: No solution is known at this time.<br />

CVE-2005-0837<br />

CoolForum SQL and XSS Vulnerabilities<br />

<strong>PVS</strong> ID: 2725 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17597<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running CoolForum, a bulletin board written in PHP. This<br />

version of CoolForum is vulnerable to at least two (2) remote attacks. Specifically, a SQL<br />

injection attack affects the 'entete.php' and 'register.php' scripts. An attacker exploiting<br />

these flaws would send a malformed query to the questionable scripts. A successful exploit<br />

would result in the reading and writing of confidential data. In addition, the attacker may be<br />

able to execute arbitrary code on the remote webserver.\n\nMultiple HTML injection and<br />

Cross-Site Scripting (XSS) flaws have also been reported to exist within this version of<br />

CoolForum. An attacker exploiting these flaws would typically need to be able to convince<br />

a user to browse a malicious URI. A successful attack would result in the theft of<br />

potentially confidential client data (cookies, authentication credentials, and more) or<br />

malicious code being executed within the client browser.<br />

Solution: Upgrade to version 0.8.1 or higher.<br />

CVE-2005-0857<br />

PHP-Fusion < 5.0.2 setuser.php HTML Injection Vulnerability<br />

<strong>PVS</strong> ID: 2726 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML injection attack.\n\nThe remote<br />

host is running a version of PHP-Fusion that is vulnerable to an HTML injection flaw.<br />

Specifically, the setuser.php script fails to properly sanitize input data via the 'user_name'<br />

and 'user_pass' parameters. An attacker exploiting this flaw would typically need to be able<br />

to convince a remote user to browse to a malicious URI. A successful attack would yield<br />

potentially confidential data (cookies, credentials) as well as potentially execute malicious<br />

code within the context of the vulnerable server.<br />

Solution: Upgrade to version 5.0.2 or higher.<br />

CVE Not available<br />

Panasonic Camera Detection<br />

<strong>PVS</strong> ID: 2727 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 701


Description: Synopsis :\n\nThe remote host is a network-based camera.\n\nThe remote host is running a<br />

network-based Panasonic cameras. Such cameras are easy to install, do not require a server,<br />

and can be remotely administered via a web GUI. By default, anonymous users can connect<br />

to the camera and control the camera view, grab stillshot images, and more.<br />

Solution: Ensure that the use of the camera is in keeping with corporate policies and guidelines.<br />

Further, ensure that there is no violation of confidentiality or privacy with respect to the<br />

placement of the camera.<br />

CVE Not available<br />

MOBOTIX AG Camera Detection<br />

<strong>PVS</strong> ID: 2728 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is a network-based camera.\n\nThe remote host is running a<br />

network-based MOBOTIX camera. Such cameras are easy to install, do not require a<br />

server, and can be remotely administered via a web GUI. By default, anonymous users can<br />

connect to the camera and control the camera view, grab stillshot images, and more.<br />

Solution: Ensure that the use of the camera is in keeping with corporate policies and guidelines.<br />

Further, ensure that there is no violation of confidentiality or privacy with respect to the<br />

placement of the camera.<br />

AXIS Camera Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 2729 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is a network-based camera.\n\nThe remote host is running a<br />

network-based AXIS camera. Such cameras are easy to install, do not require a server, and<br />

can be remotely administered via a web GUI. By default, anonymous users can connect to<br />

the camera and control the camera view, grab stillshot images, and more.<br />

Solution: Ensure that the use of the camera is in keeping with corporate policies and guidelines.<br />

Further, ensure that there is no violation of confidentiality or privacy with respect to the<br />

placement of the camera.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mac OS X Multiple Vulnerabilities (<strong>Security</strong> Update 2005-003)<br />

<strong>PVS</strong> ID: 2730 FAMILY: Operating System Detection RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is missing <strong>Security</strong> Update 2005-003. This security update contains a number<br />

of enhancements for the following programs :\n\n - AFP Server\n - Bluetooth Setup<br />

Assistant\n - Core Foundation\n - Cyrus IMAP\n - Cyrus SASL\n - Folder Permissions\n -<br />

Family Internet Services 702


Mailman\n - Safari\n<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Novell GroupWise WebAccess Detection<br />

<strong>PVS</strong> ID: 2731 FAMILY: CGI RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Novell GroupWise WebAccess application. This application<br />

allows remote users to access their Novell email via a web application.<br />

Solution: Ensure that this application is authorized and properly protected.<br />

CVE Not available<br />

Novell NetWare Management Portal Information Disclosure<br />

<strong>PVS</strong> ID: 2732 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running Novell NetWare Management Portal. The portal is<br />

used to allow remote login and administrative functions. An attacker can use this<br />

application to gain information regarding system status, local files, user accounts, and<br />

more. In addition, the portal can be used as a brute-force entry point for guessing user IDs<br />

and passwords.<br />

Solution: Ensure that the application is not available to anonymous users.<br />

CVE Not available<br />

SAP Internet Transaction Server Version Detection<br />

<strong>PVS</strong> ID: 2733 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running SAP Internet Transaction Server %L.\nThis is a web application<br />

that allows remote users to access SAP resources via the Web.<br />

Solution: Ensure that the application is protected from anonymous users.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Policy - TeamSpeak Online Gaming VoIP Server Detection<br />

<strong>PVS</strong> ID: 2734 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote host is running a TeamSpeak Voice Over IP (VoIP) server.<br />

This server typically runs in conjunction with network-based gaming. TeamSpeak allows<br />

game players to chat amongst each other while playing.<br />

Family Internet Services 703


Solution: Ensure that TeamSpeak and related applications are sanctioned with respect to Corporate<br />

Policy.<br />

CVE Not available<br />

UserMin Remote Access Detection<br />

<strong>PVS</strong> ID: 2735 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running a web-based administrative interface.\n\nThe<br />

remote server is running UserMin, a web-based administration application that allows<br />

remote users to control the server remotely.<br />

Solution: Ensure that UserMin is running in compliance with existing corporate policies and<br />

guidelines.<br />

CVE Not available<br />

WebSTAR Mail Detection<br />

<strong>PVS</strong> ID: 2736 FAMILY: CGI RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running WebSTAR MAIL %L, a mail server for Mac OS X that offers<br />

services via a Web interface.<br />

Solution: Ensure that you are running the latest version of WebSTAR.<br />

CVE Not available<br />

WebSTAR Mail < 5.4.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2737 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is running WebSTAR Mail, a mail server for Mac OS X that offers services via<br />

a Web interface. This version of WebSTAR is vulnerable to many attack vectors that could<br />

impact the confidentiality, availability, or integrity of the machine and its data.<br />

Solution: Upgrade to version 5.4.0 or higher.<br />

CVE Not available<br />

FileZilla FTP Server < 0.9.6 Multiple DoS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2738 FAMILY: FTP Servers RISK: HIGH NESSUS ID:17593<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors (remote and<br />

local).\n\nThe remote host is running the FileZilla FTP server. There is a flaw in the remote<br />

version of this software that may allow an authenticated attacker to crash the remote host<br />

by requesting DOS devices (CON, NUL, etc.) or by misusing the zlib compression mode.<br />

Family Internet Services 704


In addition, there is a local client flaw within the FileZilla server component. A local user<br />

on the FileZilla server who is enticed to initiate an FTP connection to a malicious server<br />

can be exploited.<br />

Solution: Upgrade to version 0.9.6 or higher.<br />

CVE-2005-0850<br />

NetWin SurgeMail < 3.0.0c2 Multiple Remote Unspecified Vulnerabilities<br />

<strong>PVS</strong> ID: 2739 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:17594<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is running NetWin SurgeMail, a mail server application. The remote version of<br />

this software is vulnerable to multiple unspecified vulnerabilities that have been disclosed<br />

by the vendor.<br />

Solution: Upgrade to NetWin SurgeMail 3.0.0c2 or higher.<br />

CVE Not available<br />

DeleGate < 8.11.1 Multiple Remote Overflows<br />

<strong>PVS</strong> ID: 2740 FAMILY: POP Server RISK: HIGH NESSUS ID:17599<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nDelegate is reportedly<br />

vulnerable to a stack-based buffer overflow that may allow for the execution of arbitrary<br />

code. The details of this vulnerability are not known at this time.<br />

Solution: Upgrade to version 8.11.1 or higher.<br />

CVE-2005-0861<br />

Sun Cobalt RAQ Server Detection<br />

<strong>PVS</strong> ID: 2741 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote server is running the Sun Cobalt RaQ appliance. The web-based<br />

administrative access is enabled and functioning. An attacker can use the web interface to<br />

brute force login credentials off of the appliance.<br />

Solution: Ensure that the administrative interface is only available to internal (non-Internet)<br />

browsers.<br />

CVE Not available<br />

Endymion MailMan Detection<br />

<strong>PVS</strong> ID: 2742 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 705


Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running the Endymion MailMan application. This<br />

application allows remote users to access their email via a web interface. There have been<br />

many flaws found in the mailman.cgi perl script. In addition, the current features of<br />

Mailman allow it to be used as a remote attack tool. As Mailman takes Username,<br />

Password, and Server as arguments for login, it is possible to use Mailman as a POP3<br />

scanner and/or brute-force password scanner. For example, an attacker could automate an<br />

attack against internal POP3 accounts by simply bouncing the attack through an instance of<br />

Mailman in the DMZ. An attacker without access to the internal network would still be able<br />

to brute-force valid accounts simply by using Mailman to identify internal POP3 servers<br />

and then bouncing the attack through Mailman.<br />

Solution: Ensure that this application is authorized and properly protected.<br />

CVE Not available<br />

<strong>Network</strong> Query Tool Detection<br />

<strong>PVS</strong> ID: 2743 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running the <strong>Network</strong> Query Tool CGI script. This script<br />

allows anonymous, remote users to perform port scans, whois, DNS queries, ping,<br />

traceroute, and more via a web interface. An attacker coming upon this application would<br />

be able to use the script to perform discovery scanning against any range of addresses. This<br />

would include, but not be limited to, internal IP ranges.<br />

Solution: Ensure that this application is valid with respect to corporate policies and guidelines. If the<br />

application is required, consider using Access Control Lists (ACLs) or other security<br />

measures to block unauthorized usage.<br />

CVE Not available<br />

Apache < 2.0.50 Input Header Folding and mod_ssl DoS<br />

<strong>PVS</strong> ID: 2744 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:12293<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is using a version of the Apache web server that is less than 2.0.50. This<br />

version is vulnerable to two (2) remote Denial of Service (DoS) attacks. The first issue<br />

stems from a failure to properly manage memory and could lead to the consumption of<br />

massive amounts of memory and, alledgedly,a potential heap overflow. The second issue<br />

stems from mod_ssl's inability to handle sessions that terminate before any bytes of data<br />

have been sent. This second flaw results in a memory violation that leads to a loss of<br />

availability to valid users.<br />

Solution: Upgrade to Apache 2.0.50 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 706


CVE-2004-0493<br />

Vortex Portal Content Management System Multiple Remote File Inclusion<br />

<strong>PVS</strong> ID: 2745 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a script injection attack.\n\nThe remote host<br />

is running %L , a content-management system for gaming. This version of Vortex is<br />

vulnerable to an 'include' file injection attack. Specifically, the 'act' variable of 'content.php'<br />

and 'index.php' is not properly sanitized by the Vortex application. An attacker exploiting<br />

this flaw would be able to include arbitrary malicious code within a URI. The attacker<br />

would then need to be able to convince a client to browse to the URI. A successful attack<br />

would result in the client browser executing malicious code within the context of the<br />

Vortex application.<br />

Solution: Ensure that this application is allowed within corporate policies and guidelines.<br />

CVE-2005-0879<br />

WU-FTPD FTP Server File Globbing Remote DoS<br />

<strong>PVS</strong> ID: 2746 FAMILY: FTP Servers RISK: HIGH NESSUS ID:17602<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running a WU-FTPD FTP server. This version of WU-FTPD is vulnerable to<br />

a remote Denial of Service (DoS). Specifically, by sending a LIST request with many '*'<br />

characters causes the remote server to crash. This introduces a risk to availability.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-0256<br />

XMB Forum < 1.9.8 SQL Injection and XSS Vulnerabilities<br />

<strong>PVS</strong> ID: 2747 FAMILY: CGI RISK: HIGH NESSUS ID:17608<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running XMB Forum. There is flaw in the version this host is using that may allow an<br />

attacker to perform a cross-site scripting attack against this host. An attacker exploiting this<br />

flaw would need to be able to convince a user to browse a malicious URI. Successful<br />

exploitation would result in a potential loss of confidential data (cookies, authentication<br />

credentials, and more.).\n\nIn addition, there is a flaw in the way that XMB handles<br />

user-supplied data sent to the 'u2u.inc.php' script. An attacker sending malformed queries<br />

can inject SQL commands that are executed on the database server. This can lead to the<br />

reading or writing of data and, in some cases, the attacker can execute arbitrary system<br />

commands.<br />

Solution: Upgrade to version 1.9.8 or higher.<br />

CVE-2005-0885<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 707


phpSysInfo < 2.5 Multiple Script XSS<br />

<strong>PVS</strong> ID: 2748 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17610<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running phpSysInfo, a PHP script that monitors and reports on local *nix<br />

system resources utilization. This version of phpSysInfo is vulnerable to a remote<br />

Cross-Site Scripting attack. An attacker exploiting this flaw would need to be able to<br />

convince a user to browse a malicious URI. Successful exploitation could lead to a loss of<br />

integrity as code would be executed by the browser within the security context of the<br />

vulnerable web site.<br />

Solution: Upgrade to version 2.5 or higher.<br />

CVE-2005-3348<br />

Trillian HTTP-parsing Remote Overflow<br />

<strong>PVS</strong> ID: 2749 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:17611<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Trillian, a chat client. This version of Trillian is reported vulnerable to a remote<br />

overflow. While the details of the vulnerability are not known, the security risk is either a<br />

denial of service (availability) or remote code execution (integrity).<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Windows 2003 Server Detection<br />

<strong>PVS</strong> ID: 2750 FAMILY: Operating System Detection RISK: NONE NESSUS ID:Not Available<br />

Description: The remote host is running Windows 2003 Server. According to the update request, the<br />

exact version of Windows 2003 server is: %L<br />

Solution: N/A<br />

CVE Not available<br />

Windows 2000 Server Detection (No Service Pack)<br />

<strong>PVS</strong> ID: 2751 FAMILY: Operating System Detection RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host is running Windows 2000 Server with no Service Pack applied. <strong>PVS</strong> has<br />

made this determination based on an update request. The following request was observed:<br />

%L<br />

Solution: Upgrade to Windows 2000 SP4.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 708


CVE Not available<br />

Windows 2000 SP1 Detection<br />

<strong>PVS</strong> ID: 2752 FAMILY: Operating System Detection RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host is running Windows 2000 SP1.<br />

Solution: Upgrade to Windows 2000 SP4.<br />

CVE Not available<br />

Windows 2000 SP2 Detection<br />

<strong>PVS</strong> ID: 2753 FAMILY: Operating System Detection RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host is running Windows 2000 SP2.<br />

Solution: Upgrade to Windows 2000 SP4.<br />

CVE Not available<br />

Windows 2000 SP3 Detection<br />

<strong>PVS</strong> ID: 2754 FAMILY: Operating System Detection RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host is running Windows 2000 SP3.<br />

Solution: Upgrade to Windows 2000 SP4.<br />

CVE Not available<br />

Windows 2000 SP4 Detection<br />

<strong>PVS</strong> ID: 2755 FAMILY: Operating System Detection RISK: NONE NESSUS ID:Not Available<br />

Description: The remote host is running Windows 2000 Server SP4.<br />

Solution: N/A<br />

CVE Not available<br />

Windows XP (No Service Pack) Detection<br />

<strong>PVS</strong> ID: 2756 FAMILY: Operating System Detection RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host is running Windows XP with no Service Pack applied. <strong>PVS</strong> has<br />

determined this by observing the following request sent to windowsupdate.microsoft.com:<br />

\n %L<br />

Solution: Upgrade to Windows XP SP3.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 709


CVE Not available<br />

Windows XP SP1 Detection<br />

<strong>PVS</strong> ID: 2757 FAMILY: Operating System Detection RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host is running Windows XP SP1.<br />

Solution: Upgrade to Windows XP SP3.<br />

CVE Not available<br />

Windows XP SP2 Detection<br />

<strong>PVS</strong> ID: 2758 FAMILY: Operating System Detection RISK: NONE NESSUS ID:Not Available<br />

Description: The remote host is running Windows XP SP2.<br />

Solution: Upgrade to Windows XP SP3.<br />

CVE Not available<br />

Media Server Type Detection<br />

<strong>PVS</strong> ID: 2759 FAMILY: Generic RISK: NONE NESSUS ID:Not Available<br />

Description: A media server is running on this port : %L<br />

Solution: N/A<br />

CVE Not available<br />

Media Server Type (RTP) Detection<br />

<strong>PVS</strong> ID: 2760 FAMILY: Generic RISK: NONE NESSUS ID:Not Available<br />

Description: A media server is running on this port : %L<br />

Solution: N/A<br />

CVE Not available<br />

Apple QuickTime Streaming Server Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2761 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Apple QuickTime Streaming Server version: \n %L .<br />

Solution: Ensure that you are running the latest version of QTSS.<br />

Family Internet Services 710


CVE Not available<br />

Apple QuickTime Server < 4.1.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2762 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the Apple Quicktime Streaming Server. This version is vulnerable to an<br />

information disclosure bug. Specifically, the parse_xml.cgi script can be coerced into<br />

giving away local system information (path, file name, and more). Such information can<br />

aid an attacker in more sophisticated attacks. A second flaw would allow an attacker the<br />

ability to run arbitrary code on the remote server. Specifically, malformed requests are not<br />

properly parsed prior to being logged. When the logs were viewed by a local user, code<br />

could be executed with the permissions of the user reading the logs (typically an<br />

administrator). The remote server is also reported prone to a remote Cross-Site Scripting<br />

(XSS) flaw. An attacker exploiting this flaw would need to be able to convince a user to<br />

browse to a malicious URI. Successful exploitation would result in the theft of confidential<br />

data (cookies, authentication materials, and more).<br />

Solution: Upgrade to version 4.1.3 or higher.<br />

CVE-2003-0051<br />

Apple QuickTime < 4.1.4 Directory Traversal, Denial of Service, and Script Disclosure Vulnerabilities<br />

<strong>PVS</strong> ID: 2763 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the Apple Quicktime Streaming Server. This version is vulnerable to a remote<br />

directory traversal flaw. An attacker exploiting this flaw would be able to access data<br />

outside of the web root. In addition, several remote denial of service (DoS) flaws have been<br />

reported in this version of QTSS. Thirdly, this version of QTSS has been reported prone to<br />

script disclosure attacks. An attacker exploiting this flaw would be able to read script<br />

source code. This could lead to more sophisticated attacks.<br />

Solution: Upgrade to Apple Quicktime Server 4.1.4 or higher.<br />

CVE-2004-0169<br />

Apple QuickTime Streaming Server < 5.0.3.2 DoS<br />

<strong>PVS</strong> ID: 2764 FAMILY: Generic<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote Apple QuickTime Server is reported prone to a remote Denial of Service (DoS)<br />

attack. The details of the attack are currently unknown. An attacker with access to the<br />

specific attack vectors would be able to impact the availability of the server.<br />

Family Internet Services 711


Solution: Upgrade to version 5.0.3.2 or higher.<br />

CVE-2004-0825<br />

Mac OS X 10.0 Detection<br />

<strong>PVS</strong> ID: 2765 FAMILY: Operating System Detection RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host is running Mac OS X 10.0, which is now unsupported.<br />

Solution: Upgrade to version 10.2, 10.3 or higher.<br />

CVE Not available<br />

Mac OS X 10.1 Detection<br />

<strong>PVS</strong> ID: 2766 FAMILY: Operating System Detection RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host is running Mac OS X 10.1, which is now unsupported.<br />

Solution: Upgrade to version 10.2, 10.3 or higher.<br />

CVE Not available<br />

Mac OS X 10.2 Detection<br />

<strong>PVS</strong> ID: 2767 FAMILY: Operating System Detection RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host is running Mac OS X 10.2.\n%L<br />

Solution: Upgrade to version 10.2.8, 10.3.9, 10.4 or higher.<br />

CVE Not available<br />

Mac OS X 10.2.8 Detection<br />

<strong>PVS</strong> ID: 2768 FAMILY: Operating System Detection RISK: NONE NESSUS ID:Not Available<br />

Description: The remote host is running Mac OS X 10.2.8.<br />

Solution: Upgrade to version 10.3, 10.4 or higher.<br />

CVE Not available<br />

Mac OS X 10.3 Detection<br />

<strong>PVS</strong> ID: 2769 FAMILY: Operating System Detection RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host is running Mac OS X 10.3 : \n %L<br />

Solution: Upgrade to version 10.3.9 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 712


CVE Not available<br />

Mac OS X 10.3.8 Detection<br />

<strong>PVS</strong> ID: 2770 FAMILY: Operating System Detection RISK: NONE NESSUS ID:Not Available<br />

Description: The remote host is running Mac OS X 10.3.8.<br />

Solution: N/A<br />

CVE Not available<br />

dnsmasq < 2.21 Multiple Remote Vulnerabilities<br />

<strong>PVS</strong> ID: 2771 FAMILY: DNS Servers RISK: HIGH NESSUS ID:17631<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running dnsmasq, a DHCP and DNS server. The remote version of this software is<br />

vulnerable to multiple remote vulnerabilities that may allow an attacker to execute arbitrary<br />

code on the remote host or perform a DNS cache poisoning attack.<br />

Solution: Upgrade to dnsmasq 2.21 or higher.<br />

CVE-2005-0876<br />

Smail < 3.2.0.121 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2772 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:17633<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote 'format string' flaw.\n\nThe remote<br />

host is running a version of Smail, a mail transport agent, that is older or as old as than<br />

version 3.2.0.120. The remote version of this software contains various vulnerabilities that<br />

may allow a remote attacker to execute arbitrary code on the remote host by exploiting a<br />

heap overflow in the function which processes the 'MAIL FROM' command.<br />

Solution: Upgrade to Smail 3.2.0.121 or higher.<br />

CVE-2005-0892<br />

OpenBSD spamd Service Detection<br />

<strong>PVS</strong> ID: 2773 FAMILY: SMTP Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running SPAMD, a service that ships with OpenBSD and allows<br />

administrators to control incoming spam through the use of white, grey, and black lists.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 713


phpMyDirectory < 10.1.6 review.php Multiple Parameter XSS<br />

<strong>PVS</strong> ID: 2774 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17634<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

version of phpMyDirectory installed on the remote host suffers from multiple cross-site<br />

scripting vulnerabilities due to its failure to sanitize user-input to its 'review.php' script<br />

through various parameters. A remote attacker can exploit these flaws to steal cookie-based<br />

authentication credentials and perform other such attacks.<br />

Solution: Upgrade to a version of phpMyDirectory greater than 10.1.6 when it becomes available.<br />

CVE-2005-0896<br />

AOLServer Multiple Remote Vulnerabilities<br />

<strong>PVS</strong> ID: 2775 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is running AOLServer, a web server from AOL. This version of AOLServer is<br />

vulnerable to multiple remote overflows. An attacker exploiting these flaws would be able<br />

to execute arbitrary code on the remote server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2001-0205<br />

Ublog < 1.0.5 login.asp msg Parameter XSS<br />

<strong>PVS</strong> ID: 2776 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running Ublog, a blog program written in ASP. This version of Ublog is<br />

vulnerable to a remote Cross-Site Scripting (XSS) attack. An attacker exploiting this flaw<br />

would typically need to be able to convince a user to browse a malicious URI. A successful<br />

attack would result in the theft of potentially confidential client data (cookies,<br />

authentication credentials, and more) or malicious code being executed within the client<br />

browser.<br />

Solution: Upgrade to version 1.0.5 or higher.<br />

CVE-2005-0925<br />

Sylpheed MIME Content-parsing Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2777 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote client is<br />

running Sylpheed, an email client for Unix and Unix-like operating systems. This version is<br />

vulnerable to a buffer overflow via specially crafted MIME messages or attachments. An<br />

attacker exploiting this flaw would need to be able to convince a user to open a malicious<br />

Family Internet Services 714


email message. Successful exploitation would lead to a Denial of Service or remote code<br />

execution.<br />

Solution: Upgrade to version 1.0.4, 1.9.5 or higher.<br />

CVE-2005-0926<br />

PhotoPost < 5.02 RC3 Multiple Content-parsing Vulnerabilities<br />

<strong>PVS</strong> ID: 2778 FAMILY: CGI RISK: HIGH NESSUS ID:17649<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running PhotoPost, a web-based image gallery written in<br />

PHP. This version of PhotoPost is reported vulnerable to multiple vulnerabilities. Multiple<br />

scripts are reported prone to a Cross-Site Scripting (XSS) vulnerability. Exploiting the XSS<br />

flaws may enable an attacker to inject arbitrary script code into the browser of unsuspecting<br />

users. A successful attack would potentially allow the attacker the ability to view<br />

confidential data (cookies, authentication data, and more) or compromise the integrity of<br />

the local system via the web browser. A second set of issues also affect multiple scripts.<br />

Specifically, multiple scripts are vulnerable to a remote SQL injection attack. An attacker<br />

exploiting this flaw would be able to view and modify database data as well as potentially<br />

execute arbitrary commands.<br />

Solution: Upgrade to PhotoPost 5.02 Release Candidate 3 or higher.<br />

CVE-2005-0928<br />

Horde < 3.0.4 Parent Page Title XSS<br />

<strong>PVS</strong> ID: 2779 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17650<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

version of Horde installed on the remote host suffers from a cross-site scripting<br />

vulnerability in which an attacker can inject arbitrary HTML and script code via the page<br />

title of a parent frame, enabling him to steal cookie-based authentication credentials and<br />

perform other such attacks.<br />

Solution: Upgrade to version 3.0.4 or higher.<br />

CVE-2005-0961<br />

MailReader < 2.3.36 network.cgi MIME Message XSS<br />

<strong>PVS</strong> ID: 2780 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17657<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML injection attack.\n\nThe remote<br />

host is running Mailreader, a web-based application which can be used to read email. This<br />

version of Mailreader is vulnerable to a remote HTML injection flaw. An attacker<br />

exploiting this flaw would need to be able to convince a Mailreader user to open a<br />

Family Internet Services 715


malicious email. Successful exploitation would result in the client running code within their<br />

browser that would seem to be originating from the Mailreader server.<br />

Solution: Upgrade to version 2.3.36 or higher.<br />

CVE-2005-0386<br />

BayTech RPC3 Telnet Daemon Authentication Bypass<br />

<strong>PVS</strong> ID: 2781 FAMILY: Generic RISK: HIGH NESSUS ID:17663<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running a version of Bay Technical Associates RPC3<br />

Telnet Daemon that lets a user bypass authentication by sending a special set of keystrokes<br />

at the username prompt. Since BayTech RPC3 devices provide remote power management,<br />

this vulnerability enables an attacker to cause a denial of service, shut down the device<br />

itself and any connected devices.<br />

Solution: No solution is known at this time.<br />

CVE-2005-0957<br />

PHP Remote getimagesize DoS<br />

<strong>PVS</strong> ID: 2782 FAMILY: Web Servers RISK: HIGH NESSUS ID:18033<br />

Description: Synopsis : \n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is running a version of PHP that is older than 4.3.11 or 5.0.4. This version<br />

contains a bug that can be triggered when the getimagesize() function processes malicious<br />

IFF or JPEG image files. An attacker exploiting this flaw would be able to present an image<br />

to the function that would cause the function to go into an infinite loop by processing a<br />

negative file size. A successful exploit would result in the loss of system availability for<br />

valid users. There is also a reported flaw in the way that PHP handles data being passed to<br />

the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS)<br />

attack. Other flaws impacting this version of PHP have been reported; however, details<br />

have not been released. The reported version of PHP is: \n %L<br />

Solution: Upgrade to 4.3.11, 5.0.4 or higher.<br />

CVE-2005-1043<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

MaxWebPortal < 1.36 XSS and SQL Injection Vulnerabilities<br />

<strong>PVS</strong> ID: 2783 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nMaxWebPortal is a web portal that utilizes a backend SQL or MySQL database.<br />

This version of MaxWebPortal is vulnerable to remote cross-site scripting (XSS) and SQL<br />

injection flaws. An attacker exploiting this flaw would typically need to be able to convince<br />

a user to browse a malicious URI. A successful attack would result in the theft of<br />

potentially confidential client data (cookies, authentication credentials, and more) or<br />

Family Internet Services 716


malicious code being executed within the client browser. An attacker exploiting the SQL<br />

injection flaw would only need to be able to send HTTP queries to the remote application.<br />

A successful attack would give the attacker the ability to read and write database data as<br />

well as potentially execute arbitrary remote commands on the SQL or MySQL system.<br />

Solution: Upgrade to version 1.36 or higher.<br />

CVE-2005-1016<br />

Bakbone NetVault Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2784 FAMILY: Generic RISK: HIGH NESSUS ID:18257<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Bakbone NetVault, an enterprise backup/restore application. This version of<br />

NetVault is vulnerable to a remote heap overflow as well as a local content-parsing<br />

overflow. An attacker exploiting the first flaw would need to be able to connect to the<br />

application on port 20031. A successful exploit would result in arbitrary code being<br />

executed by the SYSTEM process. An attacker exploiting the second flaw would need local<br />

read/write access to the Netvault configuration files. A successful attack would lead to<br />

arbitrary code being executed.<br />

Solution: No solution is known at this time.<br />

CVE-2005-1547<br />

Windows 2003 SP1 Server Detection<br />

<strong>PVS</strong> ID: 2785 FAMILY: Operating System Detection RISK: NONE NESSUS ID:Not Available<br />

Description: The remote host is running Windows 2003 Server SP1.<br />

Solution: N/A<br />

CVE Not available<br />

Windows 2003 (No Service Pack) Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2786 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is running Windows 2003 Server. Multiple vulnerabilities were fixed in<br />

SP1.\nThe reported version of Microsoft 2003 running on this server is: \n %L<br />

Solution: Upgrade to Windows 2003 SP1 or higher.<br />

CVE-1999-0662<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

phpMyAdmin < 2.6.2 RC1 Remote Command Execution<br />

<strong>PVS</strong> ID: 2787 FAMILY: CGI NESSUS ID:17689<br />

Family Internet Services 717


RISK:<br />

MEDIUM<br />

Description: The remote host is running phpMyAdmin, an open-source software written in PHP to<br />

handle the administration of MySQL over the Web. The remote host is vulnerable to a<br />

remote Cross-Site Scripting (XSS) flaw. An attacker exploiting these flaws would be need<br />

to be able to convince a user to click on a malicious URL. Upon successful exploitation, the<br />

attacker would be able to steal credentials or execute code within the browser.<br />

Solution: Upgrade to phpMyAdmin 2.6.2 RC1 or higher.<br />

CVE-2005-0992<br />

Firefox < 1.0.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2788 FAMILY: Web Clients RISK: HIGH NESSUS ID:18064<br />

Description: Synopsis : \n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is using Firefox. \n\nThe remote version of this software contains various<br />

security issues that may\nallow an attacker to execute arbitrary code on the remote host.<br />

The reported browser version (as seen on the network) is: \n %L<br />

Solution: Upgrade to version 1.0.3 or higher.<br />

CVE-2005-0752<br />

Mozilla < 1.7.7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2789 FAMILY: Web Clients RISK: HIGH NESSUS ID:18065<br />

Description: Synopsis : \n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is using Mozilla. The remote version of this software contains various security<br />

issues that may allow an attacker to execute arbitrary code on the remote host. The reported<br />

browser version (as seen on the network) is: \n %L<br />

Solution: Upgrade to version 1.7.7 or higher.<br />

CVE-2005-0752<br />

CommuniGatePro < 4.3c3 Undisclosed LISTS Module Multipart Message DoS<br />

<strong>PVS</strong> ID: 2790 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17985<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote CommuniGatePro, according to its version number, is vulnerable to a flaw that may<br />

allow an attacker to crash the server using a malformed request. While the details of the<br />

vulnerability are unknown, the exploit is thought to cause a disruption to availability.<br />

Solution: Upgrade to CommuniGatePro 4.3c3 or higher.<br />

Family Internet Services 718


CVE-2005-1007<br />

TLSv1 Traffic Negotiation Detection<br />

<strong>PVS</strong> ID: 2791 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The server on this port is tunneling traffic through TLSv1.<br />

Solution: N/A<br />

CVE Not available<br />

SSLv3 Traffic Negotiation Detection<br />

<strong>PVS</strong> ID: 2792 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The server on this port is tunneling traffic through SSL version 3.<br />

Solution: N/A<br />

CVE Not available<br />

Gaim < 1.2.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2793 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe<br />

remote host seems to be running Gaim, a popular open-source multi-protocol<br />

instant messenger. It is reported that this version of Gaim is prone to a flaw in<br />

the way that it handles malformed HTML data. Specifically, a content-parsing<br />

flaw in the 'gaim_markup_strip_html' function can cause the application to<br />

fail, leading to a loss of availability. Further, there are reported flaws within<br />

the IRC and Jabber plugins that can lead to a remote Denial of Service. In<br />

addition, it is reported that a flaw within the IRC plugin can allow the<br />

injection of Gaim scripting language commands.<br />

Solution: Update to Gaim 1.2.1 or higher.<br />

CVE-2005-0966<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Pavuk < 0.9.32 Multiple Unspecified Remote Buffer Overflows<br />

<strong>PVS</strong> ID: 2794 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an arbitrary 'command insertion'<br />

flaw.\n\nThe remote host is using a version of Pavuk, a web spider, that is vulnerable to<br />

multiple unspecified buffer overflows. An attacker can construct a malicious website that is<br />

designed to trigger the vulnerability and run arbitrary code on the client machine.<br />

Family Internet Services 719


Solution: Upgrade to Pavuk 0.9.32 or higher.<br />

CVE Not available<br />

CA eTRUST IDS Detection<br />

<strong>PVS</strong> ID: 2795 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running the CA eTRUST Intrusion Detection System (IDS).<br />

Solution: N/A<br />

CVE Not available<br />

Comersus Cart Username Field HTML Injection<br />

<strong>PVS</strong> ID: 2796 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17983<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML Injection attack.\n\nAccording to<br />

its banner, the remote host is running a version of Comersus Cart that fails to properly<br />

sanitize user input to the Username field. An attacker can exploit this vulnerability to cause<br />

arbitrary HTML and script code to be executed by a user's browser in the context of the<br />

affected web site when a user views the username; eg, in the admin pages.<br />

Solution: No solution is known at this time.<br />

CVE-2005-1010<br />

Comersus Cart Detection<br />

<strong>PVS</strong> ID: 2797 FAMILY: CGI RISK: INFO NESSUS ID:Not Available<br />

Description: According to its banner, the remote host is running a version of Comersus Shopping Cart, a<br />

web-based storefront application.<br />

Solution: N/A<br />

CVE Not available<br />

RunCMS fileupload.php Arbitrary File Upload<br />

<strong>PVS</strong> ID: 2798 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17987<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a 'file upload' flaw.\n\nThe remote host is<br />

running RunCMS, a web-based messaging system. This version of RunCMS is vulnerable<br />

to a remote file upload vulnerability. Specifically, when 'Allow custom avatar upload' has<br />

been enabled, remote attackers would be able to upload arbitrary files to the server.<br />

Successful exploitation would result in arbitary code being executed with the rights of the<br />

Family Internet Services 720


web application.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-1031<br />

Active Auction House Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2799 FAMILY: CGI RISK: HIGH NESSUS ID:17989<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running Active Auction House, an auction software written in<br />

ASP.\n\nThe remote version of this software is vulnerable to various SQL injection<br />

and\ncross-site scripting issues.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-1029<br />

Lotus Domino Server < 6.5.3 Web Service Remote DoS<br />

<strong>PVS</strong> ID: 2800 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17991<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running a version of Lotus Domino Server's web service that is prone to a<br />

denial of service vulnerability. By sending a specially crafted HTTP request with a long<br />

string of unicode characters, a remote attacker can crash the nHTTP.exe process, denying<br />

service to legitimate users. IBM has released technote number 1202446 for this issue but<br />

has been unable to reproduce it.<br />

Solution: Upgrade to version 6.5.3 or higher.<br />

CVE-2005-0986<br />

Brooky CubeCart < 2.0.7 Multiple Script SQL Injection<br />

<strong>PVS</strong> ID: 2801 FAMILY: CGI RISK: HIGH NESSUS ID:17999<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is using Brooky CubeCart, an online storefront application<br />

written in PHP. This version of CubeCart is vulnerable to multiple remote SQL injection<br />

flaws. An attacker exploiting these flaws would send a malformed HTTP request to the<br />

application. Successful exploitation would result in viewing of confidential data,<br />

modification of confidential data, and potentially arbitrary code execution. The flawed PHP<br />

scripts are 'index.php', 'tellafriend.php', 'view_cart.php', and 'view_product.php'<br />

Solution: Upgrade to version 2.0.7 or higher..<br />

CVE-2005-1033<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 721


SurgeFTP < 2.2m2 LEAK Command Remote DoS<br />

<strong>PVS</strong> ID: 2802 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18000<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running SurgeFTP, an FTP server for Microsoft and Unix platforms. This<br />

version of SurgeFTP is vulnerable to a content-parsing flaw via the LEAK command.<br />

Calling the LEAK command twice consecutively causes a file IO bug that causes the server<br />

to either stop responding or stop file transfers.<br />

Solution: Upgrade to version 2.2m2 or higher.<br />

CVE-2005-1034<br />

Axel < 1.0b conn.c HTTP Redirection Remote Overflow<br />

<strong>PVS</strong> ID: 2803 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an arbitrary 'command insertion'<br />

flaw.\n\nThe remote host is running Axel, a download accelerator for FTP and HTTP<br />

protocols. This version of Axel is vulnerable to a remote buffer overflow due to the way<br />

that it parses server '302' messages. An attacker exploiting this flaw would need to be able<br />

to entice an Axel user to browse to their malicious website. Successful exploitation would<br />

result in the attacker running arbitrary commands on the system.<br />

Solution: Upgrade to version 1.0b or higher.<br />

CVE-2005-0390<br />

ColdFusion MX Server Detection<br />

<strong>PVS</strong> ID: 2804 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running ColdFusion MX Server.<br />

Solution: N/A<br />

CVE Not available<br />

ColdFusion MX Server Detection<br />

<strong>PVS</strong> ID: 2805 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running ColdFusion MX Server.<br />

Solution: N/A<br />

CVE Not available<br />

ColdFusion < 7.0 MX File Disclosure<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 722


<strong>PVS</strong> ID: 2806 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw which allows attackers to retrieve<br />

sensitive files.\n\nThe remote host is running Macromedia ColdFusion, a web application<br />

server. This version of Macromedia is vulnerable to a flaw in the way that it stores its class<br />

files. Specifically, a flaw in the Macromedia ColdFusion MX Updater causes compiled<br />

Java classes to be stored in the '/WEB-INF/cfclasses' directory. A remote attacker can<br />

retrieve the files and run a Java decompiler in order to decompile the binary code into<br />

human-readable format.<br />

Solution: Upgrade to ColdFusion 7.0 MX or higher.. There is also a workaround available for version<br />

6.1.<br />

CVE Not available<br />

punBB < 1.2.5 profile.php SQL Injection<br />

<strong>PVS</strong> ID: 2807 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18005<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running punBB, a web-based bulletin board. This version of<br />

punBB ( %L ) is vulnerable to a SQL injection attack. Due to a content-parsing flaw,<br />

attackers can inject SQL commands into the 'change_email' parameter of the profile.php<br />

script. An attacker exploiting this flaw would only need to be able to send HTTP requests<br />

to the application. Successful exploitation would result in the attacker having the ability to<br />

read or write to the database. In addition, the attacker may be able to execute arbitrary<br />

commands on the remote system.<br />

Solution: Upgrade to version 1.2.5 or higher.<br />

CVE-2005-1051<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

PostNuke < 0.760 RC4 Multiple XSS and SQL Injection Vulnerabilities<br />

<strong>PVS</strong> ID: 2808 FAMILY: CGI RISK: HIGH NESSUS ID:18360<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running PostNuke version 0.760 RC3 or older. This version<br />

of PostNuke is vulnerable to a remote Cross-Site Scripting (XSS) flaw. Specifically, failure<br />

to parse malicious input to the 'op' parameter of the user.php script or the 'module'<br />

parameter of the admin.php script can lead to the injection of script code. An attacker<br />

exploiting this flaw would need to be able to entice the victim into browsing a malicious<br />

URI. Successful exploitation would result in the attacker being able to inject arbitrary script<br />

code into the browser of the unsuspecting user. This can lead to disclosure of confidential<br />

information. In addition, the remote host is vulnerable to a remote SQL Injection attack. An<br />

attacker exploiting this flaw would be able to read/write confidential database data.<br />

Solution: Upgrade to version 0.760 RC4 or higher.<br />

Family Internet Services 723


CVE-2005-1700<br />

Citrix MetaFrame Server Detection<br />

<strong>PVS</strong> ID: 2809 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running Citrix MetaFrame Server. Citrix MetaFrame is a<br />

web-based application that allows and facilitates connections to other systems. There is a<br />

flaw in many versions of Citrix MetaFrame that allows authenticated users to elevate access<br />

by creating macros within Microsoft Office documents.<br />

Solution: Ensure that this instance of Citrix MetaFrame is allowed with respect to corporate policies<br />

and guidelines. In addition, ensure that the Citrix MetaFrame server is patched to the latest<br />

revision.<br />

CVE Not available<br />

Autocomplete Not Disabled for 'Password' Field<br />

<strong>PVS</strong> ID: 2810 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web application server may be prone to a policy<br />

violation.\n\nThe remote web server is hosting a form that calls for a user password.<br />

However, the 'Autocomplete' functionality has not been disabled for the password. When<br />

Autocomplete is enabled, the client machine will store the form data for future use. This<br />

can be very dangerous as attackers can target confidential data that has been stored on the<br />

client computer. The page that is hosting the form is located at: \n%P\n\nThe form field<br />

that should have Autocomplete disabled is: \n %L >\n<br />

Solution: Set Autocomplete<br />

CVE Not available<br />

KDE KMail HTML Email Information Spoofing<br />

<strong>PVS</strong> ID: 2811 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running a vulnerable email client.\n\nThe remote client is<br />

running Kmail, an email client for Unix and Unix-like operating systems. This version is<br />

vulnerable to a content-parsing flaw within the HTML handlers. Specifically, a client with<br />

HTML enabled may be sent a malicious email that is able to overlap portions of the<br />

displayed email. This can be used to convince users to perform web-based tasks that have<br />

unexpected results.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-0404<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 724


ModernBill < 4.3.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2812 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18008<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is running ModernBill (%L ), a web hosting application written in PHP. This<br />

version of ModernBill is vulnerable to several remote attacks. There are Cross-Site<br />

Scripting (XSS) flaws in the 'aid' and 'c_code' parameters of the orderwiz.php script. An<br />

attacker exploiting these flaws can inject script code into a URI. If the attacker can<br />

convince a user into browse a malicious URI, there is a risk of confidential data being sent<br />

back to the attacker. In addition, there is a flaw in the news.php script that would allow an<br />

attacker to execute arbitrary server-side code on the web server. Versions of ModerBill<br />

prior to 4.3.3 are also vulnerable to a SQL injection flaw. Successful exploitation would<br />

allow a remote attacker the ability to execute arbitrary code on the database server.<br />

Solution: Upgrade to version 4.3.3 or higher.<br />

CVE-2005-1053<br />

DC++ < 0.674 File Content Manipulation<br />

<strong>PVS</strong> ID: 2813 FAMILY: Peer-To-Peer File Sharing<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18012<br />

Description: Synopsis :\n\nThe remote host may be tricked into running an executable file.\n\nThe<br />

remote host is running DC++, an open source peer-to-peer client. The remote host is<br />

reported to be prone to a vulnerability where attackers can append data to file transfers. The<br />

details of this flaw are, at the time, undocumented. It is believed that a successful attack<br />

would result in arbitrary code being run on the client machine (after a download is<br />

complete).<br />

Solution: Upgrade to version 0.674 or higher.<br />

CVE-2005-1089<br />

Pine < 4.63 rpdump Symlink Arbitrary File Overwrite<br />

<strong>PVS</strong> ID: 2814 FAMILY: SMTP Clients RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a local flaw in the way that it creates<br />

temporary files.\n\nPine versions 4.62 and below suffer from a vulnerability with the<br />

rpdump utility. Rpdump ships with Pine by default. This version of rpdump is vulnerable to<br />

a local file-access race condition. An attacker exploiting this flaw would need local access<br />

to the machine as well as the knowledge of when a user was using rpdump. Successful<br />

exploitation results in elevation of privileges.<br />

Solution: Upgrade to version 4.63 or higher.<br />

CVE-2005-1066<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 725


Hydrogen Server Detection<br />

<strong>PVS</strong> ID: 2815 FAMILY: Backdoors RISK: HIGH NESSUS ID:18039<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'Backdoor'<br />

program.\n\nThe remote host is running Immunity's Hydrogen server. Hydrogen is a<br />

Backdoor/Trojan application that is often used by penetration-testing teams to backdoor a<br />

system that has been compromised.<br />

Solution: Ensure that the instance of Hydrogen was actually installed by <strong>Security</strong> Team members<br />

while performing a sanctioned penetration test.<br />

CVE Not available<br />

XAMPP < 1.4.14 Default Installation Multiple HTML Injection<br />

<strong>PVS</strong> ID: 2816 FAMILY: CGI RISK: HIGH NESSUS ID:18037<br />

Description: The remote host is running the XAMPP web server, a version of Apache that comes<br />

pre-bundled with Perl, MySQL, and PHP. This version of XAMPP is reported to be prone<br />

to remote HTML injection attacks. An attacker, exploiting this flaw, would need to be able<br />

to convince a user to browse to a malicious URI. Successful exploitation would result in the<br />

attacker executing malicious code within the user's browser, possibly leading to theft of<br />

confidential data.<br />

Solution: Upgrade to version 1.4.14 or higher.<br />

CVE-2005-2043<br />

MSN Messenger Malformed GIF Remote Overflow<br />

<strong>PVS</strong> ID: 2817 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Microsoft MSN Messenger. There is a flaw in this version of MSN Messenger that<br />

would allow a remote attacker to potentially execute code on the target host. The flaw is in<br />

the processing of GIF images. An attacker exploiting this flaw would need to be able to<br />

convince a user to view a GIF image (such as an emoticon or icon). Successful exploitation<br />

would lead to arbitrary code being executed on the vulnerable system. The reported version<br />

number is: \n %L \n<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-0562<br />

GLD Greylisting Server < 1.5 Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2818 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 726


Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the GLD Greylisting server. A Greylisting server is one that forces SMTP<br />

servers to re-send an email. By forcing a re-send, SPAM can be greatly throttled down.<br />

Versions of GLD prior to 1.5 are prone to multiple remote attack vectors.<br />

Solution: Upgrade to version 1.5 or higher.<br />

CVE-2005-1100<br />

EGroupWare < 1.0.0.007 Attachment Information Disclosure<br />

<strong>PVS</strong> ID: 2819 FAMILY: CGI RISK: HIGH NESSUS ID:15719<br />

Description: Synopsis :\n\nThe remote email client may attach unrequested attachments to an outgoing<br />

email.\n\nThe remote host is running eGroupWare, a web-based groupware solution. It is<br />

reported that versions prior 1.0.0.007 are prone to an information disclosure vulnerability.<br />

Specifically, if a user composes an email with an attachment and then cancels the email, the<br />

attachment will be attached and sent with the next outbound email.<br />

Solution: Upgrade to eGroupWare 1.0.0.007 or higher.<br />

CVE-2005-1202<br />

PHPBB2 < 2.0.14 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2820 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18573<br />

Description: The remote host is running phpBB2, a web-based bulletin board written in PHP. This<br />

version of phpBB2 is vulnerable to multiple Cross-Site Scripting (XSS) attacks. An<br />

attacker exploiting this flaw would need to be able to entice a user into browsing a<br />

malicious URI. Successful exploitation would lead to the attacker executing code within the<br />

client browser possibly resulting in the theft of confidential data.<br />

Solution: Upgrade to version 2.0.14 or higher.<br />

CVE-2005-1115<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

PHP Photo Album < 2.0.14 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2821 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running Photo Album, a phpBB module that enables users to<br />

easily share photo albums via the internet. This version of Photo Album is vulnerable to a<br />

SQL injection attack within the 'mode' parameter of the album_search.php script. An<br />

attacker exploiting this flaw would send a malformed query to the album_search.php script<br />

which, when processed, would give the attacker the ability to read and/or modify data. In<br />

addition, the attacker may be able to execute arbitrary code. Photo Album is also vulnerable<br />

to a Cross-Site Scripting (XSS) attack within the 'sid' parameter of the album_cat.php and<br />

album_comment.php scripts. An attacker exploiting this flaw would need to convince a<br />

Family Internet Services 727


user to browse to a malicious URI. Successful exploitation would result in attacker code<br />

running within the victim browser possibly resulting in the loss of confidential data (such<br />

as cookies).<br />

Solution: Upgrade to version 2.0.14 or higher.<br />

CVE-2005-1115<br />

Oracle Database Multiple Remote Vulnerabilities<br />

<strong>PVS</strong> ID: 2822 FAMILY: Database RISK: HIGH NESSUS ID:18034<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nAccording to its<br />

version number, the installation of Oracle on the remote\nhost is reportedly subject to<br />

multiple unspecified vulnerabilities.\nSome vulnerabilities don't require authentication. It<br />

may allow an attacker\nto craft SQL queries such that they would be able to retrieve any<br />

file on\nthe system and potentially retrieve and/or modify confidential data on the\ntarget's<br />

Oracle server.<br />

Solution: http://www.oracle.com/technology/deploy/security/pdf/cpuapr2005.pdf<br />

CVE-2005-3203<br />

AS400 Default POP Services Information Disclosure<br />

<strong>PVS</strong> ID: 2823 FAMILY: POP Server<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18046<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running the AS400 (version 4.5 or higher) POP3 server. This<br />

version of the POP daemon is vulnerable to an information disclosure flaw. An attacker can<br />

gain information about valid accounts, accounts with expired passwords, system accounts<br />

by querying the POP server. This information can be useful in other attacks that require a<br />

user ID and/or password.<br />

Solution: No solution is known at this time.<br />

CVE-2005-1133<br />

AS/400 Server Detection<br />

<strong>PVS</strong> ID: 2824 FAMILY: Operating System Detection RISK: NONE NESSUS ID:Not Available<br />

Description: The remote host is AS/400 version 4.5 or higher.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

IBM WebSphere JSP Source Disclosure / XSS Vulnerabilities<br />

Family Internet Services 728


<strong>PVS</strong> ID: 2825 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files.\n\nThe remote WebSphere web server is vulnerable to an information leak.<br />

There is a flaw in the way that WebSphere determines the web root directory based on the<br />

HTTP 'Host' tag. An application server that has its root web directory defined in the Web<br />

Servers root directory may disclose the source of .JSP files. JSP source code often contains<br />

information that is useful for further attacks. This version of WebSphere is also vulnerable<br />

to a remote Cross-Site Scripting (XSS) attack. An attacker exploiting this flaw would<br />

typically need to convince a user to browse to a malicious URI. Successful exploitation<br />

would result in the theft of confidential materials (such as authentication cookies).<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-1112<br />

Serendipity < 0.72 exit.php Multiple Parameter SQL Injection<br />

<strong>PVS</strong> ID: 2826 FAMILY: CGI RISK: LOW NESSUS ID:18155<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running Serendipity. Serendipity is a blogging software that is<br />

implemented in PHP. This version of Serendipity is vulnerable to a remote SQL Injection<br />

attack. Specifically, the 'url_id' parameter of the exit.php script does not properly parse out<br />

SQL reserved characters. An attacker exploiting this flaw would send a malformed query to<br />

the exit.php script. Successful exploitation would result in the attacker being able to read<br />

data, write data, and possibly execute arbitrary commands.<br />

Solution: Upgrade to version 0.72 or higher.<br />

CVE-2005-1448<br />

SPHPBlog search.php q Parameter XSS<br />

<strong>PVS</strong> ID: 2827 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18048<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running SPHPBlog, an open source blog application\nwritten in<br />

PHP.\n\nDue to a lack of input validation bug, the remote version of this software can\nbe<br />

used to perform a cross-site scripting attack.<br />

Solution: No solution is known at this time.<br />

CVE-2005-1135<br />

IlohaMail < 0.8.14-RC3 read_message.php Multiple Field HTML Injection<br />

<strong>PVS</strong> ID: 2828 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18050<br />

Family Internet Services 729


Description: Synopsis :\n\nThe remote host is vulnerable to an HTML injection attack.\n\nThe target is<br />

running at least one instance of IlohaMail version 0.8.14 or earlier. The remote version of<br />

this software is vulnerable to an HTML injection attack. An attacker exploiting this flaw<br />

would need to convince a local user to open a malicious HTML email. Successful<br />

exploitation would result in the victim executing potentially damaging code and possibly<br />

theft of confidential, authentication-related data.<br />

Solution: Upgrade to version 0.8.14-RC3 or higher.<br />

CVE-2005-1120<br />

DameWare Remote Desktop Listener<br />

<strong>PVS</strong> ID: 2829 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is running Dameware, a utility that allows administrators remote access to<br />

the Windows Desktop via a number of different protocols. There have been many flaws in<br />

Dameware and even one backdoor (Agobot) that uses Dameware as an attack vector for<br />

further propagation.<br />

Solution: Ensure that Dameware is authorized for your environment and that Dameware has been<br />

upgraded to the most recent version.<br />

CVE Not available<br />

Oracle Application Server 10g Detection<br />

<strong>PVS</strong> ID: 2830 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Oracle Application Server 10g version %L<br />

Solution: N/A<br />

CVE Not available<br />

Oracle Application Server J2EE Container Detection<br />

<strong>PVS</strong> ID: 2831 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Oracle Application Server and has enabled J2EE containers<br />

version %L<br />

Solution: N/A<br />

CVE Not available<br />

MusicMatch Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2832 FAMILY: Web Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18049<br />

Family Internet Services 730


Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running MusicMatch, a music player. The remote version of this software is vulnerable to a<br />

buffer overflow condition as well as a cross-site scripting vulnerability. An attacker may<br />

exploit these flaws to execute arbitrary code on the remote host.<br />

Solution: Upgrade to version 10.0.2048, 9.0.5066 or higher.<br />

CVE-2005-1185<br />

Apple Mac OS X < 10.3.9 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2833 FAMILY: Operating System Detection RISK: HIGH NESSUS ID:18062<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is running a version of Mac OS X 10.3 that is older than version 10.3.9.\nMac<br />

OS X 10.3.9 contains several security fixes for :\n- Safari : a remote local zone script<br />

execution vulnerability has been fixed\n - kernel : multiple local privilege escalation<br />

vulnerabilities have been fixed\n<br />

Solution: http://docs.info.apple.com/article.html?artnum<br />

CVE-2005-0971<br />

Kerio MailServer < 6.0.9 Malformed Email DoS<br />

<strong>PVS</strong> ID: 2834 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote<br />

host is running a version of Kerio MailServer prior to 6.0.9. There is an<br />

undisclosed flaw in the remote version of this server that might allow an attacker<br />

to exhaust resources (impact availability) on the Kerio MailServer.<br />

Solution: Upgrade to Kerio MailServer 6.0.9 or higher.<br />

CVE-2005-1138<br />

Monkey HTTP Daemon < 0.9.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2835 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

the Monkey HTTP Server installed on the remote host suffers from the following flaws:\n\n<br />

- A format string vulnerability. A remote attacker may be able to execute arbitrary code<br />

with the permissions of the user running monkeyd by sending a specially-crafted<br />

request.\n\n - A denial of service vulnerability. Repeated requests for a zero-byte length<br />

file, if one exists, could cause the web server to crash.<br />

Solution: Upgrade to version 0.9.1 or higher.<br />

CVE-2005-1123<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 731


Xerox Document Centre Multiple Remote Vulnerabilities<br />

<strong>PVS</strong> ID: 2836 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to unspecified remote attack vectors.\n\nThe<br />

remote host is running Xerox Document Centre, an administrative web-based GUI to a<br />

Xerox device. This version is reportedly prone to several remote attacks which, if<br />

exploited, would lead to remote administrative access. The details of the attack are not<br />

currently known.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-1179<br />

mvnForum < 1.0 RC4_03 Search Parameter XSS<br />

<strong>PVS</strong> ID: 2837 FAMILY: CGI RISK: LOW NESSUS ID:18359<br />

Description: The remote host is running mvnForum, a web-based bulletin board. This version of<br />

mvnForum is vulnerable to a Cross-Site Scripting (XSS) attack. An attacker exploiting this<br />

flaw would need to entice a user into browsing a malicious URI. Successful exploitation<br />

could lead to disclosure of confidential information (such as cookies).<br />

Solution: Upgrade to version 1.0 RC4_03 or higher.<br />

CVE-2005-1183<br />

CVS < 1.12.12 Unspecified Remote Overflow<br />

<strong>PVS</strong> ID: 2838 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a CVS server that, according to its version number, is vulnerable to an undisclosed<br />

remote buffer overflow. An attacker exploiting this flaw is alleged to be able to execute<br />

arbitrary code on the target CVS server.<br />

Solution: Upgrade to version 1.12.12 or higher.<br />

CVE-2005-0753<br />

Coppermine Gallery < 1.3.3 init.inc.php HTML Injection<br />

<strong>PVS</strong> ID: 2839 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML Injection attack.\n\nThe remote<br />

host is running CopperMine Gallery, a set of PHP scripts to handle galleries of pictures.<br />

There is a flaw in this version of Coppermine Gallery. Specifically, the x-forwarded-for<br />

variable is not properly parsed by the application. An attacker exploiting this flaw can<br />

inject HTML or script into a browser session. Typically, exploiting this flaw involves<br />

convincing a user to browse to a malicious URI. Successful exploitation results in a<br />

Family Internet Services 732


potential loss of confidential data (such as cookies).<br />

Solution: Upgrade to version 1.3.3 or higher.<br />

CVE-2005-1172<br />

Oracle Database Multiple Remote Vulnerabilities<br />

<strong>PVS</strong> ID: 2840 FAMILY: Database RISK: HIGH NESSUS ID:18034<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack<br />

vectors.\n\nAccording to its version number, the installation of Oracle on the<br />

remote host is reportedly subject to multiple unspecified vulnerabilities. Some<br />

vulnerabilities don't require authentication. It may allow an attacker to craft<br />

SQL queries such that they would be able to retrieve any file on the system and<br />

potentially retrieve and/or modify confidential data on the target's Oracle server.<br />

Solution: http://www.oracle.com/technology/deploy/security/pdf/cpuapr2005.pdf<br />

CVE-2005-3203<br />

webcamXP Camera Detection<br />

<strong>PVS</strong> ID: 2841 FAMILY: Policy<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote host is running the webcamXP application. webcamXP is<br />

an all-in-one camera/webserver appliance that allows users to view and administer a<br />

camera remotely.<br />

Solution: Ensure that this web camera is authorized with respect to corporate policies and guidelines.<br />

In addition, ensure that the images being shown by the camera do not violate any<br />

'Acceptable Usage' policies.<br />

CVE Not available<br />

webcamXP < 2.16.478 Chat Name HTML Injection<br />

<strong>PVS</strong> ID: 2842 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18122<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML Injection attack.\n\nThe remote<br />

host is running the webcamXP application. webcamXP is an all-in-one camera/webserver<br />

appliance that allows users to view and administer a camera remotely. This version of<br />

webcamXP is vulnerable to an HTML injection flaw. An attacker exploiting this flaw<br />

would typically need to be able to entice a user into browsing to a malicious URI.<br />

Successful exploitation would result in the theft of confidential materials (such as<br />

authentication cookies).<br />

Family Internet Services 733


Solution: Upgrade to version 2.16.478 or higher.<br />

CVE-2005-1189<br />

Info2WWW < 1.2.2.9-23 Argument XSS<br />

<strong>PVS</strong> ID: 2843 FAMILY: CGI RISK: LOW NESSUS ID:18086<br />

Description: The remote host is running Info2WWW, an application that generates informational web<br />

pages. This version of Info2WWW is vulnerable to a remote cross-site scripting (XSS)<br />

attack. An attacker exploiting this flaw would typically need to convince a user to browse<br />

to a malicious URI. Success exploitation would result in the theft of confidential materials<br />

(such as authentication cookies).<br />

Solution: Upgrade to version 1.2.2.9-23 or higher.<br />

CVE-2004-1341<br />

MPlayer < 1.0pre7 Multiple Remote Heap-based Overflows<br />

<strong>PVS</strong> ID: 2844 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using a version of Mplayer, a multimedia video and audio application, that is vulnerable to<br />

several heap-based overflows that may allow an attacker to execute arbitrary code on the<br />

remote system.<br />

Solution: Upgrade to version 1.0pre7 or higher.<br />

CVE-2005-1195<br />

SunOne Web Proxy < 3.6 SP7 Unspecified Remote Buffer Overflows<br />

<strong>PVS</strong> ID: 2845 FAMILY: Web Servers RISK: HIGH NESSUS ID:18114<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the SunOne Web Proxy. This version is reported vulnerable to a number of remote<br />

buffer overflows. Alledgedly, successful exploitation would result in the attacker executing<br />

arbitrary commands on the remote SunOne Web Proxy server.<br />

Solution: Upgrade to version 3.6 SP7 or higher.<br />

CVE Not available<br />

Coppermine Gallery SQL Injection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2846 FAMILY: CGI RISK: HIGH NESSUS ID:18101<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running CopperMine Gallery, a set of PHP scripts to handle galleries of pictures. There is<br />

a flaw in this version of Coppermine Gallery. Specifically, the remote user's cookie is not<br />

Family Internet Services 734


properly parsed for SQL special characters. An attacker exploiting this flaw would send a<br />

malicious cookie to the Coppermine application. Successful exploitation would result in the<br />

attacker being able to read and write sensitive database data as well as potentially executing<br />

arbitrary code on the remote database.<br />

Solution: Upgrade to Coppermine greater than 1.3.2.<br />

CVE-2005-1225<br />

ArGoSoft Mail Server Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2847 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18140<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running the ArGoSoft Mail Server. This version of<br />

ArGoSoft is prone to a remote, unauthenticated access flaw. Specifically, as ArGoSoft does<br />

not require authentication prior to serving the 'addnew' script, an unauthenticated user can<br />

perform administrative tasks. Successful exploitation would lead to the attacker being able<br />

to add accounts and escalate their privileges on the remote server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-1283<br />

Woltlab Burning Board XSS / SQL Injection Vulnerabilities<br />

<strong>PVS</strong> ID: 2848 FAMILY: CGI RISK: HIGH NESSUS ID:18251<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Woltlab Burning Board, a web bulletin board written in PHP. This version of<br />

Burning Board is vulnerable to a remote Cross-Site Scripting (XSS) attack. An attacker<br />

exploiting this flaw would typically need to convince a user to browse to a malicious URI.<br />

Success exploitation would result in the theft of confidential materials (such as<br />

authentication cookies).\n\nThis version of Woltlab is also vulnerable to a remote SQL<br />

injection\nattack. An attacker exploiting this flaw would send a malformed\n'email' form<br />

query to the 'verify_email()' function. Succesful exploitation\nwould result in the attacker<br />

being able to read or write confidential\ndata. In some instances, the attacker may be able<br />

to execute arbitrary\ncode on the remote database server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-1642<br />

phpBB < 2.0.15 admin_forums.php XSS<br />

<strong>PVS</strong> ID: 2849 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18124<br />

Family Internet Services 735


Description: The remote host is running the phpBB bulletin board. The reported version is: \n %L<br />

\n\nThis version is reported vulnerable to a cross-site-scripting (XSS) flaw.<br />

Solution: Upgrade to version 2.0.15 or higher.<br />

CVE-2005-1193<br />

Horde Vacation < 2.2.2 Parent Frame Page Title XSS<br />

<strong>PVS</strong> ID: 2850 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

version of Horde Vacation installed on the remote host suffers from a cross-site scripting<br />

vulnerability in which an attacker can inject arbitrary HTML and script code into an<br />

unsuspecting user's browser, enabling him to steal cookie-based authentication credentials<br />

and perform other such attacks.<br />

Solution: Upgrade to version 2.2.2 or higher.<br />

CVE-2005-1321<br />

Horde MNemo < 1.1.4 Parent Frame Page Title XSS<br />

<strong>PVS</strong> ID: 2851 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

version of Horde MNemo installed on the remote host suffers from a cross-site scripting<br />

vulnerability in which an attacker can inject arbitrary HTML and script code into an<br />

unsuspecting user's browser, enabling him to steal cookie-based authentication credentials<br />

and perform other such attacks.<br />

Solution: Upgrade to version 1.1.4 or higher.<br />

CVE-2005-1320<br />

Horde Nag < 1.1.3 Parent Frame Page Title XSS<br />

<strong>PVS</strong> ID: 2852 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18136<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

version of Horde Nag installed on the remote host suffers from a cross-site scripting<br />

vulnerability in which an attacker can inject arbitrary HTML and script code into an<br />

unsuspecting user's browser, enabling him to steal cookie-based authentication credentials<br />

and perform other such attacks.<br />

Solution: Upgrade to version 1.1.3 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 736


CVE-2005-1322<br />

Horde Chora < 1.2.3 Parent Frame Page Title XSS<br />

<strong>PVS</strong> ID: 2853 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18131<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

version of Horde Chora installed on the remote host suffers from a cross-site scripting<br />

vulnerability in which an attacker can inject arbitrary HTML and script code into an<br />

unsuspecting user's browser, enabling him to steal cookie-based authentication credentials<br />

and perform other such attacks.<br />

Solution: Upgrade to version 1.2.3 or higher.<br />

CVE Not available<br />

Horde Accounts < 2.1.2 Parent Frame Page Title XSS<br />

<strong>PVS</strong> ID: 2854 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

version of Horde Accounts installed on the remote host suffers from a cross-site scripting<br />

vulnerability in which an attacker can inject arbitrary HTML and script code into an<br />

unsuspecting user's browser, enabling him to steal cookie-based authentication credentials<br />

and perform other such attacks.<br />

Solution: Upgrade to version 2.1.2 or higher.<br />

CVE Not available<br />

Horde Forwards < 2.2.2 Parent Frame Page Title XSS<br />

<strong>PVS</strong> ID: 2855 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

version of Horde Forwards installed on the remote host suffers from a cross-site scripting<br />

vulnerability in which an attacker can inject arbitrary HTML and script code into an<br />

unsuspecting user's browser, enabling him to steal cookie-based authentication credentials<br />

and perform other such attacks.<br />

Solution: Upgrade to version 2.2.2 or higher.<br />

CVE Not available<br />

Horde Imp < 3.2.8 Parent Frame Page Title XSS<br />

<strong>PVS</strong> ID: 2856 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 737


Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

version of Horde Imp installed on the remote host suffers from a cross-site scripting<br />

vulnerability in which an attacker can inject arbitrary HTML and script code into an<br />

unsuspecting user's browser, enabling him to steal cookie-based authentication credentials<br />

and perform other such attacks.<br />

Solution: Upgrade to version 3.2.8 or higher.<br />

CVE Not available<br />

Horde Turba < 1.2.5 Parent Frame Page Title XSS<br />

<strong>PVS</strong> ID: 2857 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18138<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

version of Horde Turba installed on the remote host suffers from a cross-site scripting<br />

vulnerability in which an attacker can inject arbitrary HTML and script code into an<br />

unsuspecting user's browser, enabling him to steal cookie-based authentication credentials<br />

and perform other such attacks.<br />

Solution: Upgrade to version 1.2.5 or higher.<br />

CVE Not available<br />

Horde Kronolith Multiple XSS<br />

<strong>PVS</strong> ID: 2858 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

version of Horde Kronolith installed on the remote host suffers from a cross-site scripting<br />

vulnerability in which an attacker can inject arbitrary HTML and script code into an<br />

unsuspecting user's browser, enabling him to steal cookie-based authentication credentials<br />

and perform other such attacks.<br />

Solution: Upgrade to version 1.1.4, H3 2.0.3-rc1, or higher.<br />

CVE Not available<br />

Yappa-NG < 2.3.2 Multiple vulnerabilities<br />

<strong>PVS</strong> ID: 2859 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML Injection attack.\n\nThe remote<br />

host is running Yappa-NG, a web-based photo album. This version is vulnerable to several<br />

remote script injection flaws. An attacker exploiting these flaws would typically need to be<br />

able to convince a user to browse a malicious URI. Successful exploitation would result in<br />

the execution of script code which could cause a loss of confidential data.<br />

Family Internet Services 738


Solution: Upgrade to version 2.3.2 or higher.<br />

CVE-2005-1311<br />

Fastream NETFile < 7.5.0 Beta 7 Directory Traversal Arbitrary File Access<br />

<strong>PVS</strong> ID: 2860 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a directory traversal flaw.\n\nThe remote<br />

host is running the Fastream NETFile web server. This version of NETFile is vulnerable to<br />

a remote directory traversal flaw. An attacker exploiting this flaw would send a malformed<br />

request to the HTTP server. Successful exploitation would result in the attacker gaining<br />

access to confidential data outside the web server's root directory.<br />

Solution: Upgrade to version 7.5.0 Beta 7 or higher.<br />

CVE Not available<br />

NetTerm FTP Server USER Command Remote Overflow<br />

<strong>PVS</strong> ID: 2861 FAMILY: FTP Servers RISK: HIGH NESSUS ID:18142<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running NetTerm FTP Server. All versions of NetTerm FTP server are vulnerable to a<br />

remote buffer overflow. The primary maintainers have removed netftpd.exe from all new<br />

versions of their product. An attacker exploiting this flaw would be able to execute<br />

arbitrary code on the remote FTP server.<br />

Solution: No solution is known at this time.<br />

CVE-2005-1323<br />

BEA WebLogic < 8.1 SP5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2862 FAMILY: Web Servers RISK: HIGH NESSUS ID:18365<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of BEA WebLogic Server or WebLogic Express that is prone to<br />

multiple vulnerabilities. These flaws could lead to buffer overflows, denial of service,<br />

unauthorized access, cross-site scripting attacks, and information disclosure.<br />

Solution: Upgrade to WebLogic 8.1.0 SP5 or higher.<br />

CVE-2005-1749<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

ZoneAlarm < 5.5.094.000 Undisclosed Vulnerability<br />

<strong>PVS</strong> ID: 2863 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 739


Description: Synopsis :\n\nThe remote host is vulnerable to unspecified remote attack vectors.\n\nThe<br />

remote host is running ZoneAlarm, a personal firewall for the Windows platform. The<br />

client is running a version of ZoneAlarm which is less than 5.5.094.000. This version of<br />

ZoneAlarm is reported vulnerable to an undisclosed vulnerability and the vendor has<br />

released version 5.5.094.000 to remediate risk.<br />

Solution: Upgrade to version 5.5.094.000 or higher.<br />

CVE Not available<br />

PHP-Calendar < 0.10.3 includes/search.php SQL Injection<br />

<strong>PVS</strong> ID: 2864 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running PHP-Calendar, a web-based calendar application<br />

written in PHP. This version of PHP-Calendar is vulnerable to a remote SQL injection<br />

attack. Specifically, the search.php script fails to parse out SQL-reserved characters and<br />

would allow a remote attacker to read or write data as well as potentially execute arbitrary<br />

code on the remote database.<br />

Solution: Upgrade to version 0.10.3 or higher.<br />

CVE-2005-1397<br />

Claroline Multiple Remote Vulnerabilities<br />

<strong>PVS</strong> ID: 2865 FAMILY: CGI RISK: HIGH NESSUS ID:18165<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running an older version of Claroline, an online e-learning<br />

software. This version is vulnerable to multiple attacks that include, but are not limited to,<br />

remote buffer overflow, HTML injection, Cross-Site Scripting (XSS), and SQL injection.<br />

An attacker exploiting these flaws can gain access to confidential data, run arbitrary code,<br />

and execute malicious code within victim browsers.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-1376<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Oracle Application Server Web Cache OHS mod_access Authentication Bypass<br />

<strong>PVS</strong> ID: 2866 FAMILY: Web Servers RISK: LOW NESSUS ID:18181<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw which allows for the bypassing of<br />

authentication.\n\nThe remote host is running the Oracle Application Server. This version<br />

is reported vulnerable to an authentication bypass attack. Specifically, administrators may<br />

restrict access using the 'mod_access' Oracle module. However, attackers may utilize the<br />

Oracle Webcache service in order to bypass these restrictions. An attacker exploiting this<br />

flaw would be able to elevate privileges and potentially gain access to administrative<br />

functions or confidential data.<br />

Family Internet Services 740


Solution: Upgrade to a version of Oracle Application Server higher than 10.1.2.0.0, when available.<br />

CVE-2005-1383<br />

PHPCoin < 1.2.2 2005-12-13 Multiple Script SQL Injection<br />

<strong>PVS</strong> ID: 2867 FAMILY: CGI RISK: HIGH NESSUS ID:18166<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running phpCOIN version 1.2.2 or older. This version of<br />

PHPCoin is vulnerable to a remote SQL injection attack. This vulnerability is possible due<br />

to the login.php and mod.php scripts not properly parsing SQL reserved characters from the<br />

user-supplied input. An attacker exploiting these flaws would be able to gain access to<br />

confidential materials with both read and write access. In addition, the attacker may be able<br />

to execute arbitrary code on the remote database server.<br />

Solution: Upgrade to phpCOIN 1.2.2 with at least fix-file 2005-12-13 or higher.<br />

CVE-2005-1384<br />

ICUII Peer-To-Peer Client Detection<br />

<strong>PVS</strong> ID: 2868 FAMILY: Peer-To-Peer File Sharing<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote client is running ICUII, a peer-to-peer client for messaging<br />

and video. ICUII supports two primary modes: 'Family Oriented' and 'Adult'. There has<br />

been at least one local bug associated with ICUII.<br />

Solution: Ensure that ICUII is authorized with respect to corporate 'Appropriate <strong>Network</strong> Usage'<br />

policies. If authorized, ensure that ICUII is running with the most recent version.<br />

CVE-2005-1411<br />

FilePocket File Sharing Application Detection<br />

<strong>PVS</strong> ID: 2869 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote client is running FilePocket, an application for sharing<br />

files via the Internet. There has been at least one local bug associated with FilePocket.<br />

Solution: Ensure that FilePocket is authorized with respect to corporate 'Appropriate <strong>Network</strong> Usage'<br />

policies. If authorized, ensure that FilePocket is running with the most recent version.<br />

CVE-2005-1414<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 741


Lotus Domino Server Web Service NRPC Authentication Format String DoS<br />

<strong>PVS</strong> ID: 2870 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a format string flaw.\n\nThe remote host is<br />

running a version of Lotus Domino Server's web service that is prone to a remote format<br />

string vulnerability. Specifically, during Lotus Notes authentication, a server utilizing<br />

Notes Remote Procedure Call (NRPC) can be sent a malicious payload that, when parsed,<br />

would cause the server to either fail (loss of availability) or execute arbitrary code (loss of<br />

confidentiality and integrity).<br />

Solution: Upgrade to Lotus Domino Server version 6.5.4, 6.0.5 or higher.<br />

CVE-2005-1441<br />

JGS-Portal < 3.0.2 jgs_portal.php id Parameter SQL Injection<br />

<strong>PVS</strong> ID: 2871 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running JGS-Portal, a plugin for the Woltlab web application.<br />

This version of JGS-Portal is vulnerable to a remote SQL injection attack. An attacker<br />

exploiting this flaw would send a malformed HTTP query to the application. Successful<br />

exploitation would result in the attacker being able to read or write confidential data. In<br />

addition, the attack may be able to execute arbitrary code on the remote database server.<br />

Solution: Upgrade to version 3.0.2 or higher.<br />

CVE-2005-1479<br />

BitTorrent Client Detection<br />

<strong>PVS</strong> ID: 2872 FAMILY: Peer-To-Peer File Sharing<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software which should be authorized with respect<br />

to corporate policy.\n\nThe remote host is running the Bittorrent client version<br />

%L\nBitTorrent is a client application that allows users to quickly download files from<br />

multiple locations.<br />

Solution: Ensure that BitTorrent is allowed with respect to corporate policies and guidelines.<br />

CVE Not available<br />

Kerio MailServer < 6.0.10 Unspecified Admin Web Interface DoS<br />

<strong>PVS</strong> ID: 2873 FAMILY: SMTP Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18184<br />

Family Internet Services 742


Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running a version of Kerio MailServer prior to 6.0.10.\n\nThere is a flaw in<br />

the remote version of this server that would allow an attacker to exhaust resources on the<br />

administrative web interface. While the details of the flaw are unknown, it is alledged that<br />

an attacker can launch the attack without any credentials and render the target service<br />

unavailable.<br />

Solution: Upgrade to Kerio MailServer 6.0.10 or higher.<br />

CVE-2005-1063<br />

MaxWebPortal < 1.3.5 Multiple SQL Injection<br />

<strong>PVS</strong> ID: 2874 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nMaxWebPortal is a web portal that utilizes a backend SQL or MySQL database.<br />

This version of MaxWebPortal is vulnerable to multiple SQL Injection flaws. An attacker<br />

exploiting these flaws would only need to be able to send HTTP queries to the remote<br />

application. A successful attack would give the attacker the ability to read and write<br />

database data as well as potentially execute arbitrary remote commands on the SQL or<br />

MySQL system.<br />

Solution: Upgrade to version 1.3.5 or higher.<br />

CVE-2005-1417<br />

Open Webmail < 2.51 20050430 Shell Escape Arbitrary Command Execution<br />

<strong>PVS</strong> ID: 2875 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18190<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an flaw that allows attackers to execute<br />

arbitrary commands.\n\nThe remote host is running Open Webmail, an open-source perl<br />

script that gives remote users a web-based interface to email. This version of Open<br />

Webmail is vulnerable to a content-parsing flaw that would allow a remote attack to run<br />

arbitrary code on the Open Webmail server. Specifically, the application fails to parse out<br />

the '|' character which can be used to append commands to system calls.<br />

Solution: Upgrade to version 2.51 20050430 or higher.<br />

CVE-2006-3233<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

PostgreSQL < 8.0.3 Incorrect Function Declaration<br />

<strong>PVS</strong> ID: 2876 FAMILY: Database RISK: NONE NESSUS ID:18202<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running PostgreSQL, an open source relational<br />

database. This version is vulnerable to a number of flaws. Specifically, the following<br />

functions are directly accessible to remote<br />

Family Internet Services 743


users:\ndex_init()\nsnb_en_init()\nsnb_ru_init()\nspell_init()\nsyn_init()\n\nAn attacker<br />

calling these functions can submit queries that lead to compromise of confidential data or<br />

execution of arbitrary code on the remote database server.<br />

Solution: Upgrade to PostgreSQL 8.0.3 or higher.<br />

CVE-2005-1410<br />

Golden FTP < 2.53 USER Traversal File Access<br />

<strong>PVS</strong> ID: 2877 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18194<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a directory traversal flaw.\n\nThe remote<br />

host is running the Golden FTP Server. This version of Golden FTP is vulnerable to a<br />

remote directory traversal flaw. An authenticated attacker can retrieve sensitive files from<br />

outside the FTP server directories by using a '../' type query.<br />

Solution: Upgrade to version 2.53 or higher.<br />

CVE-2005-1484<br />

Mac OS X Multiple Vulnerabilities (<strong>Security</strong> Update 2005-005)<br />

<strong>PVS</strong> ID: 2878 FAMILY: Operating System Detection RISK: HIGH NESSUS ID:18189<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is missing <strong>Security</strong> Update 2005-005. This security\nupdate contains security fixes for the<br />

following application :\n\n- Apache\n- AppKit\n- AppleScript\n- Bluetooth\n- Directory<br />

Services\n- Finder\n- Foundation\n- HelpViewer\n- LDAP\n- libXpm\n- lukemftpd\n-<br />

NetInfo\n- ServerAdmin\n- sudo\n- Terminal\n- VPN<br />

Solution: Apply <strong>Security</strong> Update 2005-005.<br />

CVE-2005-1343<br />

Invision Board Multiple XSS and SQL Injection<br />

<strong>PVS</strong> ID: 2879 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18201<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running Invision Board, a CGI suite designed to set up a<br />

bulletin board system on the remote web server. This version of Invision Board is<br />

vulnerable to a Cross-Site Scripting (XSS) flaw where attackers can supply malicious script<br />

code to the 'act' parameter of the index.php script. An attacker exploiting this flaw would<br />

need to be able to convince a user to browse to a malicious URI. Successful exploitation<br />

would result in the theft of confidential materials (such as authentication cookies). In<br />

addition, the remote application is vulnerable to a remote SQL Injection attack. An attacker<br />

exploiting this flaw would send a malformed query to the application. The query would<br />

include reserved SQL characters and syntax. Successful exploitation would result in the<br />

Family Internet Services 744


loss of integrity and confidentiality.<br />

Solution: Upgrade to version 2.0.4, 2.1.0 Alpha 3 or higher.<br />

CVE-2005-1443<br />

Leafnode < 1.11.2 Abrupt Disconnect DoS<br />

<strong>PVS</strong> ID: 2880 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running the LeafNode NNTP server. The version of LeafNode is vulnerable<br />

to a remote Denial of Service (DoS) attack. Specifically, when an upstream NNTP server<br />

requests a header and then abruptly terminates the connection, the LeafNode NNTP server<br />

fails. Successful exploitation would result in a loss of availability.<br />

Solution: Upgrade to version 1.11.2 or higher.<br />

CVE-2005-1453<br />

Oracle Application Server < 10.1.0.0.3 Privilege Escalation<br />

<strong>PVS</strong> ID: 2881 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the<br />

bypassing of authentication.\n\nThe remote host is running the Oracle<br />

Application Server. This version is reported vulnerable to a privilege escalation<br />

flaw. Specifically, users with the 'create job' privileges can obtain<br />

administrative access to the database. An attacker exploiting this flaw would<br />

need a valid account that had the ability to create new database jobs. Successful<br />

exploitation would result in the attacker being able to read or write confidential<br />

data.<br />

Solution: Upgrade to version 10.1.0.0.3 or higher.<br />

CVE-2005-1496<br />

Oracle Application Server < 10.1.0.0.4 Logging Service Interruption<br />

<strong>PVS</strong> ID: 2882 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that would allow a single user to<br />

affect logging-level changes for all users of a database.\n\nThe remote host is running the<br />

Oracle Application Server. This version is reported vulnerable to a flaw where a SYS user<br />

can disable Fine Grained Auditing (FGA) which then impacts the logging level of all users<br />

of the database.<br />

Solution: Upgrade to version 10.1.0.0.4 or higher.<br />

Family Internet Services 745


CVE-2006-1705<br />

Software602 602Pro LAN SUITE < 2004.0.05.0509 Directory Traversal Arbitrary File Access<br />

<strong>PVS</strong> ID: 2883 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a directory traversal flaw.\n\nThe remote<br />

host is running the 602Pro LAN SUITE, an application that provides web, FTP, telnet,<br />

DNS, RealAudio, SSL services and proxying. This version of 602Pro LAN SUITE is<br />

vulnerable to a remote directory traversal attack within the 'mail' scripts 'A' parameter. An<br />

attacker exploiting this flaw would simply supply a typical '../../' directory traversal query to<br />

the 'A' parameter. Successful exploitation would give the attacker access to any files on the<br />

remote system. This introduces a loss of confidentiality.<br />

Solution: Upgrade to version 2004.0.05.0509 or higher.<br />

CVE-2005-1423<br />

Apache htdigest realm Variable Overflow<br />

<strong>PVS</strong> ID: 2884 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host<br />

appears to be running a version of Apache, an open source web server. This version of<br />

Apache is vulnerable to a flaw in the 'htdigest' utilility. Specifically, a long user-supplied<br />

realm will cause an overflow and execution of arbitrary code. This issue is not considered a<br />

local flaw, as the program is not run setuid. An attacker exploiting this flaw would need to<br />

find a vulnerable Apache Web server that was making a call to 'htdigest' via a CGI script.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-1344<br />

WebStar Mail < 5.4.1 Tomcat Plugin Remote Overflow<br />

<strong>PVS</strong> ID: 2885 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running WebSTAR Mail, a mail server for Mac OS X that offers its services via a web<br />

interface. WebStar runs with the Tomcat plugin enabled by default. This version of<br />

WebStar is vulnerable to an attack against the Tomcat plugin. Specifically, a long,<br />

user-supplied URI will result in a buffer overflow. Successful exploitation would lead to<br />

the execution of arbitrary code on the remote server.<br />

Solution: Upgrade to a version greater than 5.4.1.<br />

CVE-2005-1507<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 746


PHP Advanced Transfer Manager < 1.22 Arbitrary File Upload<br />

<strong>PVS</strong> ID: 2886 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18207<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a script injection attack.\n\nAccording to its<br />

banner, the version of PHP Advanced Transfer Manager installed on the remote host allows<br />

authenticated users to upload arbitrary files and then run them subject to the privileges of<br />

the web server user.<br />

Solution: Upgrade to PHP Advanced Transfer Manager 1.22 or higher.<br />

CVE-2005-1681<br />

Mozilla Firefox < 1.0.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2887 FAMILY: Web Clients RISK: HIGH NESSUS ID:18243<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a script injection attack.\n\nThe remote host<br />

is using Firefox. This version of Firefox is prone to a remote exploit which stems from the<br />

'install()' method. Specifically, an attacker can pass JavaScript to the 'install()' method<br />

which would then be executed within the client browser. An attacker exploiting this flaw<br />

would only need to be able to entice a user into browsing to a malicious website. Successful<br />

exploitation would result in the client browser executing arbitrary code that could impact<br />

the confidentiality and integrity of the remote machine. The reported browser version (as<br />

seen on the network) is: \n %L<br />

Solution: Upgrade to version 1.0.4 or higher.<br />

CVE-2005-1532<br />

AOL Instant Messenger Font Tag sml Parameter Remote DoS<br />

<strong>PVS</strong> ID: 2888 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18299<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running AOL Instant Messenger (AIM). Versions 5.9.3702 and lower are<br />

reported to be vulnerable to a remote Denial of Service (DoS) attack. An attacker exploiting<br />

this flaw would only need to be able to initiate a chat, file transfer, or game request to a<br />

vulnerable instance of AOL IM. Successful exploitation would result in the Instant<br />

Messenger client crashing.<br />

Solution: When available, upgrade to a version of AOL IM greater than 5.9.3702.<br />

CVE-2005-1655<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Apple iTunes < 4.8 MPEG-4 File Handling Overflow<br />

<strong>PVS</strong> ID: 2889 FAMILY: Web Clients RISK: HIGH NESSUS ID:18214<br />

Family Internet Services 747


Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running iTunes - an application for managing and listening to music media files. The<br />

version of iTunes client is %L. \nThis version of iTunes is vulnerable to a buffer overflow.<br />

An attacker exploiting this flaw would need to be able to entice an iTunes user into opening<br />

a malformed file. Successful exploitation would result in the attacker executing arbitrary<br />

code on the remote system.<br />

Solution: Upgrade to version 4.8 or higher.<br />

CVE-2005-1248<br />

GeoVision Digital Surveillance System Detection<br />

<strong>PVS</strong> ID: 2890 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18220<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running GeoVision Digital Surveillance System, a<br />

web-based surveillance system that allows remote operators to control and manage data<br />

streams from multiple cameras. This version of GeoVision is vulnerable to a remote flaw<br />

that allows attackers to view images without authentication. An attacker can query any of<br />

the controlled cameras for the current image stored. Successful exploitation could lead to<br />

the compromise of confidential data.<br />

Solution: Upgrade to version 7.0 or higher.<br />

CVE-2005-1552<br />

GeoVision Digital Surveillance System Detection<br />

<strong>PVS</strong> ID: 2891 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running GeoVision Digital Surveillance System, a web-based<br />

surveillance system that allows remote operators to control and manage data streams from<br />

multiple cameras.<br />

Solution: Ensure that the existence of the surveillance system is explicitly allowed with respect to<br />

corporate policies and guidelines.<br />

CVE Not available<br />

myServer Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2892 FAMILY: Web Servers RISK: LOW NESSUS ID:18218<br />

Description: The remote host is running myServer 0.8.0 or older. There is a flaw in the remote version<br />

of this software that may allow an attacker to list directories or execute a Cross-Site<br />

Scripting (XSS) attack. The first flaw would allow an attacker access to potentially<br />

confidential data via a directory listing. The second flaw would require the attacker to be<br />

able to convince a user to browse a malicious URI. Successful exploitation would result in<br />

the attacker being able to retrieve potentially confidential data (such as authentication<br />

Family Internet Services 748


cookies).<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

ColdFusion Error Page XSS<br />

<strong>PVS</strong> ID: 2893 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running Macromedia ColdFusion, a web application server. This version<br />

of ColdFusion is vulnerable to a Cross-Site Scripting (XSS) flaw in the way that it handles<br />

displaying error pages. An attacker exploiting this flaw would need to be able to convince a<br />

user to browse to a malicious URI. Further, the Macromedia site would need to be utilizing<br />

the JRUN web server (installed by default, but not recommended for production services).<br />

Successful exploitation would result in the potential loss of confidential data (such as<br />

authentication cookies).<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Gaim < 1.3.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2894 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

appears to be running Gaim, a popular open-source, multi-protocol instant messenger. It is<br />

reported that this version of Gaim is vulnerable to several remote flaws. Namely\n\n1) The<br />

MSN protocol module is vulnerable to a remote Denial of Service (DoS) attack when sent a<br />

NULL SLP message. Successful exploitation results in the application crashing.\n\n2)<br />

Gaim instant messages support the sending of links (URIs). This version of Gaim only<br />

supports links of 8192 bytes or less. An attacker sending a link of more than 8192 bytes can<br />

overwrite memory and execute arbitrary code.<br />

Solution: Update to Gaim 1.3.0 or higher.<br />

CVE-2005-1261<br />

Bakbone NetVault < 7.1.1 Unspecified Remote Overflow<br />

<strong>PVS</strong> ID: 2895 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Bakbone NetVault, an enterprise backup/restore application. This version of<br />

NetVault is reported to be vulnerable to a remote heap overflow. The details of the flaw are<br />

not currently known. It is believed that a successful attack would lead to arbitrary code<br />

being executed.<br />

Solution: Upgrade to version 7.1.1 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 749


CVE-2005-1009<br />

Woppoware Postmaster < 4.2.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2896 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18246<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Woppoware Postmaster, a suite of products that allows users to surf the web via<br />

a proxy, connect to email accounts via a web interface, send and receive email, and<br />

remotely administer the services. This version of Postmaster is reported to be vulnerable to<br />

a number of flaws. An attacker exploiting these flaws would be able to gain access to<br />

confidential data, compromise the integrity of the machine, and impact the availability of<br />

the services.<br />

Solution: Upgrade to version 4.2.3 or higher.<br />

CVE-2005-1652<br />

BoastMachine < 3.1 users.inc.php Arbitrary File Upload<br />

<strong>PVS</strong> ID: 2897 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18247<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a 'file upload' flaw.\n\nThe remote host is<br />

running BoastMachine, a blogging software. This version of BoastMachine is vulnerable to<br />

a flaw in the users.inc.php script. Specifically, a remote user can pass a specially formatted<br />

HTTP request to the BoastMachine script and cause it to upload unsafe files. After upload,<br />

the attacker can then execute the files with the permissions of the web server. In addition,<br />

the attacker can leave malicious scripts that are executed by unsuspecting users who browse<br />

the web page.<br />

Solution: Upgrade to version 3.1 or higher.<br />

CVE-2005-1580<br />

MaxWebPortal < 1.360 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2898 FAMILY: CGI RISK: NONE NESSUS ID:18248<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nMaxWebPortal is<br />

a web portal that utilizes a backend SQL or MySQL database. This version of<br />

MaxWebPortal is vulnerable to multiple flaws that include: HTML injection, cross-site<br />

scripting (XSS) and SQL Injection. An attacker exploiting these flaws would only need to<br />

be able to send HTTP queries to the remote application. A successful attack would give the<br />

attacker the ability to read and write database data as well as potentially execute arbitrary<br />

remote commands on the database server. The HTML injection and XSS flaws would<br />

typically require that the attacker be able to coerce a user into browsing to a malicious URI.<br />

Successful exploitation would result in arbitrary code executing in the client browser and<br />

possible theft of confidential data (such as authentication cookies).<br />

Family Internet Services 750


Solution: Upgrade to version 1.360 or higher.<br />

CVE-2005-1561<br />

Quicktime < 7.0.1 Web Plugin Information Disclosure<br />

<strong>PVS</strong> ID: 2899 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18521<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running an older version of Quicktime player for Microsoft<br />

Windows. This version is vulnerable to a remote information disclosure flaw. It is alleged<br />

that when the Quicktime web plugin parses a malformed '.mov' video file, information may<br />

be disclosed to the website that is hosting the movie file. The information which is<br />

disclosed may include the computer name, operating system version, and hardware<br />

specifics. Such information may be used by the attacker to launch a more sophisticated<br />

attack. A remote attacker exploiting this flaw would need to create a malicious '.mov' file<br />

and entice the user to play it.<br />

Solution: Upgrade to version 7.0.1 or higher.<br />

CVE-2005-1579<br />

Bugzilla < 2.19.3 Information Disclosure<br />

<strong>PVS</strong> ID: 2900 FAMILY: CGI RISK: LOW NESSUS ID:18245<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote server is running Bugzilla, a bug tracking system. There is a flaw in<br />

the remote installation of Bugzilla that may allow an attacker to disclose sensitive<br />

information. Specifically, if a user generates a report prior to authentication, the user ID<br />

and password will be embedded within the report. An attacker exploiting this flaw would<br />

be able to harvest user IDs and passwords from generated reports.<br />

Solution: Upgrade to version 2.19.3 or higher.<br />

CVE-2005-1564<br />

Microsoft Media Player Versions 9 and 10 Arbitrary HTML Pop-up<br />

<strong>PVS</strong> ID: 2901 FAMILY: Generic<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote client can be tricked into opening up an HTML page.\n\nThe<br />

remote host is running Microsoft Media Player. There is a flaw in this version of Media<br />

Player that would allow a remote attacker to cause an HTML pop-up window to appear<br />

when a specially formed media file was opened. An attacker exploiting this flaw would<br />

need to be able to convince a user to download or browse to the malicious file. Successful<br />

exploitation would result in an HTML page opening on the remote system. This flaw would<br />

typically be used in conjunction with social engineering or a browser exploit.<br />

Family Internet Services 751


Solution: Upgrade to version 9.0.0.3263, 10.0.0.3901 or higher.<br />

CVE Not available<br />

Mozilla Browser < 1.7.8 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2902 FAMILY: Web Clients RISK: HIGH NESSUS ID:18244<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is using Mozilla. The remote version of this software contains various security issues that<br />

may allow an attacker to execute arbitrary code on the remote host. The reported browser<br />

version (as seen on the network) is: \n %L<br />

Solution: Upgrade to Mozilla 1.7.8 or higher.<br />

CVE-2005-1532<br />

PhotoPost PHP Pro < 5.02 RC4 member.php uid Parameter SQL Injection<br />

<strong>PVS</strong> ID: 2903 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running PhotoPost, a web-based image gallery written in<br />

PHP. This version of PhotoPost is reported vulnerable to a remote SQL Injection flaw. An<br />

attacker exploiting this flaw would only need to be able to send HTTP requests to or from<br />

the application web server. Successful exploitation would result in the attacker being able<br />

to read or write data. In addition, the attacker may be able to execute arbitrary code on the<br />

remote database server.<br />

Solution: Upgrade to version 5.02 RC4 or higher.<br />

CVE-2005-1629<br />

Checkpoint Firewall-1 Patch Level 0 Detection<br />

<strong>PVS</strong> ID: 2904 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the Firewall-1 4.1 VPN Server. The remote server is not running any Checkpoint<br />

patches. Since the release of version 4.1, there have been at least six (6) critical patches<br />

released by Checkpoint. This version of Firewall-1 is vulnerable to a myriad of remote<br />

attacks that would give the attacker the ability to impact confidentiality, integrity, and<br />

availability of the remote system<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Checkpoint Firewall-1 Patch Level 1 Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 752


<strong>PVS</strong> ID: 2905 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the Firewall-1 4.1 VPN Server. The remote server is running with Service Pack<br />

1. There have been at least five (5) critical patches released by Checkpoint since SP1. This<br />

version of Firewall-1 is vulnerable to a myriad of remote attacks that would give the<br />

attacker the ability to impact confidentiality, integrity, and availability of the remote<br />

system.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Checkpoint Firewall-1 Patch Level 2 through 6 Detection<br />

<strong>PVS</strong> ID: 2906 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the Firewall-1 4.1 VPN Server. The remote server is running with Service Pack 2<br />

- 6. There have been at least four (4) critical patches released by Checkpoint since SP2.<br />

This version of Firewall-1 may be vulnerable to a myriad of remote attacks that would give<br />

the attacker the ability to impact confidentiality, integrity, and availability of the remote<br />

system.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Checkpoint Firewall-1 NG AI R54 Detection<br />

<strong>PVS</strong> ID: 2907 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the Firewall-1 NG VPN Server. The remote server is running with version R54.<br />

There have been at least two (2) critical patches released by Checkpoint since R54. This<br />

version of Firewall-1 may be vulnerable to a myriad of remote attacks that would give the<br />

attacker the ability to impact confidentiality, integrity, and availability of the remote<br />

system.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Checkpoint Firewall-1 NG AI R55 Detection<br />

<strong>PVS</strong> ID: 2908 FAMILY: Generic<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 753


Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the Firewall-1 NG VPN Server. The remote server is running with version R55.<br />

There has been at least one (1) critical patch released by Checkpoint since R55. This<br />

version of Firewall-1 may be vulnerable to a myriad of remote attacks that would give the<br />

attacker the ability to impact confidentiality, integrity, and availability of the remote<br />

system.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-3885<br />

Checkpoint Firewall-1 NG Patch Level 0 Detection<br />

<strong>PVS</strong> ID: 2909 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the Firewall-1 NG VPN Server. The remote server is not running any<br />

Checkpoint patches. Since the release of Firewall-1 NG, there have been at least five (5)<br />

critical patches released by Checkpoint. This version of Firewall-1 is vulnerable to a<br />

myriad of remote attacks that would give the attacker the ability to impact confidentiality,<br />

integrity, and availability of the remote system<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Checkpoint Firewall-1 NG Patch Level FP1 Detection<br />

<strong>PVS</strong> ID: 2910 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the Firewall-1 NG VPN Server. The remote server is running Checkpoint patch<br />

level FP1. Since the release of Firewall-1 NG FP1, there have been at least four (4) critical<br />

patches released by Checkpoint. This version of Firewall-1 is vulnerable to a myriad of<br />

remote attacks that would give the attacker the ability to impact confidentiality, integrity,<br />

and availability of the remote system<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Checkpoint Firewall-1 NG Patch Level FP2 Detection<br />

<strong>PVS</strong> ID: 2911 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the Firewall-1 NG VPN Server. The remote server is running Checkpoint patch<br />

level FP2. Since the release of Firewall-1 NG FP2, there have been at least three (3) critical<br />

patches released by Checkpoint. This version of Firewall-1 is vulnerable to a myriad of<br />

remote attacks that would give the attacker the ability to impact confidentiality, integrity,<br />

and availability of the remote system<br />

Family Internet Services 754


Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Checkpoint Firewall-1 NG Patch Level FP3 Detection<br />

<strong>PVS</strong> ID: 2912 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the Firewall-1 NG VPN Server. The remote server is running Checkpoint patch<br />

level FP3. Since the release of Firewall-1 NG FP3, there have been at least two (2) critical<br />

patches released by Checkpoint. This version of Firewall-1 is vulnerable to a myriad of<br />

remote attacks that would give the attacker the ability to impact confidentiality, integrity,<br />

and availability of the remote system<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Checkpoint Firewall-1 VPN Detection<br />

<strong>PVS</strong> ID: 2913 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a Checkpoint Firewall-1 VPN Server.<br />

Solution: N/A<br />

VPN Client Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 2914 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote workstation is running as a VPN client. The workstation is connecting to a<br />

remote network via an encrypted VPN session. Depending on the configuration of the VPN<br />

server on the remote network, the client may be routing traffic to/from an untrusted<br />

network.<br />

Solution: Ensure that corporate policies and guidelines allow for hosts connecting to other networks<br />

via a VPN.<br />

CVE Not available<br />

VPN Server Detection (over PPTP)<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2915 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 755


Description: The remote server is acting as a VPN server.<br />

Solution: N/A<br />

CVE Not available<br />

Fortinet VPN Server Detection (over PPTP)<br />

<strong>PVS</strong> ID: 2916 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Fortinet %L PPTP VPN.<br />

Solution: Ensure that the VPN is within corporate policy.<br />

CVE Not available<br />

JGS-Portal < 3.03 Multiple Scripts SQL Injection<br />

<strong>PVS</strong> ID: 2917 FAMILY: CGI RISK: HIGH NESSUS ID:18289<br />

Description: The remote host is running JGS-Portal, a plugin for the Woltlab web\napplication. This<br />

version of JGS-Portal is vulnerable to a remote SQL\ninjection attack. An attacker<br />

exploiting this flaw would send a\nmalformed HTTP query to one of the following php<br />

scripts:\n- jgs_portal.php\n- jgs_portal_statistik.php\n- jgs_portal_beitraggraf.php\njgs_portal_mitgraf.php\n-jgs_portal_themengraf.php\njgs_portal_viewsgraf.php\n\nSuccessful<br />

exploitation would result in the attacker being able<br />

to\nread or write confidential data. In addition, the attacker may be\nable to execute<br />

arbitrary code on the remote database server.<br />

Solution: Upgrade to version 3.0.3 or higher.<br />

CVE Not available<br />

WordPress < 1.5.1.2 SQL Injection and XSS<br />

<strong>PVS</strong> ID: 2918 FAMILY: CGI RISK: HIGH NESSUS ID:18301<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running WordPress, a web blog manager written in PHP. The remote version of this<br />

software is vulnerable to various flaws that may allow an attacker to perform a SQL<br />

injection attack against the remote host. Successful exploitation would allow an attacker to<br />

read/write confidential data as well as potentially execute arbitrary code on the remote<br />

database. In addition, the remote host is vulnerable to multiple cross-site scripting (XSS)<br />

flaws.<br />

Solution: Upgrade to WordPress 1.5.1.2 or higher.<br />

CVE-2005-1810<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

ignitionServer < 0.3.6p1 Channel Locking Remote DoS<br />

Family Internet Services 756


<strong>PVS</strong> ID: 2919 FAMILY: IRC Servers RISK: HIGH NESSUS ID:18291<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running an ignitionServer IRC server. This version of ignitionServer is<br />

reported to be prone to a remote remote denial of service in the way that the server handles<br />

channel locking. Specifically, a non-operator can create a locked channel which cannot be<br />

unlocked by an authorized operator. The only way to clear the channel would be to reboot<br />

the server. This can cause a loss of availability.<br />

Solution: Upgrade to version 0.3.6p1 or higher.<br />

CVE-2005-1641<br />

Serendipity < 0.80 RC7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2920 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18298<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Serendipity. Serendipity is a\nBlogging software that is implemented in PHP.<br />

This version of Serendipity\nis reported vulnerable to multiple remote exploits. It is<br />

reported that\nthis version is vulnerable to HTML injection, Cross-Site Scripting<br />

(XSS),\nand file upload flaws. An attacker exploiting these flaws would be able\nto gain or<br />

elevate privileges on the remote machine. An attacker may also\nbe able to user the server<br />

as an attack vector against unsuspecting users browsing the website.<br />

Solution: Upgrade to version 0.80 RC7 or higher.<br />

CVE-2005-1712<br />

NetWin SurgeMail < 3.0.0c3 Multiple Unspecified Remote Vulnerabilities<br />

<strong>PVS</strong> ID: 2921 FAMILY: SMTP Servers RISK: NONE NESSUS ID:18354<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running NetWin SurgeMail, a mail server application. The remote version of this<br />

software is vulnerable to multiple unspecified vulnerabilities that have been disclosed by<br />

the vendor.<br />

Solution: Upgrade to version 3.0.0c3 or higher.<br />

Groove Detection<br />

CVE-2005-1714<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2922 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running %L, a virtual office workspace that\nallows remote users to<br />

collaborate via the Internet. Groove uses\ncentralized servers to keep remote workers<br />

synchronized with each other.<br />

Family Internet Services 757


Solution: Ensure that you are using the most recent version of Groove.<br />

CVE Not available<br />

Groove < 3.1.0 Build 2338 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2923 FAMILY: Generic RISK: HIGH NESSUS ID:18355<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Groove, a virtual office workspace that allows remote users to collaborate via the<br />

Internet. Groove uses centralized servers to keep remote workers synchronized with each<br />

other. This version of Groove is vulnerable to multiple remote attacks. The attacks stem<br />

from a lack of content parsing by the Groove product. An attacker exploiting these flaws<br />

would need to be able to entice a Groove user into opening or viewing malicious files or<br />

data from within the Groove application. Successful exploitation leads to the attacker being<br />

able to execute arbitrary code on the unsuspecting user.<br />

Solution: Upgrade to version 3.1.0 build 2338 or higher.<br />

CVE-2005-1677<br />

Cisco IOS VPN Detection<br />

<strong>PVS</strong> ID: 2924 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running a Cisco IOS VPN server.\n\nA VPN (Virtual Private <strong>Network</strong>)<br />

allows remote users to connect to an\ninternal network as if they were local users. A VPN<br />

that allows\nsplit-tunneling will essentially serve as a bridge between the remote\nnetwork<br />

and the internal network. Special care should be taken to\nensure that remote VPN clients<br />

connect securely and do not introduce\nan unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to corporate guidelines and policies.<br />

CVE Not available<br />

Cisco Unity VPN Detection<br />

<strong>PVS</strong> ID: 2925 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running a Cisco Unity VPN server.\n\nA VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an\ninternal network as if they were local<br />

users. A VPN that allows\nsplit-tunneling will essentially serve as a bridge between the<br />

remote\nnetwork and the internal network. Special care should be taken to\nensure that<br />

remote VPN clients connect securely and do not introduce\nan unacceptable level of risk to<br />

the internal computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to corporate guidelines and policies.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 758


SSH Sentinel VPN Detection<br />

<strong>PVS</strong> ID: 2926 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running a SSH Sentinel VPN Server.\n\nA VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an\ninternal network as if they were local<br />

users. A VPN that allows\nsplit-tunneling will essentially serve as a bridge between the<br />

remote\nnetwork and the internal network. Special care should be taken to\nensure that<br />

remote VPN clients connect securely and do not introduce\nan unacceptable level of risk to<br />

the internal computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to corporate guidelines and policies.<br />

CVE Not available<br />

SSH Sentinel 1.1 VPN Detection<br />

<strong>PVS</strong> ID: 2927 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running a SSH Sentinel 1.1 VPN Server.\n\nA VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an\ninternal network as if they were local<br />

users. A VPN that allows\nsplit-tunneling will essentially serve as a bridge between the<br />

remote\nnetwork and the internal network. Special care should be taken to\nensure that<br />

remote VPN clients connect securely and do not introduce\nan unacceptable level of risk to<br />

the internal computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to corporate guidelines and policies.<br />

CVE Not available<br />

SSH Sentinel 1.2 VPN Detection<br />

<strong>PVS</strong> ID: 2928 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running a SSH Sentinel 1.2 VPN Server.\n\nA VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an\ninternal network as if they were local<br />

users. A VPN that allows\nsplit-tunneling will essentially serve as a bridge between the<br />

remote\nnetwork and the internal network. Special care should be taken to\nensure that<br />

remote VPN clients connect securely and do not introduce\nan unacceptable level of risk to<br />

the internal computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to corporate guidelines and policies.<br />

CVE Not available<br />

SSH Sentinel 1.3 VPN Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2929 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 759


Description: The remote host is running a SSH Sentinel 1.3 VPN Server.\n\nA VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an\ninternal network as if they were local<br />

users. A VPN that allows\nsplit-tunneling will essentially serve as a bridge between the<br />

remote\nnetwork and the internal network. Special care should be taken to\nensure that<br />

remote VPN clients connect securely and do not introduce\nan unacceptable level of risk to<br />

the internal computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to corporate guidelines and policies.<br />

CVE Not available<br />

SSH Sentinel 1.4.1 VPN Detection<br />

<strong>PVS</strong> ID: 2930 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running a SSH Sentinel 1.4.1 VPN Server.\n\nA VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an\ninternal network as if they were local<br />

users. A VPN that allows\nsplit-tunneling will essentially serve as a bridge between the<br />

remote\nnetwork and the internal network. Special care should be taken to\nensure that<br />

remote VPN clients connect securely and do not introduce\nan unacceptable level of risk to<br />

the internal computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to corporate guidelines and policies.<br />

CVE Not available<br />

SSH Sentinel 1.4 VPN Detection<br />

<strong>PVS</strong> ID: 2931 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running a SSH Sentinel 1.4 VPN Server.\n\nA VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an\ninternal network as if they were local<br />

users. A VPN that allows\nsplit-tunneling will essentially serve as a bridge between the<br />

remote\nnetwork and the internal network. Special care should be taken to\nensure that<br />

remote VPN clients connect securely and do not introduce\nan unacceptable level of risk to<br />

the internal computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to corporate guidelines and policies.<br />

Cisco VPN Detection<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2932 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running a generic Cisco VPN Server.\n\nA VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an\ninternal network as if they were local<br />

users. A VPN that allows\nsplit-tunneling will essentially serve as a bridge between the<br />

remote\nnetwork and the internal network. Special care should be taken to\nensure that<br />

remote VPN clients connect securely and do not introduce\nan unacceptable level of risk to<br />

the internal computing environment.<br />

Family Internet Services 760


Solution: Ensure that the VPN is acceptable with respect to corporate guidelines and policies.<br />

CVE Not available<br />

PHP Advanced Transfer Manager < 1.22 File Upload Arbitrary Command Execution<br />

<strong>PVS</strong> ID: 2933 FAMILY: CGI RISK: NONE NESSUS ID:18207<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection attack.\n\nAccording to its<br />

banner, the version of PHP Advanced Transfer Manager installed on the remote host allows<br />

authenticated users to upload arbitrary files and then run them subject to the privileges of<br />

the web\nserver user.<br />

Solution: Upgrade to version 1.22 or higher.<br />

CVE-2005-1681<br />

Mac OS X 10.4.0 Detection<br />

<strong>PVS</strong> ID: 2934 FAMILY: Operating System Detection RISK:<br />

MEDIUM<br />

NESSUS ID:18353<br />

Description: The remote host is running a version of Mac OS X 10.4 that is older than 10.4.2 : \n %L<br />

Solution: Upgrade to version 10.4.2 or higher.<br />

CVE-2005-1473<br />

Qualcomm Qpopper < 4.0.5 Multiple Local Privilege Escalation<br />

<strong>PVS</strong> ID: 2935 FAMILY: POP Server RISK: HIGH NESSUS ID:18361<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a local privilege escalation flaw.\n\nThe<br />

remote host is running Qpopper, a POP3 mail server for Unix-type systems.\nThis version<br />

of Qpopper is vulnerable to multiple local configuration flaws.\nA local attacker exploiting<br />

these flaws would be able to elevate privileges\non the Qpopper system.<br />

Solution: Upgrade to version 4.0.5 or higher.<br />

CVE-2005-1152<br />

Delegate Compressed DNS Packet Remote DoS<br />

<strong>PVS</strong> ID: 2936 FAMILY: DNS Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running the Delegate DNS Service. This version of Delegate is vulnerable to<br />

a remote Denial of Service flaw. An attacker exploiting this flaw would send a malformed<br />

DNS query to the host. Successful exploitation would result in the loss of availability.<br />

Family Internet Services 761


Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-4794<br />

MaxWebPortal password.asp memKey Parameter SQL Injection<br />

<strong>PVS</strong> ID: 2937 FAMILY: CGI RISK: NONE NESSUS ID:18370<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nMaxWebPortal is<br />

a web portal that utilizes a backend SQL or MySQL database.\nThis version of<br />

MaxWebPortal is vulnerable to a SQL Injection flaw.\n\nAn attacker exploiting this flaw<br />

would only need to be able to send HTTP\nqueries to the remote application. A successful<br />

attack would give the attacker\nthe ability to read and write database data as well as<br />

potentially execute\narbitrary remote commands on the database server.<br />

Solution: Upgrade to a version 1.360, 2.000 or higher.<br />

CVE-2005-1779<br />

GNU Mailutils Multiple IMAP Vulnerabilities<br />

<strong>PVS</strong> ID: 2938 FAMILY: POP Server RISK: HIGH NESSUS ID:19605<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running GNU Mailutils, an open source package that includes tools for running and<br />

managing a mail server. This version of GNU Mailutils is vulnerable to several remote<br />

buffer overflows. An attacker exploiting these flaws will be able to execute arbitrary code.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-1523<br />

GNU Mailutils Multiple POP Vulnerabilities<br />

<strong>PVS</strong> ID: 2939 FAMILY: POP Server RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running GNU Mailutils, an open source package that includes tools for running and<br />

managing a mail server. This version of GNU Mailutils is vulnerable to several remote<br />

buffer overflows. An attacker exploiting these flaws will be able to execute arbitrary code<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Apache htpasswd Overflow<br />

<strong>PVS</strong> ID: 2940 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:14771<br />

Family Internet Services 762


Description: Synopsis :\n\nThe remote web server could potentially allow remote attackers to<br />

manipulate the password database.\n\nThe remote host appears to be running a version of<br />

Apache, an open source web server. This version of Apache is vulnerable to a flaw in the<br />

'htpasswd' utility. This issue is not considered a local flaw, as the program is not run setuid.<br />

An attacker exploiting this flaw would need to find a vulnerable Apache Web server that<br />

was making a call to 'htpasswd' via a CGI script.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Hummingbird Inetd Multiple Remote Overflows<br />

<strong>PVS</strong> ID: 2941 FAMILY: FTP Servers RISK: HIGH NESSUS ID:18403<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Hummingbird Inetd, a commercial INETD server. This version of Inetd is<br />

vulnerable to a remote overflow in the lpd service module. An attacker exploiting this flaw<br />

would be able to execute arbitrary code on the remote system. NOTE: this is only a flaw if<br />

the lpd module is enabled. In addition, the remote ftpd module is vulnerable to a remote<br />

buffer overflow. An attacker exploiting this flaw would be able to execute arbitrary code on<br />

the remote system.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-2599<br />

Invision Board < 2.0.5 Privilege Escalation / SQL Injection<br />

<strong>PVS</strong> ID: 2942 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18401<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running Invision Board, a CGI suite designed to set up a<br />

bulletin board system on the remote web server.\nThis version of Invision Board is<br />

vulnerable to a flaw in the way that it handles moving of users from one group to another<br />

group. It is reported that non-admin users can, when deleting a user account, optionally<br />

move the user into an administrative group.\nThis can allow users to elevate their rights to<br />

that of an administrator.\n\nIn addition to this, the remote version of this software is<br />

vulnerable to a SQL injection vulnerability that may allow an attacker to execute arbitrary<br />

SQL statements against the remote host.<br />

Solution: Upgrade to version 2.0.5 or higher.<br />

CVE-2006-0888<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

PeerCast < 0.1212 URL Error Message Format String<br />

<strong>PVS</strong> ID: 2943 FAMILY: Web Servers RISK: HIGH NESSUS ID:18417<br />

Family Internet Services 763


Description: Synopsis :\n\nThe remote host is vulnerable to a 'format string' flaw.\n\nThe remote host is<br />

running PeerCast, a streaming audio server. This version of PeerCast is vulnerable to a<br />

remote format string flaw within its HTTP server component. An attacker exploiting this<br />

flaw would be able to crash the server or execute arbitrary code on the remote system.<br />

Solution: Upgrade to version 0.1212 or higher.<br />

CVE-2005-1806<br />

Exhibit Engine < 1.5 RC 5 list.php Multiple Parameter SQL Injection<br />

<strong>PVS</strong> ID: 2944 FAMILY: CGI RISK: HIGH NESSUS ID:18416<br />

Description: The remote host is running Exhibit Engine, a web-based PHP application for sharing<br />

photos. This version of Exhibit Engine is vulnerable to a remote SQL injection flaw. An<br />

attacker exploiting this flaw would send a malformed HTTP query to the application.<br />

Successful exploitation would result in the attacker being able to read or write confidential<br />

data. In addition, the attacker may be able to execute arbitrary code on the remote database<br />

server.<br />

Solution: Upgrade to version 1.5 RC 5 or higher.<br />

CVE-2005-1875<br />

CROB FTP Server Multiple Command Remote Overflow DoS<br />

<strong>PVS</strong> ID: 2945 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the CROB FTP Server. This version of CROB is vulnerable to a remote<br />

stack-based overflow when sent a malformed RMD command. An attacker exploiting this<br />

flaw would be able to execute arbitrary code. In addition, there are also multiple<br />

heap-based overflows within many other FTP commands.<br />

Solution: No solution is known at this time.<br />

CVE-2006-6558<br />

FlexCast < 2.0 Remote Overflow<br />

<strong>PVS</strong> ID: 2946 FAMILY: Web Servers RISK: NONE NESSUS ID:18429<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running FlexCast, a streaming audio and video server. This version of FlexCast is<br />

vulnerable to a remote buffer overflow. An attacker exploiting this flaw would be able to<br />

execute arbitrary code on the remote system.<br />

Solution: Upgrade to version 2.0 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 764


CVE-2005-1897<br />

Sawmill < 7.1.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2947 FAMILY: Web Servers RISK: NONE NESSUS ID:18507<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe<br />

remote host is running Sawmill, an application for analyzing web logs. Sawmill<br />

typically is viewed via a web front-end and works off of a MySQL server. This<br />

version of Sawmill is vulnerable to multiple remote flaws. While some of the flaws<br />

have not yet been fully disclosed, it is believed that the flaws will lead to either<br />

privilege escalation or Cross-Site Scripting (XSS). An attacker exploiting these<br />

flaws would either require credentials or require that a user browse to a malicious<br />

URI.<br />

Solution: Upgrade to version 7.1.6 or higher.<br />

CVE-2005-1900<br />

KAME/racoon VPN Detection<br />

<strong>PVS</strong> ID: 2948 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running a KAME Racoon VPN Server.\n\nA VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an\ninternal network as if they were local<br />

users. A VPN that allows\nsplit-tunneling will essentially serve as a bridge between the<br />

remote\nnetwork and the internal network. Special care should be taken to\nensure that<br />

remote VPN clients connect securely and do not introduce\nan unacceptable level of risk to<br />

the internal computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to corporate guidelines and policies.<br />

CVE Not available<br />

Microsoft Windows 2000 VPN Detection<br />

<strong>PVS</strong> ID: 2949 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Microsoft Windows 2000 VPN Server.\n\nA VPN (Virtual<br />

Private <strong>Network</strong>) allows remote users to connect to an\ninternal network as if they were<br />

local users. A VPN that allows\nsplit-tunneling will essentially serve as a bridge between<br />

the remote\nnetwork and the internal network. Special care should be taken to\nensure that<br />

remote VPN clients connect securely and do not introduce\nan unacceptable level of risk to<br />

the internal computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to corporate guidelines and policies.<br />

CVE Not available<br />

Netscreen VPN Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 765


<strong>PVS</strong> ID: 2950 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Netscreen VPN Server.\n\nA VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an\ninternal network as if they were local<br />

users. A VPN that allows\nsplit-tunneling will essentially serve as a bridge between the<br />

remote\nnetwork and the internal network. Special care should be taken to\nensure that<br />

remote VPN clients connect securely and do not introduce\nan unacceptable level of risk to<br />

the internal computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to corporate guidelines and policies.<br />

CVE Not available<br />

OpenPGP VPN Detection<br />

<strong>PVS</strong> ID: 2951 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the OpenPGP VPN Server.\n\nA VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an\ninternal network as if they were local<br />

users. A VPN that allows\nsplit-tunneling will essentially serve as a bridge between the<br />

remote\nnetwork and the internal network. Special care should be taken to\nensure that<br />

remote VPN clients connect securely and do not introduce\nan unacceptable level of risk to<br />

the internal computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to corporate guidelines and policies.<br />

CVE Not available<br />

SafeNet SoftRemote VPN Detection<br />

<strong>PVS</strong> ID: 2952 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the SafeNet SoftRemote VPN Server.\n\nA VPN (Virtual<br />

Private <strong>Network</strong>) allows remote users to connect to an internal network as if they were<br />

local users. A VPN that allows split-tunneling will essentially serve as a bridge between the<br />

remote network and the internal network. Special care should be taken to ensure that<br />

remote VPN clients connect securely and do not introduce an unacceptable level of risk to<br />

the internal computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to corporate guidelines and policies.<br />

CVE Not available<br />

AVG AntiVirus Version Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3007 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running AVG anti-virus %L<br />

Solution: Ensure that all clients are configured for automatic updates.<br />

Family Internet Services 766


CVE Not available<br />

AOL Instant Messenger Remote Malformed GIF DoS<br />

<strong>PVS</strong> ID: 3008 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:18432<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running AOL Instant Messenger (AIM). Versions 5.9.3797 and lower are<br />

reported vulnerable to a remote Denial of Service (DoS) attack. An attacker exploiting this<br />

flaw would only need to be able to initiate an GIF image exchange with a vulnerable AOL<br />

IM client. Successful exploitation would result in the Instant Messenger client crashing.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-1891<br />

GoodTech < 5.15 SMTP RCPT TO: Single Character DoS<br />

<strong>PVS</strong> ID: 3009 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18433<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running the GoodTech SMTP server. This version of Goodtech is vulnerable<br />

to a remote Denial of Service (DoS) attack. An attacker sending a single character as an<br />

argument to the 'RCPT TO:' value, will cause the server to crash.<br />

Solution: Upgrade to version 5.15 or higher.<br />

CVE-2005-1013<br />

Mac OS X 10.4.1 Detection<br />

<strong>PVS</strong> ID: 3010 FAMILY: Operating System Detection RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is running Mac OS 10.4.1. It should run 10.4.2 to be up-to-date.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Leafnode < 1.11.3 TCP Timeout DoS<br />

<strong>PVS</strong> ID: 3011 FAMILY: Generic<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running the LeafNode NNTP server. The version of LeafNode that is<br />

installed is vulnerable to a remote Denial of Service (DoS) attack. When an upstream<br />

NNTP server requests a header and then allows the connection to time out, the LeafNode<br />

Family Internet Services 767


NNTP server fails. Successful exploitation would result in a loss of availability.<br />

Solution: Upgrade to version 1.11.3 or higher.<br />

CVE-2005-1911<br />

Gaim < 1.3.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3012 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host appears to be running Gaim, a popular open-source, multi-protocol instant<br />

messenger. It is reported that this version of Gaim is vulnerable to several remote flaws.<br />

Namely\n\n1) A Gaim client downloading a non-Ascii support file will crash when<br />

processing the file\n2) The Gaim MSN Messenger module, when processing a malformed<br />

message, will crash.\n\nBoth of these vulnerabilities are Denial of Service (DoS) attacks<br />

that introduce a risk to availability.<br />

Solution: Update to version 1.3.1 or higher.<br />

CVE-2005-1269<br />

Outlook Express NNTP LIST Command Remote Overflow<br />

<strong>PVS</strong> ID: 3013 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:18489<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Outlook Express. This version of Outlook Express is vulnerable to a buffer<br />

overflow when malformed NNTP responses are parsed by versions of msoe.dll prior to<br />

6.00.2800.1506. An attacker exploiting this flaw would need to host a malicious NNTP<br />

server and be able to convince a local Outlook user to connect to the NNTP server.<br />

Successful exploitation would result in arbitrary code being executed on the machine<br />

running Outlook Express.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-1213<br />

Outlook Web Access with Exchange 5.5 SP4 XSS<br />

<strong>PVS</strong> ID: 3014 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18488<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack\n\nThe<br />

remote server is running Outlook Web Access (OWA) on Exchange %L\n\nThis version of<br />

OWA, coupled with Exchange 5.5 SP4, is reported to be vulnerable to a remote Cross-Site<br />

Scripting (XSS) flaw. An attacker exploiting this flaw would typically need to be able to<br />

convince a user to browse to a malicious URI. Successful exploitation would result in<br />

arbitrary code executing in the client browser and possible theft of confidential data (such<br />

as authentication cookies).<br />

Family Internet Services 768


Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-0563<br />

Opera Multiple Injection Vulnerabilities<br />

<strong>PVS</strong> ID: 3015 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18503<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML Injection attack.\n\nThe remote<br />

host is using a version of Opera that is prone to a security flaw where a malicious attacker<br />

can inject malicious data into a URI. Such an attack would require that the attacker be able<br />

to convince an Opera user to browse to a malicious URI. Successful exploitation would<br />

result in the attacker gaining access to confidential data (such as authentication cookies) or<br />

executing code within the browser.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2003-1420<br />

SquirrelMail < 1.4.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3016 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18504<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running SquirrelMail, a webmail system written in PHP.\nThe version of SquirrelMail<br />

installed on the remote host is prone to multiple flaws :\n - Multiple Cross-Site Scripting<br />

Vulnerabilities. Using a specially-crafted URL or email message, an attacker may be able<br />

to exploit these flaws, stealing cookie-based session identifiers and thereby hijacking<br />

SquirrelMail sessions.\n - Post Variable Handling Vulnerabilities - Using specially-crafted<br />

POST requests, an attacker may be able to set random variables in the file<br />

'options_identities.php', which could lead to accessing other users' preferences, cross-site<br />

scripting attacks, and writing to arbitrary files.\n<br />

Solution: Upgrade to version 1.4.5 or higher.<br />

CVE-2005-1769<br />

Ultimate PHP Board < 1.9.7 Multiple XSS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3017 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running Ultimate PHP Board, a message board written \nin PHP.<br />

Versions of Ultimate less than 1.9.7 are vulnerable to\nmultiple Cross-Site Scripting (XSS)<br />

flaws. An attacker \nexploiting these flaws would typically need to be able to convince a<br />

user\nto browse to a malicious URI. Successful exploitation would result\nin arbitrary code<br />

executing in the client browser and possible theft of\nconfidential data (such as<br />

authentication cookies).<br />

Family Internet Services 769


Solution: Upgrade to version 1.9.7 or higher.<br />

CVE-2005-2004<br />

HTTP Plaintext Password Authentication<br />

<strong>PVS</strong> ID: 3018 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an<br />

insecure manner.\n\nThe remote client sent an HTTP auth request in cleartext. The<br />

base64-encoded password it used was:\n\n %L<br />

realtime<br />

Solution: Use SSL or a stronger authentication mechanism.<br />

CVE Not available<br />

YAWS < 1.56 Script File Source Code Disclosure<br />

<strong>PVS</strong> ID: 3019 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18522<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files.\n\nThe remote host is running YAWS, a web server. This version of YAWS<br />

is vulnerable to a NULL byte script file source code disclosure bug. An attacker appending<br />

a '%00' to the end of a request can download source code.\n\nThe remote host is running<br />

%L<br />

Solution: Upgrade to version 1.56 or higher.<br />

CVE-2005-2008<br />

Razor-agents < 2.72 Multiple DoS<br />

<strong>PVS</strong> ID: 3020 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running the razor-agent, a distributed client that connects to the razor spam<br />

detection and filtering network. This version of Razor-agent is vulnerable to a remote<br />

Denial of Service (DoS) attack via a malformed query. The details of the attack vectors are<br />

not currently known<br />

Solution: Upgrade to version 2.72 or higher.<br />

CVE-2005-2024<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

JBoss Malformed HTTP Request Remote Configuration Information Disclosure<br />

<strong>PVS</strong> ID: 3021 FAMILY: Web Servers NESSUS ID:18526<br />

Family Internet Services 770


RISK:<br />

MEDIUM<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote JBoss server is vulnerable to an information disclosure flaw that<br />

may allow an attacker to retrieve the physical path of the server installation, its security<br />

policy, or to guess its exact version number.\nAn attacker may use this flaw to gain more<br />

information about the remote configuration.<br />

Solution: Upgrade to JBoss 3.2.8, 4.0.3 or higher.<br />

ZenWorks Detection<br />

CVE-2005-2006<br />

<strong>PVS</strong> ID: 3022 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running ZenWorks, a remote management interface from Novell.<br />

Solution: N/A<br />

CVE Not available<br />

Cisco VPN Concentrator Group Name Enumeration<br />

<strong>PVS</strong> ID: 3023 FAMILY: SNMP Traps<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote VPN concentrator is subject to an information disclosure flaw.\nAn<br />

attacker connecting in Agressive mode can determine whether a remote Cisco group is<br />

defined. This can allow the attacker the ability to garner information useful in future brute<br />

force attacks.<br />

Solution: http://www.cisco.com/univercd/cc/td/doc/product/vpn/vpn3000/4_7/471con3k.htm<br />

CVE-2005-2025<br />

MercuryBoard User-Agent HTTP Header SQL Injection<br />

<strong>PVS</strong> ID: 3024 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18541<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running MercuryBoard, a web-based message board written in PHP. This version of<br />

MercuryBoard is vulnerable to a remote SQL Injection flaw.\nAn attacker exploiting this<br />

flaw would send a malformed HTTP query to the application. Successful exploitation<br />

would result in the attacker being able to read or write confidential data. In addition, the<br />

attacker may be able to execute arbitrary code on the remote database server.<br />

Family Internet Services 771


Solution: Upgrade or patch according to vendor recommendations.<br />

Raxnet Cacti Detection<br />

CVE-2005-2028<br />

<strong>PVS</strong> ID: 3025 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running Cacti, a web frontend to RRDTool. Cacti allows<br />

administrators to view network graphs, utilization, architecture, and more. An attacker<br />

happening upon an instance of Cacti would gain information useful in future attacks.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

i-Gallery Traversal File Access / XSS<br />

<strong>PVS</strong> ID: 3026 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18539<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Directory Traversal flaw.\n\nThe remote<br />

host is running i-Gallery, a web-based photo gallery.\nThis version of i-Gallery is<br />

vulnerable to multiple flaws. Most importantly, the application is vulnerable to a directory<br />

traversal flaw. An attacker exploiting this flaw would only need to be able to send '../'<br />

HTTP requests to the vulnerable system. A successful attack would result in the attacker<br />

being able to download confidential files (such as password data).<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-2033<br />

IpSwitch WhatsUp < 2005 SP 1A Login.asp Multiple Parameter SQL Injection<br />

<strong>PVS</strong> ID: 3027 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18552<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running the IpSwitch WhatsUp application, a tool for managing network hosts. This<br />

version of IpSwitch WhatsUp is vulnerable to a remote SQL Injection flaw.\nThe login.asp<br />

script fails to parse out SQL-reserved characters and would allow a remote attacker to read<br />

or write data as well as potentially execute arbitrary code on the remote database<br />

Solution: Upgrade to version 2005 SP 1A or higher.<br />

CVE-2005-1250<br />

Simple Machines Forum < 1.0.5 SQL Injection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 772


<strong>PVS</strong> ID: 3028 FAMILY: CGI RISK: HIGH NESSUS ID:18553<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running the Simple Machines Forum (SMF), a web forum. This version of SMF is<br />

vulnerable to a remote SQL Injection flaw. The application fails to properly parse out<br />

SQL-reserved characters passed to the 'msg' parameter. This would allow a remote attacker<br />

to read or write data as well as potentially execute arbitrary code on the remote database.<br />

Solution: Upgrade to version 1.0.5 or higher.<br />

CVE Not available<br />

Sendmail < 8.13.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3029 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote<br />

Sendmail server is running a version of Sendmail that is less than 8.13.4. There have been<br />

many flaws in versions prior to 8.13.4.<br />

Solution: Upgrade to version 8.13.4 or higher.<br />

CVE Not available<br />

RealPlayer < 6.0.12.1212 vidplin.dll Crafted AVI Overflow<br />

<strong>PVS</strong> ID: 3030 FAMILY: Web Clients RISK: HIGH NESSUS ID:18560<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote Windows<br />

host has RealPlayer software installed. There is a flaw in this version of the software that<br />

would allow an attacker to execute arbitrary code. An attacker exploiting this flaw would<br />

need to be able to convince a user to download and play a malicious media file. Upon<br />

execution, a local content-parsing bug would be triggered, enabling a local heap overflow<br />

and code execution.<br />

Solution: Upgrade to version 6.0.12.1212 or higher.<br />

CVE-2005-1766<br />

Metasploit Framework Engine Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3031 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: The remote server is running a Metasploit Framework server. Metasploit allows users to<br />

automatically exploit and backdoor vulnerable applications via the network. The fact that<br />

there is one running on your network is indicative of a penetration testing team or an<br />

individual potentially exploiting weaknesses on the network.\nFor your information, the<br />

remote server is running:\n\n %L<br />

Solution: Ensure that this server is sanctioned by policy and guidelines regarding acceptable<br />

Family Internet Services 773


network usage.<br />

CVE Not available<br />

UBB.threads < 6.5.2 Beta 2 XSS / SQL Injection<br />

<strong>PVS</strong> ID: 3032 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection attack.\n\nThe remote host<br />

is running a version of UBB.threads that fails to correctly parse multiple PHP scripts. A<br />

remote attacker can send malformed HTTP requests that, when processed, forces the<br />

UBB.threads server to execute arbitrary database commands or inject malicious code into<br />

user browsers.\nAs a result, a remote attacker can pass malicious input to database queries,<br />

potentially resulting in data exposure, modification of the query logic, or even data<br />

modification or attacks against the database itself.<br />

Solution: Upgrade to version 6.5.2 Beta 2 or higher.<br />

CVE-2006-5136<br />

ClamAV < 0.86.1 Content-parsing DoS<br />

<strong>PVS</strong> ID: 3033 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running ClamAV, an open-source antivirus solution for Unix-like<br />

systems.\nThis version of ClamAV is reported to be vulnerable to a flaw where the parsing<br />

of a malicious file will cause the ClamAV process to crash. An attacker exploiting this flaw<br />

would need to be able to send a specially formed email to the system running ClamAV.<br />

Successful exploitation would result in loss of service. The installed version of ClamAV is:<br />

\n %L<br />

Solution: Upgrade to version 0.86.1 or higher.<br />

CVE-2005-1923<br />

True North eMailServer < 5.3.4 Build 2019 LIST Command Remote DoS<br />

<strong>PVS</strong> ID: 3034 FAMILY: POP Server RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running the True North eMailServer.\nThis version of eMailServer is<br />

vulnerable to a content-parsing flaw where a malformed IMAP request can cause the server<br />

to fail. An attacker exploiting this flaw would be able to disable the service remotely.<br />

Solution: Upgrade to version 5.3.4 Build 2019 or higher.<br />

POP Banner Detection<br />

CVE-2005-2083<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 774


<strong>PVS</strong> ID: 3035 FAMILY: POP Server RISK: NONE NESSUS ID:Not Available<br />

Description: A POP server is running on this port. Its banner is :\n %L<br />

Solution: N/A<br />

CVE Not available<br />

True North eMailServer < 5.3.4 Build 2019 LIST Command Remote DoS<br />

<strong>PVS</strong> ID: 3036 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18570<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running the True North eMailServer.\nThis version of eMailServer is<br />

vulnerable to a content-parsing flaw where a malformed IMAP request can cause the server<br />

to fail. An attacker exploiting this flaw would be able to disable the service remotely.<br />

Solution: Upgrade to version 5.3.4 Build 2019 or higher.<br />

CVE-2005-2083<br />

PHP-Fusion < 6.00.106 submit.php Multiple Parameter HTML Injection<br />

<strong>PVS</strong> ID: 3037 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML Injection attack.\n\nThe remote<br />

host is running a version of PHP-Fusion that is vulnerable to an HTML injection flaw.<br />

Specifically, the submit.php script fails to properly sanitize input data via the 'news_body',<br />

'article_description', and 'user_pass' parameters. An attacker exploiting this flaw would<br />

typically need to be able to convince a remote user to browse to a malicious URI. A<br />

successful attack would yield potentially confidential data (cookies, credentials) as well as<br />

potentially execute malicious code within the context of the vulnerable server.<br />

Solution: Upgrade to version 6.00.106 or higher.<br />

CVE-2005-2074<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

phpBB < 2.0.16 viewtopic.php Arbitrary Code Execution<br />

<strong>PVS</strong> ID: 3038 FAMILY: CGI RISK: HIGH NESSUS ID:18589<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection attack.\n\nThe remote host<br />

is running phpBB, a web-based forum application written in PHP. There is a flaw in this<br />

version of phpBB that will allow remote attackers to inject arbitrary code into the<br />

'viewtopic.php' script. An attacker exploiting this flaw would only need to be able to send<br />

an HTTP request to the vulnerable script. Successful execution would result in the attacker<br />

executing code with the permissions of the webserver.<br />

Family Internet Services 775


Solution: Upgrade to version 2.0.16 or higher.<br />

CVE-2005-2086<br />

Inframail SMTP Server < 7.12 MAIL FROM Command Remote Overflow<br />

<strong>PVS</strong> ID: 3039 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:18588<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the SMTP server component of Inframail, a commercial suite of network servers<br />

from Infradig Systems.\n\nThe installed version of Inframail suffers from a buffer overflow<br />

vulnerability that arises when the SMTP server component processes a MAIL FROM<br />

command with an excessively long argument (around 40960 bytes). Successful exploitation<br />

will cause the service to crash and may allow arbitrary code execution.<br />

Solution: Upgrade to version 7.12 or greater.<br />

CVE-2005-2085<br />

Inframail FTP Server < 7.12 NLST Command Remote Overflow<br />

<strong>PVS</strong> ID: 3040 FAMILY: FTP Servers RISK: HIGH NESSUS ID:18587<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the FTP server component of Inframail, a commercial suite of network servers<br />

from Infradig Systems.\n\nThe installed version of Inframail suffers from a buffer overflow<br />

vulnerability that arises when the FTP server component processes an NLST command<br />

with an excessively long argument (around 102400 bytes). Successful exploitation will<br />

cause the service to crash and may allow arbitrary code execution.<br />

Solution: Upgrade to version 7.12 or higher.<br />

CVE-2005-2085<br />

Xoops < 2.0.12 Multiple XSS / SQL Injection<br />

<strong>PVS</strong> ID: 3041 FAMILY: CGI RISK: HIGH NESSUS ID:18614<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

Xoops installed on the remote host is prone to several vulnerabilities :\n\n- A SQL Injection<br />

Vulnerability\nThe bundled XMLRPC server fails to sanitize user-supplied input to the<br />

'xmlrpc.php' script. An attacker can exploit this flaw to launch SQL injection attacks that<br />

may lead to authentication bypass, disclosure of sensitive information, attacks against the<br />

underlying database, and more.\n\n- Multiple Cross-Site Scripting Vulnerabilities\nAn<br />

attacker can pass arbitrary HTML and script code through the 'order' and 'cid' parameters of<br />

the 'modules/newbb/edit.php' 'modules/repository/comment_edit.php' scripts respectively,<br />

which could result in disclosure of administrative session cookies.<br />

Solution: Upgrade to version 2.0.12 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 776


CVE-2005-2112<br />

Apache HTTP Request Parsing HTML Injection<br />

<strong>PVS</strong> ID: 3042 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw in the way that it parses HTTP<br />

requests.\n\nThe remote host appears to be running a version of Apache, an open source<br />

web server. This version of Apache is vulnerable to a flaw in the way that it handles<br />

malformed HTTP requests. An attacker exploiting this flaw would be able to possibly<br />

corrupt cache memory or inject HTML requests to a vulnerable Apache server. The<br />

vulnerability stems from a non-conformance to RFC 2616 that states that HTTP requests<br />

must not include both a 'Content-Length' and 'Transfer-Encoding' field.<br />

Solution: Upgrade to version 2.0.54, 1.3.33 or higher.<br />

CVE-2005-3705<br />

Tectia SSH Server < 4.3.2 Local Key Disclosure<br />

<strong>PVS</strong> ID: 3043 FAMILY: SSH RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running the Tectia SSH Server on Microsoft<br />

Windows. This version of Tectia is vulnerable to a local attack where Tectia does not<br />

properly protect locally stored keys. A local user exploiting this flaw would be able to<br />

retrieve keys and exploit trust relationships.<br />

Solution: Upgrade to version 4.3.2 or higher.<br />

Prevx Pro 2005 <<br />

CVE Not available<br />

<strong>PVS</strong> ID: 3044 FAMILY: Web Clients RISK: HIGH NESSUS ID:18616<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running Prevx Pro 2005, an intrusion protection<br />

system for Windows.\n\nThe installed version of Prevx Pro 2005 reportedly suffers from<br />

multiple vulnerabilities that allow local attackers to bypass the application's security<br />

features. For your information, the version of Prevx Pro is:\n\n%L<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-2144<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Golden FTP Server < 2.7.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3045 FAMILY: FTP Servers RISK: HIGH NESSUS ID:18615<br />

Family Internet Services 777


Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the Golden FTP Server, an FTP server for the Windows platform. This version<br />

of Golden FTP is vulnerable to a number of different flaws. An attacker exploiting these<br />

flaws would be able to either execute arbitrary code or cause the application to fail.<br />

Solution: Upgrade to version 2.7.0 or higher.<br />

CVE-2005-4553<br />

osTicket < 1.3.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3046 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18612<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

osTicket installed on the remote host suffers from several vulnerabilities, including:\n\n- A<br />

Local File Include Vulnerability\nThe application fails to sanitize user-supplied input to the<br />

'inc' parameter in the 'view.php' script. After authentication, an attacker can exploit this<br />

flaw to run arbitrary PHP code found in files on the remote host provided PHP's<br />

'register_globals' setting is enabled.\n\n- A SQL Injection Vulnerability\nAn authenticated<br />

attacker can affect SQL queries via POST queries due to a failure of the application to filter<br />

input to the 'ticket' variable in the 'class.ticket.php' code library.<br />

Solution: Upgrade to version 1.3.1 or higher.<br />

CVE-2005-1439<br />

PHPNews < 1.2.6 news.php prevnext Parameter SQL Injection<br />

<strong>PVS</strong> ID: 3047 FAMILY: CGI RISK: HIGH NESSUS ID:18621<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running PHPNews, an open-source news application written in PHP. The installed<br />

version of PHPNews is prone to a SQL injection attack due to its failure to sanitize<br />

user-supplied input via the 'prevnext' parameter of the 'news.php' script. An attacker can<br />

exploit this flaw to affect database queries, possibly revealing sensitive information,<br />

launching attacks against the underlying database, and more.<br />

Solution: Upgrade to version 1.2.6 or higher.<br />

CVE-2005-2156<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Courier Mail Server < 0.50.1 SPF Data Lookup Remote DoS<br />

<strong>PVS</strong> ID: 3048 FAMILY: SMTP Servers RISK: LOW NESSUS ID:18620<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running Courier Mail Server, an open source mail server for Linux and Unix.<br />

The installed version of Courier is prone to a remote denial of service vulnerability<br />

associated with Sender Policy Framework (SPF) data lookups. To exploit this flaw, an<br />

attacker would need to control a DNS server and return malicious SPF records in response<br />

Family Internet Services 778


to queries from the affected application.<br />

Solution: Upgrade to version 0.50.1 or higher.<br />

CVE-2005-2151<br />

phpPgAdmin < 3.5.4 index.php formLanguage Parameter Traversal Arbitrary File Access<br />

<strong>PVS</strong> ID: 3049 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running phpPgAdmin, a web-based<br />

PostgreSQL administrative interface. This version of phpPgAdmin is vulnerable to a flaw<br />

via the Login form. Specifically, a malformed 'formLanguage' directive can be used to<br />

retrieve sensitive files (such as /etc/passwd or other critical configuration files).<br />

Solution: Upgrade to version 3.5.4 or higher.<br />

CVE-2005-2256<br />

Geeklog < 1.3.12 comment.php order Parameter SQL Injection<br />

<strong>PVS</strong> ID: 3050 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running Geeklog, an open-source weblog powered by PHP<br />

and MySQL. The installed version of Geeklog suffers from a SQL injection vulnerability<br />

due to the application's failure to sanitize user-supplied input via the 'order' parameter of the<br />

'comment.php' script. By leveraging this flaw, an attacker may be able to recover sensitive<br />

information, such as password hashes, launch attacks against the underlying database, and<br />

more.<br />

Solution: Upgrade to version 1.3.12 or higher.<br />

CVE-2006-0824<br />

phpBB < 2.0.17 Nested BBCode URL Tags XSS<br />

<strong>PVS</strong> ID: 3051 FAMILY: CGI RISK: LOW NESSUS ID:18626<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS)<br />

attack.\n\nAccording to its banner, the remote host is running a version of phpBB that fails<br />

to sanitize BBCode containing nested URL tags, which enables attackers to cause arbitrary<br />

HTML and script code to be executed in a user's browser within the context of the affected<br />

site.<br />

Solution: Upgrade to version 2.0.17 or higher.<br />

CVE-2005-2161<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 779


Lotus Notes < 6.5.5 Web Mail Attachment HTML Injection<br />

<strong>PVS</strong> ID: 3052 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection attack.\n\nThe remote host<br />

is running the Lotus Notes email client. Lotus Notes client versions 6.5.4 and earlier could<br />

allow a remote attacker to inject HTML and JavaScript into email messages. An attacker<br />

exploiting this flaw would only need to send a malicious email to a Lotus Notes recipient.<br />

Successful exploitation would result in potentially malicious code executing with the user's<br />

privileges.<br />

Solution: Upgrade to version 6.5.5 or higher.<br />

CVE Not available<br />

Drupal Public Comment PHP Code Injection<br />

<strong>PVS</strong> ID: 3053 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection attack.\n\nThe remote host<br />

is running Drupal, a content management system. This version of Drupal is vulnerable to a<br />

flaw in the way that it handles user-supplied 'comments'. Specifically, an attacker can<br />

embed PHP script code within a comment that would then be executed by the remote<br />

webserver. An attacker exploiting this flaw would only need to post a specially formatted<br />

comment via the Drupal web interface.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

Comersus Cart <<br />

CVE-2005-2106<br />

<strong>PVS</strong> ID: 3054 FAMILY: CGI RISK: HIGH NESSUS ID:18643<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe installed<br />

version of Comersus Cart on the remote host suffers from multiple SQL injection and<br />

cross-site scripting flaws due to its failure to sanitize user-supplied input. Attackers may be<br />

able to exploit these flaws to influence database queries or cause arbitrary HTML and script<br />

code to be executed in users' browsers within the context of the affected site.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-2190<br />

PHPAUCTION Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3055 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 780


Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running PHPAUCTION, a web-based auction portal. This<br />

version of PHPAUCTION is vulnerable to multiple injection flaws. The application fails to<br />

properly sanitize user input and, consequently, is prone to remote attacks. The attacks<br />

include HTML injection as well as SQL injection. An attacker exploiting these flaws would<br />

only need to be able to send malformed HTTP requests to the application. Successful<br />

exploitation would result in possible database compromise or arbitrary code being executed<br />

either on the server or within an unsuspecting user's browser.<br />

Solution: No solution is known at this time.<br />

CVE-2005-2255<br />

Jinzora < 2.1 Multiple Scripts include_path Parameter Remote File Inclusion<br />

<strong>PVS</strong> ID: 3056 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18653<br />

Description: Synopsis :\n\nAttackers may be able to view or execute arbitrary PHP code.\n\nThe remote<br />

host is running Jinzora, a web-based media streaming and management system written in<br />

PHP. The installed version of Jinzora allows remote attackers to control the 'include_path'<br />

variable used when including PHP code in several of the application's scripts. By<br />

leveraging this flaw, an attacker may be able to view arbitrary files on the remote host and<br />

execute arbitrary PHP code, possibly taken from third-party hosts.<br />

Solution: Upgrade to version 2.1 or higher.<br />

CVE-2005-2249<br />

Apache Webserver Valid Banner Check<br />

<strong>PVS</strong> ID: 3057 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: Ensure some level of integrity for the web banners being presented.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

punBB < 1.2.6 profile.php $temp Parameter SQL Injection<br />

<strong>PVS</strong> ID: 3058 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running punBB, a web-based bulletin board. This version of<br />

punBB ( %L ) is vulnerable to a remote SQL Injection attack. Due to a content-parsing<br />

flaw, attackers can inject SQL commands into the 'change_email' parameter of the<br />

profile.php script. An attacker exploiting this flaw would only need to be able to send<br />

HTTP requests to the application. Successful exploitation would result in the attacker<br />

having the ability to read or write to the database. In addition, the attacker may be able to<br />

execute arbitrary commands on the remote system.<br />

Family Internet Services 781


Solution: Upgrade to version 1.2.6 or higher.<br />

CVE-2005-2193<br />

SSH Valid Banner Check<br />

<strong>PVS</strong> ID: 3059 FAMILY: SSH RISK: INFO NESSUS ID:Not Available<br />

Description: Ensure some level of integrity for the SSH banners being presented.<br />

Solution: N/A<br />

CVE Not available<br />

Bugzilla < 2.18.2 / 2.20rc1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3060 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18654<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an flaw in the way that it discloses private<br />

information.\n\nThe remote host is running Bugzilla, a bug-tracking software with a web<br />

interface. This version of Bugzilla on the remote host suffers from two information<br />

disclosure vulnerabilities:\n\n - Any user can change any flag on a bug, even if they don't<br />

otherwise have access to the bug or rights to make changes to it.\n\n - A private bug<br />

summary may be visible to users if MySQL replication is used on the backend database.<br />

Solution: Upgrade to Bugzilla 2.18.2 / 2.20rc1 or higher.<br />

CVE Not available<br />

PPA functions.inc.php ppa_root_path Parameter Remote File Inclusion<br />

<strong>PVS</strong> ID: 3061 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection attack.\n\nThe remote host<br />

is running PPA, a photo album application written in PHP.\nThere is a flaw in the remote<br />

version of this software that may allow an attacker to force the remote PHP script to<br />

include arbitrary files hosted on a third-party server. Therefore, an attacker can exploit this<br />

flaw to execute arbitrary PHP code on the remote host.<br />

Solution: No solution is known at this time.<br />

CVE-2005-2199<br />

Outlook Express Multiple DoS<br />

<strong>PVS</strong> ID: 3062 FAMILY: SMTP Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18680<br />

Family Internet Services 782


Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host runs a version of Outlook Express that contains multiple vulnerabilities.\nAn<br />

attacker may exploit these vulnerabilities to disable the Outlook Express client of a<br />

victim.\n\nTo exploit this flaw, an attacker would need to send a malformed e-mail<br />

message to a victim and wait for him to read it using Outlook Express.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-2226<br />

Moodle < 1.5.1 Unspecified Vulnerability<br />

<strong>PVS</strong> ID: 3063 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to unspecified remote attack vectors.\n\nThe<br />

remote host is running version 1.5.0 of the Moodle suite, an open-source course<br />

management system written in PHP.\nThe remote version of this software is vulnerable to<br />

an undisclosed flaw that may affect the confidentiality or integrity of the remote host.<br />

Solution: Upgrade to Moodle 1.5.1 or higher.<br />

CVE-2005-2247<br />

Mac OS X < 10.4.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3064 FAMILY: Operating System Detection RISK:<br />

MEDIUM<br />

NESSUS ID:18683<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of Mac OS X 10.4 that is older than version 10.4.2.\n Mac OS X 10.4.2<br />

contains several security fixes for :\n - TCP/IP\n - Dashboard\n<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-1333<br />

Mac OS X 10.4.2 Detection<br />

<strong>PVS</strong> ID: 3065 FAMILY: Operating System Detection RISK: NONE NESSUS ID:Not Available<br />

Description: The remote host is running Mac OS X 10.4.2.<br />

Solution: N/A<br />

CVE Not available<br />

Mozilla Firefox < 1.0.5 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3066 FAMILY: Web Clients RISK: HIGH NESSUS ID:18689<br />

Family Internet Services 783


Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThee remote<br />

host is using Firefox.\n The remote version of this software contains various security issues<br />

that may allow an attacker to execute arbitrary code on the remote host. The reported<br />

browser version (as seen on the network) is: \n %L \n\n<br />

Solution: Upgrade to version 1.0.5 or higher.<br />

CVE-2004-0718<br />

Mozilla Browser < 1.7.10 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3067 FAMILY: Web Clients RISK: HIGH NESSUS ID:18813<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a multiple attack vectors.\n\nThe remote<br />

host is using Mozilla. The remote version of this software contains various security issues<br />

that may allow an attacker to execute arbitrary code on the remote host. The reported<br />

browser version (as seen on the network) is: \n %L<br />

Solution: Upgrade to version 1.7.10 or higher.<br />

CVE-2004-0718<br />

MailEnable IMAP STATUS Command Remote Overflow<br />

<strong>PVS</strong> ID: 3068 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:19193<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of MailEnable's IMAP service that is prone to a buffer overflow<br />

vulnerability triggered when processing a STATUS command with a long mailbox name.<br />

Once authenticated, an attacker can exploit this flaw to execute arbitrary code subject to the<br />

privileges of the affected application.<br />

Solution: Upgrade to MailEnable Professional 1.6 or higher or to MailEnable Enterprise Edition 1.1<br />

or higher.<br />

CVE-2005-2278<br />

Nullsoft Winamp < 5.093 Malformed ID3v2 Tag Overflow<br />

<strong>PVS</strong> ID: 3069 FAMILY: Generic RISK: HIGH NESSUS ID:19217<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using Winamp, a popular media player with support for playing MP3s, WAVs, and more.\n<br />

The installed version of Winamp suffers from a buffer overflow vulnerability when<br />

processing overly-long ID3v2 tags in an MP3 file. An attacker may be able to exploit this<br />

flaw to execute arbitrary code on the remote host.<br />

Solution: Upgrade to version 5.093 or higher.<br />

CVE-2005-2310<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 784


Skype Temporary File Arbitrary File Overwrite<br />

<strong>PVS</strong> ID: 3070 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a local flaw in the way that it protects data<br />

files.\n\nThe remote host is using Skype, a peer to peer chat and VoIP software. The remote<br />

version of this software contains a security issue that may allow a local attacker to<br />

overwrite sensitive data files. Successful exploitation would result in loss of confidential<br />

data or possibly a Denial of Service (DoS).<br />

Solution: Upgrade to a version higher than 1.1.0.20.<br />

CVE Not available<br />

SSH IPSEC Express 1.1.0 VPN Detection<br />

<strong>PVS</strong> ID: 3071 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the IPSEC Express 1.1.0 VPN Server.\nA VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN that allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to corporate guidelines and policies.<br />

CVE Not available<br />

SSH IPSEC Express 1.1.1 VPN Detection<br />

<strong>PVS</strong> ID: 3072 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the IPSEC Express 1.1.1 VPN Server.\nA VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN that allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to corporate guidelines and policies.<br />

CVE Not available<br />

SSH IPSEC Express 1.1.2 VPN Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3073 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 785


Description: The remote host is running the IPSEC Express 1.1.2 VPN Server.\nA VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN that allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to corporate guidelines and policies.<br />

CVE Not available<br />

SSH IPSEC Express 1.2.1 VPN Detection<br />

<strong>PVS</strong> ID: 3074 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the IPSEC Express 1.2.1 VPN Server.\nA VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN that allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to corporate guidelines and policies.<br />

CVE Not available<br />

SSH IPSEC Express 1.2.2 VPN Detection<br />

<strong>PVS</strong> ID: 3075 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the IPSEC Express 1.2.2 VPN Server.\nA VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN that allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to corporate guidelines and policies.<br />

CVE Not available<br />

SSH IPSEC Express 2.0.0 VPN Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3076 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the IPSEC Express 2.0.0 VPN Server.\nA VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN that allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Family Internet Services 786


Solution: Ensure that the VPN is acceptable with respect to corporate guidelines and policies.<br />

CVE Not available<br />

SSH IPSEC Express 2.1.0 VPN Detection<br />

<strong>PVS</strong> ID: 3077 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the IPSEC Express 2.1.0 VPN Server.\nA VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN that allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to corporate guidelines and policies.<br />

CVE Not available<br />

SSH IPSEC Express 2.1.1 VPN Detection<br />

<strong>PVS</strong> ID: 3078 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the IPSEC Express 2.1.1 VPN Server.\nA VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN that allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to corporate guidelines and policies.<br />

CVE Not available<br />

SSH IPSEC Express 2.1.2 VPN Detection<br />

<strong>PVS</strong> ID: 3079 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the IPSEC Express 2.1.2 VPN Server.\nA VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN that allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to corporate guidelines and policies.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 787


SSH IPSEC Express 3.0.0 VPN Detection<br />

<strong>PVS</strong> ID: 3080 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the IPSEC Express 3.0.0 VPN Server.\nA VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN that allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to corporate guidelines and policies.<br />

CVE Not available<br />

SSH IPSEC Express 3.0.1 VPN Detection<br />

<strong>PVS</strong> ID: 3081 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the IPSEC Express 3.0.1 VPN Server.\nA VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN that allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to corporate guidelines and policies.<br />

CVE Not available<br />

SSH IPSEC Express 4.0.0 VPN Detection<br />

<strong>PVS</strong> ID: 3082 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the IPSEC Express 4.0.0 VPN Server.\nA VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN that allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to corporate guidelines and policies.<br />

CVE Not available<br />

SSH IPSEC Express 4.0.1 VPN Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3083 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 788


Description: The remote host is running the IPSEC Express 4.0.1 VPN Server.\nA VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN that allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to corporate guidelines and policies.<br />

CVE Not available<br />

SSH IPSEC Express 4.1.0 VPN Detection<br />

<strong>PVS</strong> ID: 3084 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the IPSEC Express 4.1.0 VPN Server.\nA VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN that allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to corporate guidelines and policies.<br />

CVE Not available<br />

SSH IPSEC Express 4.2.0 VPN Detection<br />

<strong>PVS</strong> ID: 3085 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the IPSEC Express 4.2.0 VPN Server.\nA VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN that allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to corporate guidelines and policies.<br />

CVE Not available<br />

VP-ASP Multiple Script SQL Injection (2)<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3086 FAMILY: CGI RISK: HIGH NESSUS ID:19229<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is using the VP-ASP, a shopping cart program written in ASP.<br />

The remote version of this software is vulnerable to three SQL injection vulnerabilities in<br />

the files shopaddtocart.asp, shopaddtocartnodb.asp and shopproductselect.asp. An attacker<br />

may exploit these flaws to execute arbitrary SQL statements against the remote database.<br />

Family Internet Services 789


Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

GroupWise WebAccess < 6.5 SP5 EMail IMG SRC XSS<br />

<strong>PVS</strong> ID: 3087 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:19228<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running a version of GroupWise WebAccess from Novell that fails to<br />

sanitize email messages of HTML and script code embedded in IMG tags. An attacker can<br />

exploit this flaw to launch cross-site scripting attacks against users of WebAccess by<br />

sending them specially crafted email messages. The version of the remote Novell<br />

Groupwise server is\n%L<br />

Solution: Upgrade to version 6.5 SP5 or higher.<br />

CVE-2005-2276<br />

Firefox < 1.0.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3099 FAMILY: Web Clients RISK: HIGH NESSUS ID:18689<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using Firefox. The remote version of this software contains various security issues that may<br />

allow an attacker to execute arbitrary code on the remote host. The reported browser<br />

version (as seen on the network) is: \n %L<br />

Solution: Upgrade to version 1.0.6 or higher.<br />

CVE-2004-0718<br />

PHP-Fusion < 6.00.107 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3100 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:19311<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nAccording to its version number, the remote host is running a version of<br />

PHP-Fusion that suffers from multiple vulnerabilities. Namely:\n\nHTML Injection<br />

Vulnerability - An attacker can inject malicious CSS (Cascading Style Sheets) codes<br />

through [color] tags, thereby affecting how the site is rendered whenever users view<br />

specially-crafted posts.\n\nSQL Injection Vulnerability - The application fails to sanitize<br />

user-supplied input to the 'msg_view' parameter of the 'messages.php' script before using it<br />

in database queries. Exploitation requires that an attacker first authenticate.<br />

Solution: Upgrade to version 6.00.107 or higher.<br />

Family Internet Services 790


IRC Client Detection<br />

CVE-2005-2401<br />

<strong>PVS</strong> ID: 3101 FAMILY: IRC Clients RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running an IRC client. The IRC command that triggered this plugin was:<br />

\n %L<br />

Solution: N/A<br />

CVE Not available<br />

SlimFTPd < 3.17 Multiple Commands Remote Overflow<br />

<strong>PVS</strong> ID: 3102 FAMILY: FTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host<br />

seems to be running a vulnerable version of SlimFTPd, a small FTP server for Windows. It<br />

is reported that versions up to 3.16 are prone to buffer overflow vulnerability that may<br />

allow an attacker to execute arbitrary code on this host. A attacker needs a valid FTP<br />

account to exploit this vulnerability (to include anonymous access, if enabled).\n\nNOTE:<br />

The SlimFTPd hotfix does not change the version number from 3.16 to 3.17. The version<br />

number is: \n %L<br />

Solution: Upgrade to version 3.17 or higher.<br />

CVE-2004-2418<br />

CMSimple < 2.5 Beta 3 Search Function XSS<br />

<strong>PVS</strong> ID: 3103 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running a version of CMSimple, a content management system. This<br />

version of CMSimple is vulnerable to a remote Cross-Site Scripting (XSS) attack. An<br />

attacker exploiting this flaw would typically need to be able to convince a user to browse to<br />

a malicious URI. Successful exploitation would result in arbitrary code executing in the<br />

client browser and possible theft of confidential data (such as authentication cookies).<br />

Solution: Upgrade to version 2.5 Beta 3 or higher.<br />

CVE-2005-2392<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

PHPNews < 1.3.0 auth.php Multiple Field SQL Injection<br />

<strong>PVS</strong> ID: 3104 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running PHPNews, an open-source news application written<br />

in PHP. The installed version of PHPNews is prone to a SQL injection attack due to its<br />

failure to sanitize user-supplied input. An attacker can exploit this flaw to affect database<br />

Family Internet Services 791


queries, possibly revealing sensitive information, launching attacks against the underlying<br />

database, and the like.<br />

Solution: Upgrade to version 1.3.0 or higher.<br />

CVE-2005-2383<br />

Alt-N MDaemon < 8.0.4 IMAP Multiple Buffer Overflows<br />

<strong>PVS</strong> ID: 3105 FAMILY: Web Servers RISK: HIGH NESSUS ID:19252<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Alt-N MDaemon, a SMTP/IMAP server for the Windows operating system family.<br />

It is reported that versions up to and including 8.0.3 are prone to multiple buffer overflow<br />

vulnerabilities. An attacker may cause a denial of service or execute arbitrary code on the<br />

remote server. The attacker does not need credentials to exploit the flaw in<br />

CRAM-MD5/LOGIN authenticate method.<br />

Solution: Upgrade to version 8.0.4 or higher.<br />

CVE Not available<br />

GoodTech SMTP Server < 5.17 'RCPT TO' Command Remote Overflow<br />

<strong>PVS</strong> ID: 3106 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the GoodTech SMTP server. This version of GoodTech is vulnerable to a remote<br />

buffer overflow. An attacker exploiting this flaw would send a malformed 'RCPT TO'<br />

request to the SMTP server. Successful exploitation would result in the attacker running<br />

arbitrary code on the remote system.<br />

Solution: Upgrade to version 5.17 or higher.<br />

IRC Server Detection<br />

CVE-2005-2387<br />

<strong>PVS</strong> ID: 3107 FAMILY: IRC Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is an IRC server.<br />

Solution: Ensure that such services are authorized for your network<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

ClamAV < 0.86.2 Content-parsing Multiple Overflows<br />

<strong>PVS</strong> ID: 3108 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 792


Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running ClamAV, an open-source antivirus solution for Unix-like systems. This version of<br />

ClamAV is reported to be vulnerable to a flaw where the parsing of a malicious file will<br />

cause the clamav process to overflow system memory, possibly resulting in an attacker<br />

executing code. An attacker exploiting this flaw would need to be able to send a specially<br />

formed email to the system running ClamAV.<br />

Solution: Upgrade to version 0.86.2 or higher.<br />

CVE-2005-2450<br />

Hobbit Monitor < 4.1.0 Remote DoS<br />

<strong>PVS</strong> ID: 3109 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running Hobbit Monitor, a web-based host/network monitoring software.<br />

This version of Hobbit Monitor is prone to a remote denial of service attack. An attacker<br />

sending a specially formatted string to the hobbitd process can force the software to crash.<br />

Solution: Upgrade to version 4.1.0 or higher.<br />

CVE Not available<br />

FtpLocate Multiple Scripts fsite Parameter Remote File Inclusion<br />

<strong>PVS</strong> ID: 3110 FAMILY: CGI RISK: HIGH NESSUS ID:19300<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an flaw that allows attackers to execute<br />

arbitrary commands\n\nThe remote host is running FtpLocate, a web search engine for FTP<br />

sites written in Perl.\n\nThe installed version of FtpLocate allows remote attackers to<br />

execute commands on the remote host by manipulating input to the 'fsite' parameter in<br />

various scripts.<br />

Solution: No solution is known at this time.<br />

CVE-2005-2420<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Atomic Photo Album apa_phpinclude.inc.php apa_module_basedir Parameter Remote File Inclusion<br />

<strong>PVS</strong> ID: 3111 FAMILY: CGI RISK: HIGH NESSUS ID:19299<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection attack.\n\nThe remote host<br />

is running Atomic Photo Album, a free PHP-based photo gallery. The installed version of<br />

Atomic Photo Album allows remote attackers to control the 'apa_module_basedir' variable<br />

used when including PHP code in the 'apa_phpinclude.inc.php' script. By leveraging this<br />

flaw, an attacker may be able to view arbitrary files on the remote host and execute<br />

arbitrary PHP code, possibly taken from third-party hosts.<br />

Family Internet Services 793


Solution: Enable PHP's 'magic_quotes_gpc' setting and disable 'allow_url_fopen'.<br />

CVE-2005-2413<br />

Apache < 2.0.55 HTTP Smuggling Vulnerability<br />

<strong>PVS</strong> ID: 3112 FAMILY: Web Servers RISK: HIGH NESSUS ID:19296<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote SSL flaw.\n\nThe remote host<br />

appears to be running a version of Apache, an open source web server. This version of<br />

Apache is vulnerable to a flaw in the way that it handles mod_ssl CRL verification<br />

callback. In order for an attacker to exploit this flaw the attacker would need to find a<br />

server that was configured to use a malicious certificate revocation list (CRL).<br />

Solution: Upgrade to version 2.0.55 or higher.<br />

CVE-2005-2088<br />

ProFTPD < 1.3.0rc2 Multiple Format Strings<br />

<strong>PVS</strong> ID: 3113 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:19302<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is using ProFTPD, a free FTP server for Unix and Linux. According to its banner, the<br />

version of ProFTPD installed on the remote host suffers from multiple format string<br />

vulnerabilities, one involving the 'ftpshut' utility and the other in mod_sql's 'SQLShowInfo'<br />

directive. Exploitation of either requires involvement on the part of a site administrator and<br />

can lead to information disclosure, denial of service, and even a compromise of the affected<br />

system. According to the banner, the remote version of ProFTPD is: \n %L<br />

Solution: Upgrade to version 1.3.0rc2 or higher.<br />

CVE-2006-6563<br />

Lotus Domino Server Multiple Information Disclosure Vulnerabilities<br />

<strong>PVS</strong> ID: 3114 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:19309<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running a version of Lotus Domino Server that is prone to<br />

several information disclosure vulnerabilities. Specifically, users' password hashes and<br />

other data are included in hidden fields in the public address book 'names.nsf' that is<br />

readable by default by all users. Moreover, Domino does not use a 'salt' to compute<br />

password hashes, which makes it easier to crack passwords.<br />

Solution: Upgrade to version 6.5.5, 6.0.6 or higher.<br />

CVE-2005-2428<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 794


Generic Botnet Client Detection<br />

<strong>PVS</strong> ID: 3115 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that has been compromised<br />

and is being controlled by a botnet. A botnet is a network of compromised computers that<br />

are remotely controlled by a malicious bot administrator. Botnets are commonly used<br />

for\nsending spam\nrunning Denial of Service (DoS) attacks against other<br />

networks\nscanning and compromising new systems\nInstalling sniffers\nInstalling<br />

keyloggers\nIdentify theft<br />

realtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Server Detection (Web Admin)<br />

<strong>PVS</strong> ID: 3116 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that has been compromised<br />

and is being controlled by a botnet. A botnet is a network of compromised computers that<br />

are remotely controlled by a malicious bot administrator. Botnets are commonly used<br />

for\nsending spam\nrunning Denial of Service (DoS) attacks against other<br />

networks\nscanning and compromising new systems\nInstalling sniffers\nInstalling<br />

keyloggers\nIdentify theft<br />

realtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Client Detection<br />

<strong>PVS</strong> ID: 3117 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has a backdoor installed.\n\nThe remote host appears to be<br />

running a machine that has been compromised and is being controlled by a botnet. A botnet<br />

is a network of compromised computers that are remotely controlled by a malicious bot<br />

administrator. Botnets are commonly used for\nsending spam\nrunning Denial of Service<br />

(DoS) attacks against other networks\nscanning and compromising new systems\nInstalling<br />

sniffers\nInstalling keyloggers\nIdentify theft<br />

realtime<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 795


Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Client Detection<br />

<strong>PVS</strong> ID: 3118 FAMILY: FTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that has been compromised<br />

and is being controlled by a botnet. A botnet is a network of compromised computers that<br />

are remotely controlled by a malicious bot administrator. Botnets are commonly used<br />

for\nsending spam\nrunning Denial of Service (DoS) attacks against other<br />

networks\nscanning and compromising new systems\nInstalling sniffers\nInstalling<br />

keyloggers\nIdentify theft<br />

realtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Client Detection<br />

<strong>PVS</strong> ID: 3119 FAMILY: IRC Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that has been compromised<br />

and is being controlled by a botnet. A botnet is a network of compromised computers that<br />

are remotely controlled by a malicious bot administrator. Botnets are commonly used<br />

for\nsending spam\nrunning Denial of Service (DoS) attacks against other<br />

networks\nscanning and compromising new systems\nInstalling sniffers\nInstalling<br />

keyloggers\nIdentify theft\nThe observed command was '%P'\n<br />

realtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Client Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3120 FAMILY: IRC Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that has been compromised<br />

and is being controlled by a botnet. A botnet is a network of compromised computers that<br />

are remotely controlled by a malicious bot administrator. Botnets are commonly used<br />

Family Internet Services 796


for\nsending spam\nrunning Denial of Service (DoS) attacks against other<br />

networks\nscanning and compromising new systems\nInstalling sniffers\nInstalling<br />

keyloggers\nIdentify theft\nThe observed command was '%P'\n<br />

realtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Client Detection<br />

<strong>PVS</strong> ID: 3121 FAMILY: IRC Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that has been compromised<br />

and is being controlled by a botnet. A botnet is a network of compromised computers that<br />

are remotely controlled by a malicious bot administrator. Botnets are commonly used<br />

for\nsending spam\nrunning Denial of Service (DoS) attacks against other<br />

networks\nscanning and compromising new systems\nInstalling sniffers\nInstalling<br />

keyloggers\nIdentify theft\nThe observed command was '%L'\n<br />

realtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Client Detection<br />

<strong>PVS</strong> ID: 3122 FAMILY: IRC Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that has been compromised<br />

and is being controlled by a botnet. A botnet is a network of compromised computers that<br />

are remotely controlled by a malicious bot administrator. Botnets are commonly used<br />

for\nsending spam\nrunning Denial of Service (DoS) attacks against other<br />

networks\nscanning and compromising new systems\nInstalling sniffers\nInstalling<br />

keyloggers\nIdentify theft\nThe observed command was '%P'\n<br />

realtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Client Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 797


<strong>PVS</strong> ID: 3123 FAMILY: IRC Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that has been compromised<br />

and is being controlled by a botnet. A botnet is a network of compromised computers that<br />

are remotely controlled by a malicious bot administrator. Botnets are commonly used<br />

for\nsending spam\nrunning Denial of Service (DoS) attacks against other<br />

networks\nscanning and compromising new systems\nInstalling sniffers\nInstalling<br />

keyloggers\nIdentify theft\nThe observed command was '%P'\n<br />

realtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Client Detection<br />

<strong>PVS</strong> ID: 3124 FAMILY: IRC Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that has been compromised<br />

and is being controlled by a botnet. A botnet is a network of compromised computers that<br />

are remotely controlled by a malicious bot administrator. Botnets are commonly used<br />

for\nsending spam\nrunning Denial of Service (DoS) attacks against other<br />

networks\nscanning and compromising new systems\nInstalling sniffers\nInstalling<br />

keyloggers\nIdentify theft\nThe observed command was '%P'\n<br />

realtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Client Detection<br />

<strong>PVS</strong> ID: 3125 FAMILY: IRC Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that has been compromised<br />

and is being controlled by a botnet. A botnet is a network of compromised computers that<br />

are remotely controlled by a malicious bot administrator. Botnets are commonly used<br />

for\nsending spam\nrunning Denial of Service (DoS) attacks against other<br />

networks\nscanning and compromising new systems\nInstalling sniffers\nInstalling<br />

keyloggers\nIdentify theft\nThe observed command was '%P'\n<br />

realtime<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 798


Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Client Detection<br />

<strong>PVS</strong> ID: 3126 FAMILY: IRC Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that has been compromised<br />

and is being controlled by a botnet. A botnet is a network of compromised computers that<br />

are remotely controlled by a malicious bot administrator. Botnets are commonly used<br />

for\nsending spam\nrunning Denial of Service (DoS) attacks against other<br />

networks\nscanning and compromising new systems\nInstalling sniffers\nInstalling<br />

keyloggers\nIdentify theft\nThe observed command was '%P'\n<br />

realtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Client Detection<br />

<strong>PVS</strong> ID: 3127 FAMILY: IRC Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that has been compromised<br />

and is being controlled by a botnet. A botnet is a network of compromised computers that<br />

are remotely controlled by a malicious bot administrator. Botnets are commonly used<br />

for\nsending spam\nrunning Denial of Service (DoS) attacks against other<br />

networks\nscanning and compromising new systems\nInstalling sniffers\nInstalling<br />

keyloggers\nIdentify theft\nThe observed command was '%P'\n<br />

realtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Client Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3128 FAMILY: IRC Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that has been compromised<br />

and is being controlled by a botnet. A botnet is a network of compromised computers that<br />

are remotely controlled by a malicious bot administrator. Botnets are commonly used<br />

Family Internet Services 799


for\nsending spam\nrunning Denial of Service (DoS) attacks against other<br />

networks\nscanning and compromising new systems\nInstalling sniffers\nInstalling<br />

keyloggers\nIdentify theft\nThe observed command was '%P'\n<br />

realtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Client Detection<br />

<strong>PVS</strong> ID: 3129 FAMILY: IRC Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that has been compromised<br />

and is being controlled by a botnet. A botnet is a network of compromised computers that<br />

are remotely controlled by a malicious bot administrator. Botnets are commonly used<br />

for\nsending spam\nrunning Denial of Service (DoS) attacks against other<br />

networks\nscanning and compromising new systems\nInstalling sniffers\nInstalling<br />

keyloggers\nIdentify theft \nThe observed command was '%L'<br />

realtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Client Detection<br />

<strong>PVS</strong> ID: 3130 FAMILY: IRC Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that has been compromised<br />

and is being controlled by a botnet. A botnet is a network of compromised computers that<br />

are remotely controlled by a malicious bot administrator. Botnets are commonly used<br />

for\nsending spam\nrunning Denial of Service (DoS) attacks against other<br />

networks\nscanning and compromising new systems\nInstalling sniffers\nInstalling<br />

keyloggers\nIdentify thefft\nThe observed command was '%P'\n<br />

realtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Client Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 800


<strong>PVS</strong> ID: 3131 FAMILY: IRC Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that has been compromised<br />

and is being controlled by a botnet. A botnet is a network of compromised computers that<br />

are remotely controlled by a malicious bot administrator. Botnets are commonly used<br />

for\nsending spam\nrunning Denial of Service (DoS) attacks against other<br />

networks\nscanning and compromising new systems\nInstalling sniffers\nInstalling<br />

keyloggers\nIdentify theft \nThe observed command was '%L'<br />

realtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Client Detection<br />

<strong>PVS</strong> ID: 3132 FAMILY: IRC Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that has been compromised<br />

and is being controlled by a botnet. A botnet is a network of compromised computers that<br />

are remotely controlled by a malicious bot administrator. Botnets are commonly used<br />

for\nsending spam\nrunning Denial of Service (DoS) attacks against other<br />

networks\nscanning and compromising new systems\nInstalling sniffers\nInstalling<br />

keyloggers\nIdentify theft \nThe observed command was '%L'<br />

realtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Client Detection<br />

<strong>PVS</strong> ID: 3133 FAMILY: IRC Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that has been compromised<br />

and is being controlled by a botnet. A botnet is a network of compromised computers that<br />

are remotely controlled by a malicious bot administrator. Botnets are commonly used<br />

for\nsending spam\nrunning Denial of Service (DoS) attacks against other<br />

networks\nscanning and compromising new systems\nInstalling sniffers\nInstalling<br />

keyloggers\nIdentify theft\nThe observed command was '%L'\n<br />

realtime<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 801


Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Server Detection<br />

<strong>PVS</strong> ID: 3134 FAMILY: IRC Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that is being used to control<br />

a botnet. A botnet is a network of compromised computers that are remotely controlled by a<br />

malicious bot administrator. Botnets are commonly used for\nsending spam\nrunning<br />

Denial of Service (DoS) attacks against other networks\nscanning and compromising new<br />

systems\nInstalling sniffers\nInstalling keyloggers\nIdentify theft\nThe observed command<br />

was '%L'\n<br />

realtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Server Detection<br />

<strong>PVS</strong> ID: 3135 FAMILY: IRC Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that is being used to control<br />

a botnet. A botnet is a network of compromised computers that are remotely controlled by a<br />

malicious bot administrator. Botnets are commonly used for\nsending spam\nrunning<br />

Denial of Service (DoS) attacks against other networks\nscanning and compromising new<br />

systems\nInstalling sniffers\nInstalling keyloggers\nIdentify theft\nThe observed command<br />

was '%L'\n<br />

realtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Server Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3136 FAMILY: IRC Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that is being used to control<br />

a botnet. A botnet is a network of compromised computers that are remotely controlled by a<br />

malicious bot administrator. Botnets are commonly used for\nsending spam\nrunning<br />

Family Internet Services 802


Denial of Service (DoS) attacks against other networks\nscanning and compromising new<br />

systems\nInstalling sniffers\nInstalling keyloggers\nIdentify theft\nThe observed command<br />

was '%L'\n<br />

realtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Server Detection<br />

<strong>PVS</strong> ID: 3137 FAMILY: IRC Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that is being used to control<br />

a botnet. A botnet is a network of compromised computers that are remotely controlled by a<br />

malicious bot administrator. Botnets are commonly used for\nsending spam\nrunning<br />

Denial of Service (DoS) attacks against other networks\nscanning and compromising new<br />

systems\nInstalling sniffers\nInstalling keyloggers\nIdentify theft\nThe observed command<br />

was '%L'\n<br />

realtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Server Detection<br />

<strong>PVS</strong> ID: 3138 FAMILY: IRC Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that is being used to control<br />

a botnet. A botnet is a network of compromised computers that are remotely controlled by a<br />

malicious bot administrator. Botnets are commonly used for\nsending spam\nrunning<br />

Denial of Service (DoS) attacks against other networks\nscanning and compromising new<br />

systems\nInstalling sniffers\nInstalling keyloggers\nIdentify theft\nThe observed command<br />

was '%L'\n<br />

realtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Server Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 803


<strong>PVS</strong> ID: 3139 FAMILY: IRC Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that is being used to control<br />

a botnet. A botnet is a network of compromised computers that are remotely controlled by a<br />

malicious bot administrator. Botnets are commonly used for\nsending spam\nrunning<br />

Denial of Service (DoS) attacks against other networks\nscanning and compromising new<br />

systems\nInstalling sniffers\nInstalling keyloggers\nIdentify theft\nThe observed command<br />

was '%L'\n<br />

realtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Server Detection<br />

<strong>PVS</strong> ID: 3140 FAMILY: IRC Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that is being used to control<br />

a botnet. A botnet is a network of compromised computers that are remotely controlled by a<br />

malicious bot administrator. Botnets are commonly used for\nsending spam\nrunning<br />

Denial of Service (DoS) attacks against other networks\nscanning and compromising new<br />

systems\nInstalling sniffers\nInstalling keyloggers\nIdentify theft\nThe observed command<br />

was '%L'\n<br />

realtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Server Detection<br />

<strong>PVS</strong> ID: 3141 FAMILY: IRC Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that is being used to control<br />

a botnet. A botnet is a network of compromised computers that are remotely controlled by a<br />

malicious bot administrator. Botnets are commonly used for\nsending spam\nrunning<br />

Denial of Service (DoS) attacks against other networks\nscanning and compromising new<br />

systems\nInstalling sniffers\nInstalling keyloggers\nIdentify theft\nThe observed command<br />

was '%L'\n<br />

realtime<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 804


Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Server Detection<br />

<strong>PVS</strong> ID: 3142 FAMILY: IRC Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that is being used to control<br />

a botnet. A botnet is a network of compromised computers that are remotely controlled by a<br />

malicious bot administrator. Botnets are commonly used for\nsending spam\nrunning<br />

Denial of Service (DoS) attacks against other networks\nscanning and compromising new<br />

systems\nInstalling sniffers\nInstalling keyloggers\nIdentify theft\nThe observed command<br />

was '%L'\n<br />

realtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Server Detection<br />

<strong>PVS</strong> ID: 3143 FAMILY: IRC Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that is being used to control<br />

a botnet. A botnet is a network of compromised computers that are remotely controlled by a<br />

malicious bot administrator. Botnets are commonly used for\nsending spam\nrunning<br />

Denial of Service (DoS) attacks against other networks\nscanning and compromising new<br />

systems\nInstalling sniffers\nInstalling keyloggers\nIdentify theft\nThe observed command<br />

was '%L'\n<br />

realtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Server Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3144 FAMILY: IRC Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that is being used to control<br />

a botnet. A botnet is a network of compromised computers that are remotely controlled by a<br />

malicious bot administrator. Botnets are commonly used for\nsending spam\nrunning<br />

Family Internet Services 805


Denial of Service (DoS) attacks against other networks\nscanning and compromising new<br />

systems\nInstalling sniffers\nInstalling keyloggers\nIdentify theft\nThe observed command<br />

was '%L'\n<br />

realtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Server Detection<br />

<strong>PVS</strong> ID: 3145 FAMILY: IRC Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that is being used to control<br />

a botnet. A botnet is a network of compromised computers that are remotely controlled by a<br />

malicious bot administrator. Botnets are commonly used for\nsending spam\nrunning<br />

Denial of Service (DoS) attacks against other networks\nscanning and compromising new<br />

systems\nInstalling sniffers\nInstalling keyloggers\nIdentify theft\nThe observed command<br />

was '%L'\n<br />

realtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Server Detection<br />

<strong>PVS</strong> ID: 3146 FAMILY: IRC Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that is being used to control<br />

a botnet. A botnet is a network of compromised computers that are remotely controlled by a<br />

malicious bot administrator. Botnets are commonly used for\nsending spam\nrunning<br />

Denial of Service (DoS) attacks against other networks\nscanning and compromising new<br />

systems\nInstalling sniffers\nInstalling keyloggers\nIdentify theft\nThe observed command<br />

was '%L'\n<br />

realtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Server Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 806


<strong>PVS</strong> ID: 3147 FAMILY: IRC Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that is being used to control<br />

a botnet. A botnet is a network of compromised computers that are remotely controlled by a<br />

malicious bot administrator. Botnets are commonly used for\nsending spam\nrunning<br />

Denial of Service (DoS) attacks against other networks\nscanning and compromising new<br />

systems\nInstalling sniffers\nInstalling keyloggers\nIdentify theft\nThe observed command<br />

was '%L'\n<br />

realtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Server Detection<br />

<strong>PVS</strong> ID: 3148 FAMILY: IRC Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that is being used to control<br />

a botnet. A botnet is a network of compromised computers that are remotely controlled by a<br />

malicious bot administrator. Botnets are commonly used for\nsending spam\nrunning<br />

Denial of Service (DoS) attacks against other networks\nscanning and compromising new<br />

systems\nInstalling sniffers\nInstalling keyloggers\nIdentify theft\nThe observed command<br />

was '%L'\n<br />

realtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Server Detection<br />

<strong>PVS</strong> ID: 3149 FAMILY: IRC Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that is being used to control<br />

a botnet. A botnet is a network of compromised computers that are remotely controlled by a<br />

malicious bot administrator. Botnets are commonly used for\nsending spam\nrunning<br />

Denial of Service (DoS) attacks against other networks\nscanning and compromising new<br />

systems\nInstalling sniffers\nInstalling keyloggers\nIdentify theft\nThe observed command<br />

was '%L'\n<br />

realtime<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 807


Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Client Detection<br />

<strong>PVS</strong> ID: 3150 FAMILY: IRC Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that has been compromised<br />

and is being controlled by a botnet. A botnet is a network of compromised computers that<br />

are remotely controlled by a malicious bot administrator. Botnets are commonly used<br />

for\nsending spam\nrunning Denial of Service (DoS) attacks against other<br />

networks\nscanning and compromising new systems\nInstalling sniffers\nInstalling<br />

keyloggers\nIdentify theft \nThe observed command was '%L'<br />

realtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

MDaemon < 8.1.0 Content Filter Traversal Arbitrary File Overwrite<br />

<strong>PVS</strong> ID: 3151 FAMILY: Web Servers RISK: HIGH NESSUS ID:19310<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a directory traversal flaw.\n\nThe remote<br />

host is running Alt-N MDaemon, an SMTP/IMAP server for Windows. According to its<br />

banner, the version of MDaemon on the remote host is prone to a directory traversal flaw<br />

that can be exploited to overwrite files outside the application's quarantine directory<br />

provided MDaemon's attachment quarantine feature is enabled.<br />

Solution: Upgrade to version 8.1.0 or higher.<br />

CVE Not available<br />

PHPList admin/index.php id Parameter SQL Injection<br />

<strong>PVS</strong> ID: 3152 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running PHPList. PHPList is a PHP application that gathers<br />

handles mailing and customer lists. This version is reported to be prone to a SQL Injection<br />

flaw. An attacker exploiting this flaw would be able to read the database, manipulate the<br />

database, and possibly run commands with the privileges of the web server.<br />

Solution: No solution is known at this time.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 808


CVE-2005-2432<br />

Opera Multiple Injection Vulnerabilities<br />

<strong>PVS</strong> ID: 3153 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may be tricked into running an executable file.\n\nThe<br />

remote host is using a version of Opera that is vulnerable to a download dialog spoofing<br />

flaw. Specifically, a malicious web site operator can create downloadable files that, upon<br />

download, appear to be innocent. For example, the user may think that they are<br />

downloading and opening a text file when in fact they are running an executable.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-2406<br />

MetaSploit < 2.4-current Unspecified Vulnerability<br />

<strong>PVS</strong> ID: 3154 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to unspecified remote attack vectors.\n\nThe<br />

remote server is running a MetaSploit Framework server. Metasploit allows users to<br />

automatically exploit and backdoor vulnerable applications via the network. This version of<br />

MetaSploit is reported vulnerable to an unspecified issue.<br />

Solution: Upgrade to version 2.4-current or higher.<br />

CVE-2005-2482<br />

BusinessMail SMTP < 4.7 Multiple Command Remote Overflows<br />

<strong>PVS</strong> ID: 3155 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple buffer overflows.\n\nThe remote<br />

host is running a version of BusinessMail that fails to sanitize user-supplied SMTP input.<br />

An attacker exploiting this flaw would be able to potentially execute malicious code on the<br />

remote server.<br />

Solution: Upgrade to version 4.7 or higher.<br />

CVE-2005-2472<br />

<strong>Network</strong>Activ < 3.5.14 Multiple Parameter XSS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3156 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running <strong>Network</strong>Activ, a web server. This version of <strong>Network</strong>Activ is<br />

vulnerable to a remote Cross-Site Scripting (XSS) attack. An attacker exploiting this flaw<br />

would typically need to convince a user to browse to a malicious URI. Success exploitation<br />

would result in the theft of confidential materials (such as authentication cookies).<br />

Family Internet Services 809


Solution: Upgrade to version 3.5.14 or higher.<br />

CVE-2005-2453<br />

FlatNuke < 2.5.6 Multiple XSS<br />

<strong>PVS</strong> ID: 3157 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running FlatNuke, an open-source content management system. The<br />

remote version of this software is prone to a XSS vulnerability. An attacker exploiting this<br />

flaw would typically need to convince a user to browse to a malicious URI. Success<br />

exploitation would result in the theft of confidential materials (such as authentication<br />

cookies).<br />

Solution: Upgrade to version 2.5.6 or higher.<br />

CVE-2005-2539<br />

MySQL User-Defined Function init_syms() Overflow<br />

<strong>PVS</strong> ID: 3158 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:19416<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nAccording to its<br />

version number, the installation of MySQL on the remote host may be prone to a buffer<br />

overflow when copying the name of a user-defined function into a stack-based buffer. With<br />

sufficient access to create a user-defined function, an attacker may be able to exploit this<br />

and execute arbitrary code within the context of the affected database server process.<br />

Solution: Upgrade to version 4.0.25 / 4.1.13 / 5.0.7-beta or higher.<br />

CVE-2005-2558<br />

Cisco NetFlow Agent Detection<br />

<strong>PVS</strong> ID: 3159 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running a Cisco NetFlow Agent. NetFlow is a UDP protocol<br />

which sends sniffed traffic from a Cisco device to a Cisco collector device. By using<br />

NetFlow, companies do not need to deploy 'taps' or utilize span (or mirror) ports.<br />

Instead, the NetFlow agent bundles the sniffed traffic into a UDP packet and forwards<br />

to the collector.<br />

Solution: As the NetFlow traffic is passed in plaintext, ensure that NetFlow traffic does not<br />

traverse any untrusted networks.<br />

CVE Not available<br />

Gaim < 1.3.2 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 810


<strong>PVS</strong> ID: 3160 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host<br />

seems to be running Gaim, a popular open-source, multi-protocol instant messenger. It is<br />

reported that this version of Gaim is vulnerable to several remote flaws. An attacker<br />

exploiting these flaws would be able to create a Denial of Service (DoS) condition or<br />

possibly overflow system memory and execute arbitrary code.<br />

Solution: Update to version 1.3.2 or higher.<br />

CVE-2005-2102<br />

Ximian Evolution < 2.3.7 Content-Parsing Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3161 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of the Ximian Evolution email client that does not properly parse<br />

user-supplied data. A remote attacker can craft an email message such that, upon opening,<br />

Evolution crashes or executes arbitrary code.<br />

Solution: Upgrade to version 2.3.7 or higher.<br />

CVE-2005-2549<br />

WordPress < 1.5.1.4 cache_lastpostdate Parameter PHP Code Injection<br />

<strong>PVS</strong> ID: 3162 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:19414<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a script injection attack.\n\nThe installed<br />

version of WordPress on the remote host will accept and execute arbitrary PHP code passed<br />

to the 'cache_lastpostdate' parameter via cookies provided PHP's 'register_globals' setting is<br />

enabled.<br />

Solution: Upgrade to version 1.5.1.4 or disable PHP's 'register_globals' setting.<br />

CVE-2005-2612<br />

phpBB < 2.0.20 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3163 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack<br />

vectors.\n\nAccording to its banner, the remote host is running a version of<br />

phpBB that fails to sanitize BBCode '[IMG]' tags. This can enable an attacker to<br />

cause arbitrary HTML and script code to be executed in a user's browser within<br />

the context of the affected site. There is also a flaw in the way that phpBB<br />

deregisters its global variables. An attacker exploiting this flaw would be able to<br />

inject and execute PHP code, execute SQL Injection attacks, and more.<br />

Family Internet Services 811


Solution: Upgrade to version 2.0.20 or higher.<br />

Zotob Worm Infection<br />

CVE-2005-3420<br />

<strong>PVS</strong> ID: 3164 FAMILY: Backdoors RISK: HIGH NESSUS ID:19429<br />

Description: Synopsis :\n\nThe remote host has a backdoor installed.\n\nA Microsoft Windows shell is<br />

running on port 8888. This may indicate an infection by the Zotob worm, although other<br />

worms may also create a shell on this host.\n\nThe remote host has been compromised.<br />

Solution: Manually inspect and repair this system.<br />

Zotob Worm Infection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 3165 FAMILY: FTP Servers RISK: HIGH NESSUS ID:19429<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host is infected with the Zotob Worm.<br />

Solution: Manually inspect and repair the remote host.<br />

Zotob Worm Infection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 3166 FAMILY: FTP Servers RISK: HIGH NESSUS ID:19429<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host is infected with the Zotob Worm.<br />

Solution: Manually inspect and repair the remote host.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Discuz File Extension Validation Weakness Arbitrary File Upload<br />

<strong>PVS</strong> ID: 3167 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a script injection attack.\n\nThe remote host<br />

is running Discuz, a web-based message board. This version of Discuz is vulnerable to a<br />

flaw that would allow remote attackers to upload arbitrary files to the web server. The<br />

attacker could then execute the uploaded file (with the permission of the web server) or<br />

convince other Discuz users to download and/or execute the code. An attacker exploiting<br />

this flaw would be able to gain access to confidential data, potentially impact the<br />

availability of the server, and tarnish the integrity of the server.<br />

Family Internet Services 812


Solution: No solution is known at this time.<br />

CVE-2005-2614<br />

Dada Mail < 2.10 alpha 1 Archived Message XSS<br />

<strong>PVS</strong> ID: 3168 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running Dada Mail, a mailing list management system. This version of Dada<br />

Mail is vulnerable to a remote HTML injection attack. An attacker exploiting this flaw<br />

would typically upload HTML (or script) code to the webserver. Unsuspecting users, upon<br />

visiting the malicious portion of the site, would have code executed within their browser.<br />

This can lead to theft of confidential data (such as authentication cookies).<br />

Solution: Upgrade to version 2.10 alpha 1 or higher.<br />

CVE-2005-2595<br />

phpPGAds/phpAdNew < 2.0.6 lib-view-direct.inc.php clientid Parameter SQL Injection<br />

<strong>PVS</strong> ID: 3169 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThere is a flaw in the remote phpAdNew/phpPgAds PHP Ads server, a banner<br />

management and tracking system written in PHP. This version of phpAdNew is vulnerable<br />

to a SQL Injection vulnerability. An attacker exploiting this flaw would send a malformed<br />

HTTP request to the phpPgAds server. The server, failing to parse out special SQL<br />

characters, would give the attacker the ability to read or write database data as well as<br />

potentially execute code.<br />

Solution: Upgrade to version 2.0.6 or higher.<br />

CVE-2005-2635<br />

Xerox Document Centre Multiple Unspecified Remote Vulnerabilities<br />

<strong>PVS</strong> ID: 3170 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to unspecified remote attack vectors.\n\nThe<br />

remote host is running Xerox Document Centre, an administrative web-based GUI to a<br />

Xerox device. This version is reportedly prone to several remote attacks that, if exploited,<br />

would lead to remote administrative access. The details of the attack are not currently<br />

known.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-2647<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

W-Agora < 4.2.1 index.php site Parameter Traversal Arbitrary File Access<br />

Family Internet Services 813


<strong>PVS</strong> ID: 3171 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running W-Agora, a web-based forum management software written in PHP. This<br />

version of Agora is vulnerable to a flaw in the way that it handles the 'site' parameter of the<br />

index.php script. An attacker exploiting this flaw can supply a directory outside of the web<br />

root. Successful exploitation would allow the remote attacker the ability to peruse<br />

potentially confidential files outside of the web root (such as /etc/passwd or similar). In<br />

addition, the software is vulnerable to several other remote cross-site-scripting (XSS) and<br />

script injection flaws. Finally, the application is vulnerable to a multiple 'file include' flaws.<br />

An attacker exploiting this flaw would be able to execute arbitrary PHP script code on the<br />

W-Agora system. Executed scripts would have the permissions of the webserver process.<br />

Solution: Upgrade to version 4.2.1 or higher.<br />

CVE-2006-2228<br />

Mutt < 1.5.11 imap/browse.c Remote Overflow<br />

<strong>PVS</strong> ID: 3172 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of the Mutt email client that contains a buffer overflow. It is alleged that<br />

an attacker exploiting this flaw would be able to execute arbitrary code on the remote<br />

system.<br />

Solution: Upgrade to version 1.5.11 or higher.<br />

CVE-2006-3242<br />

Mantis < 0.19.3 Multiple Injection Vulnerabilities<br />

<strong>PVS</strong> ID: 3173 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host seems to be running a vulnerable version of Mantis, a bug<br />

tracker web application written in PHP. It is reported that versions up to 0.19.3 are prone to<br />

multiple HTML and SQL injection flaws that would allow an attacker to upload or execute<br />

arbitrary code as well as manipulate database data.<br />

Solution: Upgrade to version 0.19.3 or higher.<br />

CVE-2005-2557<br />

Elm 'Expires' Header Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3174 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 814


Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Elm, an email client. This version of Elm is vulnerable to a buffer overflow via the<br />

'Expires' header parameter. An attacker exploiting this flaw would send a specially formed<br />

email with a very long 'Expires' value. Successful exploitation would result in arbitrary<br />

code being executed.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-2665<br />

Woltlab Burning Board modcp.php Multiple Parameter SQL Injection<br />

<strong>PVS</strong> ID: 3175 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL<br />

injection attack.\n\nThe remote host is running Woltlab Burning Board, a web<br />

bulletin board written in PHP. This version of Burning Board is vulnerable to a<br />

remote SQL injection attack. An attacker exploiting this flaw would send a<br />

malformed 'x' or 'y' parameter to the 'modcp.php' PHP script. Succesful exploitation<br />

would result in the attacker being able to read or write confidential data. In some<br />

instances, the attacker may be able to execute arbitrary code on the remote database<br />

server.<br />

Solution: No solution is known at this time.<br />

CVE-2005-2673<br />

OpenVPN TCP Client Detection<br />

<strong>PVS</strong> ID: 3176 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote client is running the OpenVPN TCP Client. A VPN (Virtual Private <strong>Network</strong>)<br />

allows remote users to connect to an internal network as if they were local users. A VPN<br />

that allows split-tunneling will essentially serve as a bridge between the remote network<br />

and the internal network. Special care should be taken to ensure that remote VPN clients<br />

connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to corporate guidelines and policies.<br />

CVE Not available<br />

OpenVPN TCP Proxy Client Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3177 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: The remote client is running the OpenVPN TCP Client. The client is configured to use an<br />

HTTP proxy to tunnel the VPN to an external network. A VPN (Virtual Private <strong>Network</strong>)<br />

allows remote users to connect to an internal network as if they were local users. A VPN<br />

that allows split-tunneling will essentially serve as a bridge between the remote network<br />

and the internal network. Special care should be taken to ensure that remote VPN clients<br />

Family Internet Services 815


connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to corporate guidelines and policies.<br />

CVE Not available<br />

Coppermine Gallery < 1.3.4 displayimage.php HTML Injection<br />

<strong>PVS</strong> ID: 3178 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML Injection attack.\n\nThe remote<br />

host is running CopperMine Gallery, a set of PHP scripts to handle galleries of pictures.<br />

There is an injection flaw in this version of Coppermine Gallery. Specifically, the<br />

'displayimage.php' script does not properly sanitize user-supplied images prior to rendering.<br />

An attacker exploiting this flaw can run arbitrary code within the browser of unsuspecting<br />

users.<br />

Solution: Upgrade to version 1.3.4 or higher.<br />

CVE-2005-2676<br />

PHP-Kit Multiple SQL Injection Vulnerabilities<br />

<strong>PVS</strong> ID: 3179 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains scripts that are vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running PHP-Kit, an open-source content management<br />

system written in PHP. The remote version of this software is vulnerable to multiple SQL<br />

Injection flaws that may allow an attacker to execute arbitrary SQL statements against the<br />

remote database.<br />

Solution: The PHP-Kit project has been discontinued. All versions of PHP-Kit are vulnerable to a<br />

number of flaws. PHP-Kit is an absolute necessity within your environment, you will need<br />

to delegate resources to fix the security flaws and manage the code.<br />

CVE-2006-1773<br />

RunCMS Multiple SQL Injection Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3180 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running RunCMS, a web-based messaging system. This<br />

version of RunCMS is vulnerable to a remote SQL Injection flaw. An attacker exploiting<br />

this flaw would send specially formatted SQL commands to the web server. Successful<br />

exploitation would allow the attacker to run arbitrary commands on the remote database<br />

server.<br />

Family Internet Services 816


Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-2692<br />

CVS < 1.12.13 Local 'tmp' File Permission Vulnerability<br />

<strong>PVS</strong> ID: 3181 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a local flaw in the way that it creates<br />

temporary files.\n\nThe remote host is running a CVS server that, according to its version<br />

number, is vulnerable to a flaw in the way that it creates and protects temporary files. A<br />

local user exploiting this flaw may be able to write arbitrary information into critical CVS<br />

files.<br />

Solution: Upgrade to version 1.12.13 or higher.<br />

CVE Not available<br />

WebCalendar < 1.0.1 send_reminders.php includedir Parameter Remote File Inclusion<br />

<strong>PVS</strong> ID: 3182 FAMILY: CGI RISK: HIGH NESSUS ID:19502<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a script injection attack.\n\nThe remote<br />

version of WebCalendar fails to sanitize user-supplied input to the 'includedir' parameter of<br />

the 'send_reminders.php' script. By leveraging this flaw, an attacker may be able to view<br />

arbitrary files on the remote host and execute arbitrary PHP code, possibly taken from<br />

third-party hosts.<br />

Solution: Upgrade to version 1.0.1 or higher.<br />

CVE-2005-2717<br />

MPlayer < 1.0pre8 Audio Header strf Overflow<br />

<strong>PVS</strong> ID: 3183 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using a version of MPlayer, a multimedia video and audio application. This version of<br />

MPlayer is vulnerable to a buffer overflow due to a lack of content parsing. An attacker<br />

exploiting this flaw would need to craft a malicious media file and then convince a local<br />

user to download and play the file within MPlayer. Successful exploitation would result in<br />

arbitrary code being executed locally.<br />

Solution: Upgrade to version 1.0pre8 or higher.<br />

CVE-2005-2718<br />

Simple PHP Blog (SPHPBlog) <<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3184 FAMILY: CGI RISK: HIGH NESSUS ID:19516<br />

Family Internet Services 817


Description: Synopsis :\n\nThe remote host is vulnerable to a script injection attack.\n\nThe remote host<br />

is running the Simple PHP Blog, a web log (or blog) package. This version of Simple PHP<br />

Blog is vulnerable to a flaw where remote users can upload arbitrary files to the server.<br />

Successful exploitation results in the attacker executing code on the server or executing<br />

code in unsuspecting user's browser.<br />

Solution: No solution is known at this time.<br />

CVE-2005-2733<br />

Gallery < 1.5.3-RC3 EXIF Data XSS<br />

<strong>PVS</strong> ID: 3185 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:19512<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a script injection attack.\n\nThe remote host<br />

is running Gallery, a web-based photo album. According to its banner, the version of<br />

Gallery installed on the remote host is prone to script insertion attacks because it does not<br />

sanitize malicious EXIF data stored in image files. Using a specially-crafted image file, an<br />

attacker can exploit this flaw to cause arbitrary HTML and script code to be executed in a<br />

user's browser within the context of the affected application.<br />

Solution: Upgrade to version 1.5.3-RC3 or higher.<br />

CVE-2005-2734<br />

YaPiG EXIF Data Script Injection<br />

<strong>PVS</strong> ID: 3186 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:19515<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a script injection attack.\n\nThe remote host<br />

is running YaPiG, a web-based image gallery written in PHP. According to its banner, the<br />

version of YaPiG installed on the remote host is prone to script insertion attacks because it<br />

does not sanitize malicious EXIF data stored in image files. Using a specially-crafted image<br />

file, an attacker can exploit this flaw to cause arbitrary HTML and script code to be<br />

executed in a user's browser within the context of the affected application.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-4421<br />

PhotoPost < 5.11 PHP Pro EXIF Data XSS<br />

<strong>PVS</strong> ID: 3187 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:19513<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS)<br />

attack.\n\nAccording to its banner, the version of PhotoPost PHP Pro installed on the<br />

remote host is prone to script insertion attacks because it does not sanitize malicious EXIF<br />

data stored in image files. Using a specially-crafted image file, an attacker can exploit this<br />

Family Internet Services 818


flaw to cause arbitrary HTML and script code to be executed in a user's browser within the<br />

context of the affected application.<br />

Solution: Upgrade to version 5.11 or higher.<br />

CVE-2005-2737<br />

Telnet Detection on High-numbered TCP Port<br />

<strong>PVS</strong> ID: 3188 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running a telnet server on a non-standard high TCP port.<br />

Solution: Ensure that the telnet server is authorized by relevant corporate policies and procedures.<br />

CVE Not available<br />

Telnet Server Detection (High Port)<br />

<strong>PVS</strong> ID: 3189 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: A telnet server is running on this port.<br />

Solution: N/A<br />

CVE Not available<br />

Linux Telnet Server Detection (High Port)<br />

<strong>PVS</strong> ID: 3190 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: A Linux telnet server is running on this port.<br />

Solution: N/A<br />

CVE Not available<br />

SysV Telnet Server Detection (High Port)<br />

<strong>PVS</strong> ID: 3191 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: A SysV telnet server is running on this port.<br />

Solution: N/A<br />

CVE Not available<br />

Informix Telnet Server Detection (High Port)<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3192 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 819


Description: An Informix telnet server is running on this port.<br />

Solution: N/A<br />

CVE Not available<br />

phpMyAdmin < 2.6.4-RC1 Multiple XSS<br />

<strong>PVS</strong> ID: 3193 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:19519<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack\n\nThe<br />

version of phpMyAdmin installed on the remote host may suffer from two cross-site<br />

scripting vulnerabilities due to its failure to sanitize user input to the 'error' parameter of the<br />

'error.php' script and in 'libraries/auth/cookie.auth.lib.php'. A remote attacker may use these<br />

vulnerabilities to cause arbitrary HTML and script code to be executed in a user's browser<br />

within the context of the affected application.<br />

Solution: Upgrade to version 2.6.4-RC1 or higher.<br />

CVE-2005-2869<br />

PHP-Fusion < 6.00.11 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3194 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML Injection attack.\n\nAccording to<br />

its version number, the remote host is running a version of PHP-Fusion that suffers from an<br />

HTML injection vulnerability. An attacker can inject malicious code using specially-crafted<br />

posts. Successful exploitation would affect how the site is rendered to remote viewers.<br />

Solution: Upgrade to version 6.00.11 or higher.<br />

CVE-2005-2783<br />

phpLDAPadmin < 0.9.6c Anonymous Bind <strong>Security</strong> Bypass<br />

<strong>PVS</strong> ID: 3195 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:19546<br />

Description: Synopsis :\n\nThe remote application may allow anonymous connections despite the<br />

configuration details.\n\nThe remote host is running phpLDAPadmin, a PHP-based LDAP<br />

browser. The version of phpLDAPadmin installed on the remote host may allow access to<br />

an LDAP server anonymously, even if anonymous binds have been disabled in the<br />

application's configuration.<br />

Solution: Upgrade to version 0.9.6c or higher.<br />

CVE-2005-2654<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 820


BNBT P2P Tracking Detection<br />

<strong>PVS</strong> ID: 3196 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the BNBT web application. BNBT is a tool for tracking<br />

peer-to-peer (P2P) BitTorrent connections.<br />

Solution: Ensure that P2P applications are allowed by corporate policies and procedures.<br />

CVE Not available<br />

BNBT EasyTracker Malformed Request DoS<br />

<strong>PVS</strong> ID: 3197 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:19548<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running BNBT EasyTracker, a packaged BitTorrent tracker installer for<br />

Windows. The remote version of BNBT EasyTracker fails to properly handle malformed<br />

HTTP requests, making it prone to denial of service attacks. An attacker can crash the<br />

application by sending a request with a header line consisting of only a ':'.<br />

Solution: No solution is known at this time.<br />

CVE-2005-2806<br />

Simple Machines Forum < 1.0.7 Code Injection<br />

<strong>PVS</strong> ID: 3198 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection attack.\n\nThe remote host<br />

is running the Simple Machines Forum (SMF), a web forum. This version of SMF is<br />

vulnerable to a remote code injection flaw. An attacker exploiting this flaw would be able<br />

to execute arbitrary PHP code on the target web server. In addition, the remote host is<br />

vulnerable to an HTML injection attack. An attacker exploiting this flaw would create a<br />

post that included malicious script code. The attacker would then wait for a vulnerable user<br />

to peruse the page. Successful exploitation would result in malicious code executing within<br />

the user browser.<br />

Solution: Upgrade to version 1.0.7 or higher.<br />

CVE-2006-0896<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

IndiaTimes Instant Messenger ActiveX RenameGroup Function Overflow<br />

<strong>PVS</strong> ID: 3199 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running IndiaTimes Instant Messaging client. IndiaTimes allows users to consolidate ICQ,<br />

Yahoo, AIM and MSN messengers into a single GUI console. This version of IndiaTimes<br />

Family Internet Services 821


is vulnerable to a remote buffer overflow. An attacker exploiting this flaw would need to be<br />

able to convince a user to browse to a malicious website and execute a malicious ActiveX<br />

control. Successful exploitation would lead to the attacker executing arbitrary code on the<br />

remote system.<br />

Solution: No solution is known at this time.<br />

CVE-2005-2844<br />

Barracuda Spam Firewall < Firmware 3.1.18 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3200 FAMILY: Web Servers RISK: HIGH NESSUS ID:19556<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

appears to be a Barracuda Spam Firewall appliance, which protects mail servers from spam<br />

and viruses. It appears that the installed appliance suffers from several vulnerabilities that<br />

allow for execution of arbitrary code and reading of arbitrary files, all subject to the<br />

permissions of the web server user ID.<br />

Solution: Upgrade to firmware 3.1.18 or higher.<br />

CVE-2005-2847<br />

SlimFTPd Multiple Command Remote Overflow DoS<br />

<strong>PVS</strong> ID: 3201 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:19588<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host appears to be using SlimFTPd, a free, small standards-compliant FTP server<br />

for Windows. The installed version of SlimFTPd on the remote host suffers from a denial<br />

of service vulnerability. By sending 'user' and 'pass' commands that are each 40 bytes long,<br />

an attacker will crash the service after a short period of time.<br />

Solution: No solution is known at this time.<br />

CVE-2005-2850<br />

PHPGroupWare < 0.9.16.007 Main Screen Message Script Injection<br />

<strong>PVS</strong> ID: 3202 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection attack.\n\nThe remote host<br />

seems to be running PHPGroupWare, a groupware system implemented in PHP. This<br />

version is reported vulnerable to a flaw where the Administrator can inject script code into<br />

the browsers of unsuspecting users.<br />

Solution: Upgrade to version 0.9.16.007 or higher.<br />

CVE-2005-2761<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 822


Phorum < 5.0.18 register.php XSS<br />

<strong>PVS</strong> ID: 3203 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:19584<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a cross-site scripting (XSS) attack.\n\nThe<br />

remote version of Phorum contains a script called 'register.php' that is vulnerable to a<br />

cross-site scripting attack. An attacker may exploit this problem to steal the authentication<br />

credentials of third party users.<br />

Solution: Upgrade to version 5.0.18 or higher.<br />

CVE-2005-2836<br />

PBLang Bulletin Board < 4.66z Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3204 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running PBLang, a bulletin board system written in PHP. This version of PBLang is<br />

reported to be vulnerable to a number of remote overflows. While the details of the<br />

vulnerabilities are unknown at this time, it is alleged that a remote attacker would be able to<br />

execute commands with 'Administrative' privileges.<br />

Solution: Upgrade to version 4.66z or higher.<br />

CVE Not available<br />

OpenSSH < 4.2p1 GSSAPI Authentication Credential Escalation<br />

<strong>PVS</strong> ID: 3205 FAMILY: SSH<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running a version of OpenSSH which is<br />

vulnerable to a flaw in the way that it handles GSSAPI authentication. Specifically, if<br />

GSSAPI is enabled and 'GSSAPIDelegateCredentials' is enabled, an attacker may gain<br />

access to GSSAPI credentials.<br />

Solution: Upgrade to version 4.2p1 or higher.<br />

CVE-2005-2798<br />

Squid sslConnectTimeout Function Remote DoS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3206 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote Squid caching proxy, according to its version number, is vulnerable to an attack<br />

where the attacker can cause the Squid proxy to stop servicing valid service requests. The<br />

flaw is within the 'sslConnectTimeout' function and stems from the functions inability to<br />

Family Internet Services 823


parse user-supplied requests. Successful exploitation leads to a loss of availability.<br />

Solution: Upgrade to version 2.5.STABLE11 (when available) or higher.<br />

CVE-2005-2796<br />

AttachmateWRQ Reflection for Secure IT Server < 6.0 Build 24 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3207 FAMILY: SSH<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:19589<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running AttachmateWRQ Reflection for Secure IT Server, a commercial SSH server for<br />

Windows. According to its banner, the installed version of Reflection for Secure IT Server<br />

on the remote host suffers from several vulnerabilities, including :\n\n- An Access<br />

Restriction Bypass Vulnerability. Access expressions are evaluated in a case-sensitive<br />

manner while in versions prior to 6.0 they were case-insensitive. This may let an attacker<br />

gain access to an otherwise restricted account by logging in using a variation on the account<br />

name.\n\n- A Renamed Account Remote Login Vulnerability. The application continues to<br />

accept valid public keys for authentication to the the Administrator or Guest accounts if<br />

either has been renamed or disabled after being configured for SSH public key<br />

authentication.\n\n- An Information Disclosure Vulnerability. Users with access to the<br />

remote host can read the server's private key, which can lead to host impersonation attacks.<br />

Solution: Upgrade to version 6.0 build 24 or higher.<br />

CVE-2005-2770<br />

HP OpenView <strong>Network</strong> Node Manager (NNM) Detection<br />

<strong>PVS</strong> ID: 3208 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the HP OpenView <strong>Network</strong> Node Manager.<br />

Solution: Ensure that this server is configured in accordance with corporate policies and procedures.<br />

CVE Not available<br />

Land Down Under < 802 events.php SQL Injection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3209 FAMILY: CGI RISK: HIGH NESSUS ID:19603<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running Land Down Under, a web-based content management<br />

system. This version of LDU is vulnerable to a script injection flaw within the 'events.php'<br />

script. An attacker exploiting this flaw would need to be able to convince a user to browse<br />

to a malicious URI. Successful exploitation would lead to script code being executed within<br />

the user's browser. In addition, the product is vulnerable to multiple SQL injection flaws.<br />

An attacker exploiting these flaws would be able to execute code within the context of the<br />

database.<br />

Family Internet Services 824


Solution: Upgrade to version 802 or higher.<br />

CVE-2005-2884<br />

Kerberos v5 Client with SSH Server Detection<br />

<strong>PVS</strong> ID: 3210 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a Kerberos 5 client with SSH Server.<br />

Solution: N/A<br />

CVE Not available<br />

Kerberos v4 Client with SSH Server Detection<br />

<strong>PVS</strong> ID: 3211 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a Kerberos 4 client with SSH Server.<br />

Solution: N/A<br />

CVE Not available<br />

ASP/ASA Source Using Microsoft Translate f: bug (IIS 5.1)<br />

<strong>PVS</strong> ID: 3212 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:19596<br />

Description: Synopsis :\n\nThe remote web server can disclose source code.\n\nThere is a serious<br />

vulnerability in IIS 5.1 that allows an attacker to view ASP/ASA source code instead of a<br />

processed file when the files are stored on a FAT partition. ASP source code can contain<br />

sensitive information such as usernames and passwords for ODBC connections.<br />

Solution: Install the remote web server on a NTFS partition.<br />

CVE Not available<br />

IIS Patch Level Detection (English Versions Only)<br />

<strong>PVS</strong> ID: 3213 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

Description: The remote IIS server appears to be running IIS 5.1 Service Pack 2.<br />

Solution: Ensure that you are running the latest version of IIS.<br />

CVE Not available<br />

IIS Patch Level Detection (English Versions Only)<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

NESSUS ID:Not Available<br />

Family Internet Services 825


<strong>PVS</strong> ID: 3214 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote IIS server appears to be running IIS 5.1 with no Service Pack.<br />

Solution: Ensure that you are running the latest version of IIS.<br />

CVE Not available<br />

IIS Patch Level Detection (English Versions Only)<br />

<strong>PVS</strong> ID: 3215 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

Description: The remote IIS server appears to be running IIS 5.1.<br />

Solution: Ensure that you are running the latest version of IIS.<br />

CVE Not available<br />

PBLang Multiple Vulnerabilities<br />

NESSUS ID:Not Available<br />

<strong>PVS</strong> ID: 3216 FAMILY: CGI RISK: HIGH NESSUS ID:19594<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running PBLang, a bulletin board system that uses flat files and is written in PHP. The<br />

version of PBLang installed on the remote suffers from several vulnerabilities, including<br />

remote code execution, information disclosure, cross-site scripting, and path disclosure.<br />

Solution: No solution is known at this time.<br />

Google Talk Detection<br />

CVE-2005-2894<br />

<strong>PVS</strong> ID: 3217 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is running the Google Talk application. This application allows<br />

remote users to place voice calls over the Internet.<br />

Solution: Ensure that such activity is allowed by corporate policies and guidelines.<br />

CVE Not available<br />

SunOne Web Proxy < 3.6 SP8 Unspecified DoS<br />

<strong>PVS</strong> ID: 3218 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 826


Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running the SunOne Web Proxy. Alledgedly, successful exploitation of an<br />

overflow would result in a Denial of Service (DoS), thereby rendering the service<br />

unuseable to valid users.<br />

Solution: Upgrade to 3.6 SP8 or higher.<br />

CVE-2005-4806<br />

Sawmill < 7.1.14 GET Request Query String XSS<br />

<strong>PVS</strong> ID: 3219 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:19681<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running Sawmill, a weblog analysis package. The version of Sawmill<br />

installed on the remote host suffers from a cross-site scripting flaw because its standalone<br />

web server treats an arbitrary query string appended to a GET request as a configuration<br />

command and fails to sanitize it before using it in an error page. An unauthenticated<br />

attacker may be able to exploit this issue to steal authentication information of users of the<br />

affected application.<br />

Solution: Upgrade to version 7.1.14 or higher or use Sawmill in CGI mode.<br />

CVE-2005-2950<br />

punBB < 1.2.7 Multiple SQL Injection Vulnerabilities<br />

<strong>PVS</strong> ID: 3220 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running punBB, a web-based bulletin board. This version of<br />

punBB ( %L ) is vulnerable to a SQL Injection attack. Due to a content-parsing flaw,<br />

attackers can inject SQL commands into a PHP script. An attacker exploiting this flaw<br />

would only need to be able to send HTTP requests to the application. Successful<br />

exploitation would result in the attacker having the ability to read or write to the database.<br />

In addition, the attacker may be able to execute arbitrary commands on the remote system.<br />

Solution: Upgrade to version 1.2.7 or higher.<br />

CVE-2005-4665<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Linksys Wireless Router < 4.20.7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3221 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a Linksys wireless router. This version of the router is vulnerable to multiple<br />

remote flaws. An attacker exploiting these flaws would need to be on the internal network<br />

and have the ability to craft HTTP requests to the default Linksys web server. Successful<br />

Family Internet Services 827


exploitation would result in the remote attacker gaining administrative access. The remote<br />

host is running firmware version\n%L<br />

Solution: Upgrade the firmware to version 4.20.7 or higher.<br />

CVE-2005-2916<br />

FTP Server Detection (Any Port)<br />

<strong>PVS</strong> ID: 3222 FAMILY: FTP Servers RISK: NONE NESSUS ID:Not Available<br />

Description: An FTP server is running on this port.<br />

Solution: N/A<br />

CVE Not available<br />

Twiki rev Parameter Arbitrary Shell Command Execution<br />

<strong>PVS</strong> ID: 3223 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nAn attacker can run arbitrary shell commands on the remote system.\n\nThe<br />

remote host is running Twiki, an open-source wiki software written in Perl. This version of<br />

Twiki is vulnerable to a command insertion flaw. Specifically, an attacker sending a<br />

command (within backticks) to the 'rev' parameter would be able to execute arbitrary code<br />

on the web server. Example:\n\nGET /cgi-bin/TwikiUsers?rev<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-2877<br />

Mac OS X 10.3.9 Detection<br />

<strong>PVS</strong> ID: 3224 FAMILY: Operating System Detection RISK: NONE NESSUS ID:Not Available<br />

Description: The remote host is running Mac OS 10.3.9.<br />

Solution: N/A<br />

CVE Not available<br />

SuSE Linux Operating System Detection<br />

<strong>PVS</strong> ID: 3225 FAMILY: Operating System Detection RISK: NONE NESSUS ID:Not Available<br />

Description: The remote host is running SuSE Linux %L\nThe host is using YaST to maintain patch<br />

levels with the SuSE central servers.<br />

Solution: N/A<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 828


CVE Not available<br />

Lotus Domino Server Multiple XSS<br />

<strong>PVS</strong> ID: 3226 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is running a version of Lotus Domino Server that is prone to multiple<br />

remote Cross-Site Scripting (XSS) flaws. An attacker exploiting this flaw would need to be<br />

able to convince a user to browse to a malicious URI. Successful exploitation would result<br />

in script code executing within the user's browser.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-4819<br />

ZoneAlarm Personal Firewall < 6.0.667.000 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3227 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running ZoneAlarm, a personal firewall for the Windows platform. The client is running<br />

a version of ZoneAlarm that is less than 6.0.667.000. This version of ZoneAlarm is<br />

reported vulnerable to a number of flaws that can render the firewall unuseable or, in some<br />

instances, give the users a false sense of security.<br />

Solution: Upgrade to version 6.0.667.000 or higher.<br />

CVE-2005-3560<br />

DSL/CableModem Internet Gateway Detection<br />

<strong>PVS</strong> ID: 3228 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nThe remote host is advertising Internet Gateway Services. This is common<br />

in many off-the-shelf cable modem or DSL modem hardware. On a production network,<br />

such a device may be inadvertently introducing risk due to a multi-homing of the internal<br />

network.<br />

Solution: Ensure that such devices are allowed by corporate policies and guidelines.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

ClamAV < 0.86.3 Content-parsing Multiple Overflows<br />

<strong>PVS</strong> ID: 3229 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 829


Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running ClamAV, an open-source antivirus solution for Unix-like systems. This version of<br />

ClamAV is reported to be vulnerable to a flaw where the parsing of a malicious file will<br />

cause the clamav process to overflow system memory, possibly resulting in an attacker<br />

executing code. An attacker exploiting this flaw would need to be able to send a specially<br />

formed email to the system running ClamAV. In addition, this version of ClamAV is<br />

vulnerable to a remote Denial of Service (DoS) attack that would render the service<br />

unavailable to valid users.<br />

Solution: Upgrade to version 0.86.3 or higher.<br />

CVE-2005-2920<br />

CuteNews flood.db.php HTTP Header PHP Code Injection<br />

<strong>PVS</strong> ID: 3230 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection<br />

attack.\n\nAccording to its version number, the remote host is running a version<br />

of CuteNews that allows an attacker to inject arbitrary script code. An attacker<br />

exploiting this flaw would be able to inject script code that would either be<br />

executed locally or possibly executed within the browser of an unsuspecting<br />

user.<br />

Solution: No solution is known at this time.<br />

CVE-2005-3010<br />

vBulletin < 3.0.10 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3231 FAMILY: CGI RISK: HIGH NESSUS ID:19760<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

vBulletin installed on the remote host fails to properly sanitize user-supplied input to a<br />

number of parameters and scripts before using it in database queries and to generate<br />

dynamic HTML. An attacker can exploit these issues to launch SQL injection and<br />

cross-site scripting attacks against the affected application. Note that the affected scripts<br />

require moderator or administrator acess, with the exception of 'joinrequests.php'.<br />

Solution: Upgrade to version 3.0.10 or higher.<br />

CVE-2005-3025<br />

Opera < 8.50 Mail Client Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3232 FAMILY: SMTP Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 830


Description: The remote host is running the Opera Mail Client. This version of Opera is reported to be<br />

vulnerable to multiple remote attack vectors. An attacker exploiting this flaw would need to<br />

be able to convince an Opera mail user to open a malicious email or attachment. Successful<br />

exploitation would result in arbitrary code being executed.<br />

Solution: Upgrade to version 8.50 or higher.<br />

CVE-2005-3041<br />

Opera < 8.50 Upload Flaw<br />

<strong>PVS</strong> ID: 3233 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a 'file upload' flaw.\n\nThe remote host is<br />

using a version of Opera that is vulnerable to an unspecified file upload vulnerability. An<br />

attacker exploiting this flaw would need to be able to convince a user to browse to a<br />

malicious URI. Successful exploitation would result in the attacker executing arbitrary code<br />

on the target machine.<br />

Solution: Upgrade to version 8.50 or higher.<br />

CVE-2005-3041<br />

PHP Advanced Transfer Manager <<br />

<strong>PVS</strong> ID: 3234 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:19768<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

PHP Advanced Transfer Manager on the remote host suffers from multiple information<br />

disclosure and cross-site scripting flaws. For example, by calling the text or HTML viewer<br />

directly, an unauthenticated attacker can view arbitrary files, possibly even from remote<br />

hosts, provided PHP's 'register_globals' setting is enabled. As another example, an attacker<br />

can issue a request for '/PATH/users/username' and retrieve sensitive user credentials. In<br />

addition, selected PHP settings on the remote host can be disclosed by accessing the<br />

'test.php' script directly.<br />

Solution: Disable PHP's 'register_globals' setting and remove the 'test.php' script.<br />

CVE Not available<br />

PunBB < 1.2.8 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3235 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:19775<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

PunBB installed on the remote host suffers from several flaws.\n\nA File Inclusion<br />

Vulnerability - The application fails to validate the 'language' parameter when a user<br />

updates their profile and uses that throughout the application to require PHP code in order<br />

to display messages. An attacker with an account on the affected application may be able to<br />

Family Internet Services 831


exploit this issue to read arbitrary files and execute local files with arbitrary PHP code<br />

subject to the privileges of the web server user ID.\n\nA Cross-Site Scripting Vulnerability<br />

- The application also does not sanitize input passed to the 'email' parameter of the<br />

'login.php' script when requesting a new password, which permits cross-site scripting<br />

attacks such as theft of authentication cookies.<br />

Solution: Upgrade to version 1.2.8 or higher.<br />

CVE-2005-3078<br />

HylaFAX < 4.2.2 RC1 xferfaxstats Symlink Arbitrary File Overwrite<br />

<strong>PVS</strong> ID: 3236 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe fax server creates temporary files in an insecure manner.\n\nThe remote<br />

host is running HylaFAX, a fax transmission software. It is reported that HylaFAX is prone<br />

to a flaw in the way that it creates temporary files. A local attacker exploiting this flaw<br />

would be able to gain access to potentially confidential information or use the flaw to<br />

escalate their privileges on the machine.<br />

Solution: Upgrade to version 4.2.2 RC1 or higher.<br />

CVE-2005-3070<br />

Movable Type < 3.20 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3237 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThere are multiple injection-type flaws within this version of Movable<br />

Type.\n\nThe remote host is running Movable Type, a blogging software for Unix and<br />

Windows platforms. This version of Movable Type is vulnerable to multiple flaws that may<br />

allow an attacker to inject or upload web files, execute malicious code within a user's<br />

browser or disclose confidential data.<br />

Solution: Upgrade to version 3.20 or higher.<br />

CVE-2005-3101<br />

Mozilla Browser < 1.7.12 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3238 FAMILY: Web Clients RISK: HIGH NESSUS ID:19718<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using Mozilla, an alternative web browser. The installed version of Mozilla contains<br />

various security issues, several of which are critical as they can be easily exploited to<br />

execute arbitrary shell code on the remote host. The reported browser version (as seen on<br />

the network) is: \n %L<br />

Solution: Upgrade to version 1.7.12 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 832


CVE-2005-2602<br />

Firefox < 1.0.7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3239 FAMILY: Web Clients RISK: HIGH NESSUS ID:19719<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using Firefox. The installed version of Firefox contains various security issues, several of<br />

which are critical as they can be easily exploited to execute arbitrary shell code on the<br />

remote host. The reported browser version (as seen on the network) is: \n %L<br />

Solution: Upgrade to version 1.0.7 or higher.<br />

CVE-2005-2871<br />

Maxthon Web Browser < 1.3.3 Cross-Domain Dialog Box Spoofing<br />

<strong>PVS</strong> ID: 3240 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is running Maxthon Web Browser. Maxthon Web Browser is reported to<br />

be prone to a cross-domain dialog box spoofing vulnerability. This issue may allow a<br />

remote attacker to carry out phishing style attacks.<br />

Solution: Upgrade to version 1.3.3 or higher.<br />

CVE Not available<br />

Interchange < 5.2.1 Multiple Injection Vulnerabilities<br />

<strong>PVS</strong> ID: 3241 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running Interchange, a web-based content management<br />

application. This version of Interchange is vulnerable to a flaw in the way that it handles<br />

malformed data. An attacker exploiting these flaws would be able to inject commands into<br />

SQL statements or inject executable code that would be executed by the web server<br />

process.<br />

Solution: Upgrade to version 5.2.1 or higher.<br />

CVE-2005-3073<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

SEO-Board < 1.03 admin.php user_pass_sha1 Cookie SQL Injection<br />

<strong>PVS</strong> ID: 3242 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running SEO-Board, a web forum written in PHP. This<br />

version of SEO-Board is vulnerable to a flaw in the way that it handles malformed data. An<br />

Family Internet Services 833


attacker exploiting this flaw would be able to inject arbitrary system commands into SQL<br />

statements.<br />

Solution: Upgrade to version 1.03 or higher.<br />

CVE-2005-3082<br />

Qualcomm Qpopper poppassd Local Privilege Escalation<br />

<strong>PVS</strong> ID: 3243 FAMILY: POP Server RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe host is vulnerable to a local file access flaw.\n\nThe remote host is<br />

running Qpopper, a POP3 mail server for Unix-type systems. This version of Qpopper is<br />

vulnerable to a local configuration flaws. A local attacker exploiting these flaws would be<br />

able to elevate privileges on the Qpopper system.<br />

Solution: No solution is known at this time.<br />

CVE-2005-3098<br />

Brooky CubeCart < 3.0.4 Multiple XSS<br />

<strong>PVS</strong> ID: 3244 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a Cross-Site<br />

Scripting (XSS) attack.\n\nThe remote host is using Brooky CubeCart, an online storefront<br />

application written in PHP. This version of CubeCart is vulnerable to multiple XSS<br />

Injection flaws. An attacker exploiting these flaws would need to be able to convince a user<br />

to browse to a malicious URI. Successful exploitation would result in code execution<br />

within the user's browser that could lead to theft of authentication materials.<br />

Solution: Upgrade to version 3.0.4 or higher.<br />

CVE-2005-3152<br />

PHP-Fusion < 6.00.110 Multiple SQL Injection Vulnerabilities<br />

<strong>PVS</strong> ID: 3245 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a<br />

SQL injection attack.\n\nAccording to its version number, the remote host is<br />

running a version of PHP-Fusion that suffers from a SQL Injection flaw. An<br />

attacker exploiting these flaws would be able to inject commands into SQL<br />

statements or inject executable code which would be executed by the database<br />

server.<br />

Solution: Upgrade to version 6.00.110 or higher.<br />

CVE-2005-3161<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 834


lucidCMS Login Form Field SQL Injection<br />

<strong>PVS</strong> ID: 3246 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a<br />

SQL injection attack.\n\nAccording to its version number, the remote host is<br />

running a version of lucidCMS that suffers from a SQL Injection flaw. An<br />

attacker exploiting these flaws would be able to inject commands into SQL<br />

statements or inject executable code which would be executed by the database<br />

server.<br />

Solution: No solution is known at this time.<br />

CVE-2005-3130<br />

Squid < 2.5 STABLE11 NTLM Authentication Header DoS<br />

<strong>PVS</strong> ID: 3247 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote proxy is vulnerable to a DoS attack.\n\nThe remote squid<br />

caching proxy, according to its version number, is vulnerable to an attack where an<br />

attacker can disable the Squid proxy by sending a malformed NTLM request.<br />

Successful exploitation leads to a loss of availability.<br />

Solution: Upgrade to version 2.5 STABLE11 or higher.<br />

CVE-2005-2917<br />

IceWarp Web Mail Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3248 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:19782<br />

Description: Synopsis :\n\nIt is possible to retrieve or delete local files on the remote system through the<br />

WebMail.\n\nThe remote host is running IceWarp Web Mail, a webmail solution available<br />

for the Microsoft Windows platform. The remote version of this software is vulnerable to a<br />

Directory Traversal vulnerability that may allow an attacker to retrieve arbitrary files on the<br />

system. Another input validation flaw allows an attacker to delete arbitrary files on the<br />

remote host. In addition, the existence of these two flaws indicates that IceWarp is<br />

vulnerable to cross-site scripting attack.<br />

Solution: No solution is known at this time.<br />

CVE-2005-3131<br />

4D WebStar < 5.3.5 IMAP Mac OS Client DoS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3249 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 835


Description: Synopsis :\n\nThe remote host is vulnerable to a remote Denial of Service (DoS)<br />

attack.\n\nThe remote server is running 4D WebStar Web Server. The remote server is<br />

reported to be vulnerable to a Denial of Service (DoS) attack via the IMAP service.<br />

Solution: Upgrade to version 5.3.5 or higher.<br />

CVE-2005-3143<br />

MailEnable STATUS Command Overflow<br />

<strong>PVS</strong> ID: 3250 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:19783<br />

Description: Synopsis :\n\nThe remote IMAP server is prone to buffer overflows.\n\nThe remote host is<br />

running a version of MailEnable's IMAP service that is prone to a buffer overflow<br />

vulnerability triggered when processing a STATUS command with a long mailbox name.<br />

Once authenticated, an attacker can exploit this flaw to execute arbitrary code subject to the<br />

privileges of the affected application. In addition, the version of MailEnable is vulnerable<br />

to an IMAP directory traversal flaw. An attacker exploiting this flaw would need to be able<br />

to log into the server and issue a malformed ('../') request. Successful exploitation would<br />

result in the attacker accessing confidential data.<br />

Solution: Upgrade to MailEnable Professional 1.7 or higher or to MailEnable Enterprise Edition 1.2<br />

or higher.<br />

CVE-2005-3155<br />

UW-IMAP Quote String Buffer Overflow<br />

<strong>PVS</strong> ID: 3251 FAMILY: IMAP Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe IMAP server is vulnerable to an overflow after authentication.\n\nThere<br />

is a flaw in the remote UW-IMAP server that allows an authenticated user to execute<br />

arbitrary code on the server. The flaw is in the way that UW-IMAP handles quoted mailbox<br />

names. Specifically, an attacker supplying a long mailbox name which only contained one<br />

'"' would be able to overwrite memory and execute arbitrary code.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-2933<br />

PHPMyAdmin Multiple Script usesubform Parameter Remote File Inclusion<br />

<strong>PVS</strong> ID: 3252 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:19950<br />

Description: Synopsis :\n\nThe remote web server contains a PHP application that is prone to<br />

information disclosure attacks.\n\nThe version of phpMyAdmin installed on the remote<br />

host allows attackers to read arbitrary files because of its failure to sanitize the parameter<br />

'usesubform' before using it in several scripts.<br />

Family Internet Services 836


Solution: No solution is known at this time.<br />

CVE-2005-3299<br />

WebGUI < 6.7.6 Unspecified Code Execution<br />

<strong>PVS</strong> ID: 3253 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an arbitrary 'code execution'<br />

vulnerability.\n\nThe remote host is running WebGUI, a content management framework.<br />

The remote version of this software is vulnerable to an undisclosed remote vulnerability<br />

that would allow an attacker to execute arbitrary code with the permissions of the<br />

webserver.<br />

Solution: Upgrade to version 6.7.6 or higher.<br />

CVE-2005-4694<br />

ClamAV < 0.87.2 Content-parsing DoS<br />

<strong>PVS</strong> ID: 3254 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running ClamAV, an open-source antivirus solution for Unix-like systems.<br />

This version of ClamAV is reported vulnerable to a flaw where the parsing of a malicious<br />

file will cause the clamav process to enter an infinite loop. Successful exploitation causes<br />

the clamd service to exit.<br />

Solution: Upgrade to version 0.87.2 or higher.<br />

CVE-2005-3239<br />

GNU WGet < 1.10.2 Buffer Overflow<br />

<strong>PVS</strong> ID: 3255 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using a version of wget that contains a flaw in the way that it handles NTLM authentication<br />

data. Specifically, a rogue website that returns malformed data during an NTLM<br />

authentication session will be able to execute arbitrary code on the local client machine.<br />

Solution: Upgrade to version 1.10.2 or higher.<br />

CVE-2006-1985<br />

Curl NTLM Buffer Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3256 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 837


Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using a version of curl (or libcurl) that is vulnerable to a remote buffer overflows. To<br />

exploit, an attacker would have to set up a rogue web server that would reply with a<br />

malicious NTLM authentication request. Upon successful exploitation, the attacker would<br />

be able to execute arbitrary commands with the rights of the web server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-1985<br />

XMail < 1.22.0 Multiple Overflows<br />

<strong>PVS</strong> ID: 3257 FAMILY: POP Server RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple buffer overflow attacks.\n\nThe<br />

remote XMail server is vulnerable to multiple remote and local buffer overflows.<br />

Successful exploitation would lead to the attacker executing arbitrary code.<br />

Solution: Upgrade to version 1.22.0 or higher.<br />

CVE-2005-2943<br />

Mozilla Thunderbird < 1.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3258 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a vulnerable version of Mozilla Thunderbird mail client. This version of<br />

Thunderbird is vulnerable to a Man-in-the-middle (MITM) or sniffing vulnerability where<br />

an attacker can determine user credentials even when encryption is enabled. To exploit this<br />

flaw, an attacker would need access to the local network. In addition, the client is<br />

vulnerable to a flaw where attackers can spoof attachment types. An attacker exploiting this<br />

flaw would craft a malicious email and entice a user to open a seemingly innocuous<br />

attachment.<br />

Solution: Upgrade to version 1.5 or higher.<br />

CVE-2006-0236<br />

Gallery < 2.0.1 main.php Directory Traversal Arbitrary File Access<br />

<strong>PVS</strong> ID: 3259 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a directory traversal flaw.\n\nThe remote<br />

host is running the Gallery web-based photo album. This version of Gallery is vulnerable to<br />

a 'directory traversal' flaw. An attacker exploiting this flaw would be able to access files<br />

outside of the webroot.<br />

Solution: Upgrade to version 2.0.1 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 838


CVE-2005-3251<br />

PunBB < 1.2.9 search.php old_searches Parameter SQL Injection<br />

<strong>PVS</strong> ID: 3260 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:20013<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

PunBB installed on the remote host fails to sanitize user-supplied input to the 'old_searches'<br />

parameter of the 'search.php' script before using it in database queries. Provided PHP's<br />

'register_globals' setting is enabled, an attacker may be able to exploit this issue to delete<br />

arbitrary data or launch attacks against the underlying database.<br />

Solution: Upgrade to version 1.2.9 or higher.<br />

CVE-2005-3518<br />

Lynx < 2.8.6 dev14 NNTP Headers Buffer Overflow<br />

<strong>PVS</strong> ID: 3261 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using Lynx as a web browser. This version of Lynx is vulnerable to a buffer overflow when<br />

processing malformed NNTP headers. An attacker exploiting this flaw would need to be<br />

able to convince the local Lynx user to browse a malicious NNTP server. Successful<br />

exploitation will result in the attacker running arbitrary code on the local system.<br />

Solution: Upgrade to version 2.8.6 dev14 or higher.<br />

CVE-2005-3120<br />

PHP < 5.0.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3262 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of PHP that is older than 5.0.5. This version has a number of bugs that<br />

allow attackers to execute or retrieve arbitrary files outside of the web root directory. An<br />

attacker exploiting these flaws would only need to send a malformed HTTP request to the<br />

vulnerable system. Successful exploitation would result in the loss of confidential data or a<br />

breach of system integrity.<br />

Solution: Upgrade to version 5.0.5 or higher.<br />

CVE Not available<br />

Xerver < 4.20 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3263 FAMILY: Web Servers NESSUS ID:20062<br />

Family Internet Services 839


RISK:<br />

MEDIUM<br />

Description: Synopsis :\n\nThe remote web server is affected by multiple flaws.\n\nThe remote host is<br />

running Xerver, an open-source FTP and web server written in Java. The installed version<br />

of Xerver on the remote host suffers from several vulnerabilities that can be used by an<br />

attacker to reveal the contents of directories as well as the source of scripts and HTML<br />

pages. In addition, it is prone to a generic cross-site scripting flaw.<br />

Solution: Upgrade to version 4.20 or higher.<br />

CVE-2005-4774<br />

Splatt Forums < 4.0 Unspecified Authentication Bypass<br />

<strong>PVS</strong> ID: 3264 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an flaw that allows attackers to execute<br />

arbitrary commands.\n\nThe remote host is running Splatt, an online forum. This version of<br />

Splatt is vulnerable to an authentication bypass flaw. An attacker exploiting this flaw would<br />

be able to execute administrative commands without authentication.<br />

Solution: Upgrade to version 4.0 or higher.<br />

CVE-2005-3282<br />

FlatNuke < 2.5.7 index.php Traversal File Inclusion<br />

<strong>PVS</strong> ID: 3265 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an flaw that allows attackers to execute<br />

arbitrary commands.\n\nThe remote host is running FlatNuke, an open-source content<br />

management system. The remote version of this software is prone to a file upload<br />

vulnerability. An attacker can specify any arbitrary 'include' file which will then be<br />

executed on the target FlatNuke system. Successful exploitation leads to the execution of<br />

arbitrary code.<br />

Solution: Upgrade to version 2.5.7 or higher.<br />

CVE-2005-4208<br />

Nuked Klan Multiple Modules SQL Injection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3266 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running Nuked Klan, a content management system. This version of Nuked Klan is<br />

vulnerable to a remote SQL Injection flaw. An attacker exploiting this flaw would be able<br />

to execute arbitrary commands on the remote database server.<br />

Family Internet Services 840


Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-3305<br />

PHP-Fusion < 6.00.205 HTML Injection<br />

<strong>PVS</strong> ID: 3267 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to several injection attacks.\n\nAccording to its<br />

version number, the remote host is running a version of PHP-Fusion that suffers from an<br />

HTML Injection flaw. An attacker exploiting these flaws would be able to inject code that<br />

would be executed either by the target web server or by unsuspecting users browsing the<br />

website. In addition, this version of PHP-Fusion may be vulnerable to a SQL injection<br />

attack. \n<br />

Solution: Upgrade to version 6.00.205 or higher.<br />

CVE-2005-4005<br />

Skype Technologies Multiple Buffer Overflows<br />

<strong>PVS</strong> ID: 3268 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using Skype, a peer-to-peer chat and VoIP software. The remote version of this software<br />

contains multiple flaws that would allow an attacker to overflow memory buffers and either<br />

cause the service to stop or execute arbitrary code.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-3265<br />

Flyspray Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3269 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running FlySpray, a bug-reporting web application. This version of Flyspray is<br />

vulnerable to a remote cross-site scripting (XSS) attack. An attacker exploiting this flaw<br />

would typically need to convince a user to browse to a malicious URI. Success exploitation<br />

would result in the theft of confidential materials (such as authentication cookies). In<br />

addition, the remote host is vulnerable to a remote file inclusion flaw. A remote attacker<br />

can supply PHP code and then trick the FlySpray server into executing the code.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

WindWeb <<br />

CVE-2005-3334<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 841


<strong>PVS</strong> ID: 3270 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:20097<br />

Description: Synopsis :\n\nThe remote web server is prone to denial of service attacks.\n\nThe remote<br />

host appears to be running the WindWeb web server, which is found on embedded devices<br />

running Wind River Systems' VxWorks such as certain ADSL modems and routers. The<br />

version of WindWeb installed on the remote host is affected by a remote denial of service<br />

vulnerability when it receives maliciously crafted requests. An attacker may be able to<br />

leverage this issue to deny access to the web server to legitimate users.<br />

Solution: No solution is known at this time.<br />

CVE-2005-3475<br />

Snitz Forum < 3.4.0.06 XSS<br />

<strong>PVS</strong> ID: 3271 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host appears to be running Snitz Forum, a web forum application implemented in<br />

ASP. It is reported that versions of Snitz Forum prior to 3.4.0.06 are prone to a Cross-Site<br />

Scripting (XSS) attack.<br />

Solution: Upgrade to version 3.4.0.06 or higher.<br />

CVE-2007-1374<br />

NTOP < 3.2 ntop.init Temporary File Symlink Arbitrary File Overwrite<br />

<strong>PVS</strong> ID: 3272 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a local flaw in the way that it creates<br />

temporary files.\n\nThe remote host is running NTOP, a tool for viewing network<br />

configuration, usage, statistics, protocols and much more via a web interface. This version<br />

of NTOP is reported ot be prone to a local exploit. Specifically, a local attacker can<br />

overwrite critical ntop temporary files, leading to an escalation of privileges.<br />

Solution: Upgrade to version 3.2 or higher.<br />

CVE-2005-3387<br />

PHP < 5.0.6 GLOBAL Variable Overwrite<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3273 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running a version of PHP that is older than 5.0.6. This<br />

version has a flaw where remote attackers can reenable the 'register_globals' parameter. In<br />

addition, a remote attacker may be able to overwrite the 'GLOBAL' variable. This may lead<br />

to another more serious exploitation. The remote host is running PHP version: \n %L<br />

Family Internet Services 842


Solution: Upgrade to version 5.0.6 or higher.<br />

CVE-2005-3391<br />

Mac OS X 10.4.3 Detection<br />

<strong>PVS</strong> ID: 3274 FAMILY: Operating System Detection RISK: NONE NESSUS ID:Not Available<br />

Description: The remote host is running Mac OS 10.4.3.<br />

Solution: N/A<br />

CVE Not available<br />

Mac OS X < 10.4.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3275 FAMILY: Operating System Detection RISK: LOW NESSUS ID:20113<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of Mac OS X 10.4 that is older than version 10.4.3. Mac OS X 10.4.3<br />

contains several security fixes for :\n\n- Finder\n- Software Update\n- memberd\n-<br />

KeyChain\n- Kernel<br />

Solution: Upgrade to version 10.4.3 or higher.<br />

CVE-2005-4504<br />

XMB Forum < 1.9.8 SP2 SQL Injection<br />

<strong>PVS</strong> ID: 3276 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running XMB Forum. There is flaw in the version this host is using which may allow an<br />

attacker to perform a SQL Injection attack. An attacker sending malformed queries can<br />

inject SQL commands that are executed on the database server. This can lead to the reading<br />

or writing of data and, in some cases, the attacker can execute arbitrary system commands.<br />

In addition, the remote version of XMB forum is vulnerable to HTML injection type<br />

attacks. An attacker exploiting this second flaw would be able to manipulate the application<br />

to execute arbitrary script code.<br />

Solution: Upgrade to XMB 1.9.8 SP2 or higher.<br />

CVE-2005-3689<br />

Serv-U FTP Server < 6.1.0.4 Malformed Packet Remote DoS<br />

<strong>PVS</strong> ID: 3277 FAMILY: FTP Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 843


Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running Serv-U FTP server. There is a bug in the way this version handles<br />

certain unspecified commands. While the details of the overflow are unknown, it is<br />

reported that successful exploitation leads to a Denial of Service (DoS) attack.<br />

Solution: Upgrade to version 6.1.0.4 or higher.<br />

Simple PHP Blog <<br />

CVE-2005-3467<br />

<strong>PVS</strong> ID: 3278 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running Simple PHP Blog, a blog written in PHP. The version of Simple PHP Blog<br />

installed on the remote host is vulnerable to a SQL Injection flaw. An attacker exploiting<br />

this flaw would send malformed PHP queries to the application. Successful exploitation<br />

would result in the attacker executing arbitrary commands on the backend database.<br />

Solution: No solution is known at this time.<br />

CuteNews <<br />

CVE-2005-3473<br />

<strong>PVS</strong> ID: 3279 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: According to its version number, the remote host is running a version of CuteNews that<br />

allows an attacker to upload or download files outside of the web root directory. This can<br />

lead to an attack against both confidentiality and integrity. An attacker exploiting this flaw<br />

would simply send a malformed request including a '../' in the request. Successful<br />

exploitation leads to writing or reading arbitrary files outside of the web root.<br />

Solution: Upgrade to a version of CuteNews higher than 1.4.1.<br />

CVE-2005-3507<br />

Quicktime < 7.0.3 (Windows) Detection<br />

<strong>PVS</strong> ID: 3280 FAMILY: Web Clients RISK: HIGH NESSUS ID:20136<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote Windows<br />

host is running a version of Quicktime 7 that is older than Quicktime 7.0.3. This version is<br />

vulnerable to various buffer overflows that may allow an attacker to execute arbitrary code<br />

on the remote host by sending a malformed file to a victim and have him open it using<br />

QuickTime player.<br />

Solution: Upgrade to version 7.0.3 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 844


CVE-2005-2755<br />

ClamAV < 0.87.1 Content-parsing Buffer Overflow<br />

<strong>PVS</strong> ID: 3281 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running ClamAV, an open-source antivirus solution for Unix-like systems. This version of<br />

ClamAV is reported vulnerable to a flaw where the parsing of a malicious file will cause<br />

the clamav process to execute arbitrary code. An attacker exploiting this flaw would only<br />

need to be able to craft and send a malformed email to a ClamAV server. Successful<br />

exploitation results in the server executing arbitrary code or crashing.<br />

Solution: Upgrade to version 0.87.1 or higher.<br />

CVE-2005-3501<br />

Acme thttpd < 2.24 CGI Test Script Symlink Arbitrary File Overwrite<br />

<strong>PVS</strong> ID: 3282 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a local flaw in the way that it creates<br />

temporary files.\n\nThe remote host is running a vulnerable version of Acme thttpd. It is<br />

reported that versions prior to 2.24 are prone to a local flaw where temporary files can be<br />

used by local users to escalate their privileges on the machine. Specifically, attackers can<br />

use the insecure temp files to overwrite critical web content or configuration files.<br />

Solution: Upgrade to version 2.24 or higher.<br />

CVE-2005-3124<br />

PHPList < 2.10.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3283 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running PHPList. PHPList is a PHP application that gathers handles mailing and<br />

customer lists. This version is reported to be prone to a SQL Injection flaw. An attacker<br />

exploiting this flaw would be able to read the database, manipulate the database, and<br />

possibly run commands with the privileges of the web server. The SQL injection attack<br />

vector requires administrative access. There is also a directory traversal flaw where an<br />

attacker can send a malformed HTTP query and retrieve files outside of the webroot<br />

directories. Finally, the remote application is vulnerable to multiple HTML injection and<br />

Cross-Site Scripting (XSS) flaws.<br />

Solution: Upgrade to version 2.10.3 or higher.<br />

CVE-2005-3557<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 845


Computer Associates Message Queuing Service Buffer Overflow<br />

<strong>PVS</strong> ID: 3284 FAMILY: Generic RISK: HIGH NESSUS ID:20173<br />

Description: Synopsis :\n\nArbitrary code can be executed on the remote host due to a flaw in the<br />

Message Queuing service.\n\nThe remote version of Computer Associates Message<br />

Queuing Service contains a stack overflow in the 'log_security' function that may allow an<br />

attacker to execute arbitrary code on the remote host. This version is also prone to :\n-<br />

Denial of Service on the TCP port 4105\n- arbitrary code execution through spoofed CAFT<br />

packets\nAn attacker does not need to be authenticated to exploit this flaw.<br />

Solution: Refer to http://supportconnectw.ca.com/public/ca_common_docs/camsecurity_notice.asp<br />

CVE-2005-2668<br />

Sylpheed < 2.0.4 Address Book LDIF Import Overflow<br />

<strong>PVS</strong> ID: 3285 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote client is<br />

running Sylpheed, an email client for Unix and Unix-like operating systems. This version is<br />

vulnerable to a buffer overflow via specially crafted email messages. An attacker exploiting<br />

this flaw would need to be able to convince a user to open a malicious email message and<br />

importing an attached LDIF file into their address book. Successful exploitation would lead<br />

to a Denial of Service or remote code execution.<br />

Solution: Upgrade to version 2.0.4 or higher.<br />

CVE-2005-3354<br />

RealPlayer for Windows Multiple Overflows (2)<br />

<strong>PVS</strong> ID: 3286 FAMILY: Web Clients RISK: HIGH NESSUS ID:20184<br />

Description: Synopsis :\n\nThe remote Windows application is affected by several overflow<br />

vulnerabilities.\n\nThe installed version of RealPlayer / RealOne Player / RealPlayer<br />

Enterprise for Windows on the remote host is prone to buffer overflow and heap overflow<br />

vulnerabilities. An attacker may be able to leverage these issues to execute arbitrary code<br />

on the remote host subject to the permissions of the user running the affected application.<br />

Note that a user doesn't necessarily need to explicitly access a malicious media file since<br />

the browser may automatically pass RealPlayer skin files (ie, files with the extension '.rjs')<br />

to the application.<br />

Solution: See http://service.real.com/help/faq/security/memory.html<br />

CVE-2005-2629<br />

Lynx < 2.8.6 dev15 Arbitary Code Execution<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3287 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 846


Description: Synopsis :\n\nThe remote host is vulnerable to an arbitrary 'command insertion'<br />

flaw.\n\nThe remote host is using Lynx as a web browser. This version of Lynx is<br />

vulnerable to a flaw where an attacker, convincing a Lynx user to browse a malicious URI,<br />

can execute arbitrary code on the remote system.<br />

Solution: Upgrade to version 2.8.6 dev15 or higher.<br />

CVE-2005-2929<br />

IPCop Web Interface Detection<br />

<strong>PVS</strong> ID: 3288 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running the IPCop web interface. This<br />

interface allows administrators to remotely access and configure the underlying firewall.<br />

Because compromise of a firewall can lead to much more serious attacks, care should be<br />

taken to harden the IPCop web interface. Critical information (such as firewall<br />

configuration, administrative login, etc.) should not be passed across the network<br />

unencrypted.<br />

Solution: Ensure that only valid users can query the IPCop interface. Require the use of SSL from<br />

remote users.<br />

CVE Not available<br />

PHPSysInfo < 2.4.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3289 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running PHPSysInfo, a PHP application that gives system information via a web<br />

interface. This version of PHPSysInfo is vulnerable to a multitude of flaws. These flaws<br />

include Cross-Site Scripting (XSS), HTML injection, and a local file inclusion flaw. There<br />

is also an inherent risk whenever system information is displayed via a web interface. Of<br />

these flaws, the more serious flaw is the local file inclusion vulnerability. An attacker<br />

exploiting this flaw would be able to retrieve and display potentially confidential files (such<br />

as /etc/passwd). This can lead to confidential materials being downloaded by anonymous<br />

users.<br />

Solution: Upgrade to version 2.4.0 or higher.<br />

CVE-2005-3347<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

phpWebThings download.php file Parameter SQL Injection<br />

<strong>PVS</strong> ID: 3290 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 847


Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running phpWebThings, a PHP web development framework. This version of<br />

phpWebThings is vulnerable to a SQL Injection flaw. An attacker exploiting this flaw<br />

would send a malformed query to the download.php script. Successful exploitation would<br />

allow the attacker to execute commands on the backend SQL database. This can lead to<br />

loss of confidential materials as well as compromise of the integrity of the SQL database<br />

server.<br />

Solution: No solution is known at this time.<br />

CVE-2005-3676<br />

Moodle < 1.5.3 Multiple Scripts SQL Injection<br />

<strong>PVS</strong> ID: 3291 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running Moodle, an open-source content-management system written in PHP. This<br />

version of Moodle is vulnerable to a SQL Injection flaw. An attacker exploiting this flaw<br />

would send a malformed request to one of the affected PHP scripts. Successful exploitation<br />

would result in the attacker executing arbitrary commands against the backend SQL server.<br />

This would lead to a loss of confidential material, possible loss of database integrity, and<br />

possible loss of availability.<br />

Solution: Upgrade to version 1.5.3 or higher.<br />

CVE-2005-3648<br />

Sony XCP-DRM Rootkit Detection<br />

<strong>PVS</strong> ID: 3292 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software that may be considered<br />

questionable.\n\nThe remote host is running the Sony XCP-DRM Rootkit. While not<br />

malicious in nature, the Sony software hides itself on the target host and monitors copying.<br />

Solution: Ensure that this software is compliant with corporate policies and procedures. While some<br />

third party vendors are offering a tool to remove the software, it is recommended that you<br />

contact the vendor for an uninstall tool.<br />

CVE Not available<br />

Xoops < 2.2.4 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3293 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

Xoops installed on the remote host is prone to several vulnerabilities. These include HTML<br />

Injection, SQL Injection, and Directory traversal flaws. An attacker exploiting these flaws<br />

would be able to retrieve confidential data from the remote server, execute arbitrary SQL<br />

commands on the remote database server, and execute malicious code within the browser<br />

Family Internet Services 848


of unsuspecting users.<br />

Solution: Upgrade to version 2.2.4 or higher.<br />

CVE-2005-3681<br />

Absinthe SQL Injection Tool Detection<br />

<strong>PVS</strong> ID: 3294 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running Absinthe. Absinthe is a tool that automates SQL Injection<br />

queries and makes a local copy of the remote database. Given a form or script that is<br />

vulnerable to SQL Injection, Absinthe will take care of all the brute-forcing necessary to<br />

build a local copy of the database. The script that Absinthe appears to be targeting is\n\n%L<br />

Solution: Ensure that this application is being used in conjunction with corporate policies and<br />

guidelines.<br />

CVE Not available<br />

Macromedia Flash < 2.0 Malformed RTMP Data DoS<br />

<strong>PVS</strong> ID: 3295 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running Macromedia Flash server, a multimedia server. This version of Flash<br />

is reported to be vulnerable to a flaw; however, the details of the flaw have not been<br />

released. It is rumoured that the flaw would lead to Denial of Service (DoS) attack.<br />

Solution: Upgrade to version 2.0 or higher.<br />

CVE-2005-3901<br />

iTunes For Windows < 6.0 Local Code Execution<br />

<strong>PVS</strong> ID: 3296 FAMILY: Web Clients RISK: HIGH NESSUS ID:20218<br />

Description: Synopsis :\n\nThe remote host contains an application that is affected by a local code<br />

execution flaw.\n\nAccording to its banner, the version of iTunes for Windows on the<br />

remote host launches a helper application by searching for it through various system paths.<br />

An attacker with local access can leverage this issue to place a malicious program in a<br />

system path and have it called before the helper application.<br />

Solution: Upgrade to version 6.0 or higher.<br />

CVE-2005-2938<br />

HTTPrint Scanning Software Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3297 FAMILY: Policy RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 849


Description: The remote host is running the HTTPrint scanning software. HTTPrint is used to enumerate<br />

and fingerprint HTTP servers. With any scanner software, there will always be the risk of<br />

interruption of services due to scanning. As HTTPrint uses some non-standard HTTP<br />

commands, it may cause some web servers to fail. Further, if the tool is used against a<br />

non-HTTP service, it can also cause availability issues.<br />

Solution: Ensure that this software is being used in accordance with corporate policies and<br />

guidelines.<br />

CVE Not available<br />

Acunetix Web Vulnerability Scanner Detection<br />

<strong>PVS</strong> ID: 3298 FAMILY: Policy RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Acunetix Vulnerability Scanner version: \n %L \n\nEnsure<br />

that the usage of this scanner is in accordance with corporate security policy.<br />

Solution: You should ensure that such a scanner is allowed by corporate policies and guidelines.<br />

CVE Not available<br />

WorldMail IMAP Server Directory Traversal Arbitrary Spool Access<br />

<strong>PVS</strong> ID: 3299 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:20224<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow and a directory traversal<br />

flaw.\n\nThe remote host is running Eudora WorldMail, a commercial email server for<br />

Windows. This version of Worldmail is vulnerable to a remote buffer overflow due to the<br />

way that it processes commands with multiple '}' characters. An attacker exploiting this<br />

flaw would be able to execute arbitrary code on the target machine. In addition, the IMAP<br />

server bundled with the version of WorldMail installed on the remote host fails to filter<br />

directory traversal sequences from mailbox names and fails to restrict access to mailboxes<br />

within its spool area. An authenticated attacker can exploit these issues to read and manage<br />

the messages of other users on the affected application as well as move arbitrary folders on<br />

the affected system. Such attacks could result in the disclosure of sensitive information as<br />

well as affect the stability of the remote host itself.<br />

Solution: No solution is known at this time.<br />

Winmail Server <<br />

CVE-2005-3189<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3300 FAMILY: POP Server RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of Magic Winmail Server that is vulnerable to multiple flaws. These<br />

flaws include a directory traversal flaw that would allow an attacker to access confidential<br />

data, a cross-site scripting (XSS) flaw and an HTML injection flaw.<br />

Family Internet Services 850


Solution: No solution is known at this time.<br />

CVE-2006-1250<br />

Jetty < 5.16.0 JSP Source Code Disclosure<br />

<strong>PVS</strong> ID: 3301 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server can disclose source code.\n\nThe remote host is<br />

running Jetty, a Java web server that can be downloaded off the Internet and is currently<br />

bundled with some IBM applications. This version of Jetty is vulnerable to a remote 'source<br />

code disclosure' flaw. An attacker exploiting this flaw would append a '%5C' to the end of a<br />

'.jsp' URI request. Successful exploitation would result in the attacker downloading source<br />

code.<br />

Solution: Upgrade to version 5.16.0 or higher.<br />

CVE-2005-3747<br />

MailEnable IMAP Service Remote DoS<br />

<strong>PVS</strong> ID: 3302 FAMILY: IMAP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running a version of MailEnable's IMAP service that is prone to a remote<br />

Denial of Service (DoS) attack. Specifically, an attacker requesting a nonexistent mailbox<br />

can crash the service. An attacker exploiting this flaw would need to be able to authenticate<br />

with some valid user account. Following successful authentication, the attacker would<br />

request a nonexistent mailbox. Successful exploitation leads to a loss of availability.<br />

Solution: Upgrade to MailEnable Professional 1.7.1 or higher or to MailEnable Enterprise Edition 1.2<br />

or higher.<br />

CVE-2006-0504<br />

WebCalendar < 1.0.2 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3303 FAMILY: CGI RISK: HIGH NESSUS ID:20250<br />

Description: The remote web server has a PHP application that is affected by multiple vulnerabilities.<br />

The remote version of WebCalendar does not validate input to the 'id' and 'format'<br />

parameters of the 'export_handler.php' script before using it to overwrite files on the remote<br />

host, subject to the privileges of the web server user ID. In addition, the 'activity_log.php',<br />

'admin_handler.php', 'edit_report_handler.php', 'edit_template.php' and 'export_handler.php'<br />

scripts are prone to SQL injection attacks and the 'layers_toggle.php' script is prone to<br />

HTTP response splitting attacks.<br />

Family Internet Services 851


Solution: Upgrade to version 1.0.2 or higher.<br />

CVE-2005-3982<br />

Gallery Unspecified Remote Vulnerabilities<br />

<strong>PVS</strong> ID: 3304 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML Injection attack.\n\nThe remote<br />

host is running the Gallery web-based photo album. This version of Gallery is vulnerable to<br />

an 'unspecified' flaw. While the exact details of the flaw are unknown, the vendor has<br />

released version 2.0.2 as a fix. In addition, this version of Gallery is supposedly vulnerable<br />

to an HTML injection flaw. An attacker exploiting this flaw would need to be able to<br />

convince a user to browse to a malicious URI. Successful exploitation could lead to the loss<br />

of potentially confidential data<br />

Solution: Upgrade to version 2.0.2 or 1.5.2 or higher.<br />

CVE-2006-0330<br />

Xaraya Directory Traversal Arbitrary File/Directory Manipulation<br />

<strong>PVS</strong> ID: 3305 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a directory traversal flaw.\n\nThe remote<br />

host is running Xaraya, a PHP Web application framework. This version of Xaraya is<br />

vulnerable to a directory traversal flaw. An attacker can request and receive a file that is<br />

outside of the web directories. Successful exploitation would give the attacker confidential<br />

data (such as the user password file or critical configuration files) that would be useful in<br />

other types of attacks.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-3929<br />

Symantec pcAnywhere Detection<br />

<strong>PVS</strong> ID: 3306 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running pcAnywhere, an application that allows remote users to connect<br />

to a Windows desktop and work remotely.<br />

Solution: Ensure that you are running the latest version of pcAnywhere.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

ZoneAlarm Personal Firewall < 6.1.737.000 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3307 FAMILY: Generic NESSUS ID:Not Available<br />

Family Internet Services 852


RISK:<br />

MEDIUM<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running ZoneAlarm, a personal firewall for the Windows platform. The<br />

client is running a version of ZoneAlarm that is less than 6.1.737.000. This version of<br />

ZoneAlarm is reported to be vulnerable to a number of flaws that can render the firewall<br />

unuseable or, in some instances, give the users a false sense of security.<br />

Solution: Upgrade to version 6.1.737.000 or higher.<br />

CVE Not available<br />

Mac OS X Multiple Vulnerabilities (<strong>Security</strong> Update 2005-009)<br />

<strong>PVS</strong> ID: 3308 FAMILY: Operating System Detection RISK: HIGH NESSUS ID:20249<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Apple Mac OS X, but lacks <strong>Security</strong> Update 2005-009. This security update<br />

contains fixes for the following applications :\n- Apache2\n- Apache_mod_ssl\n-<br />

CoreFoundation\n- curl\n- iodbcadmintool\n- OpenSSL\n- passwordserver\n- Safari\nsudo\n-<br />

syslog<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

Opera <<br />

CVE-2005-3704<br />

<strong>PVS</strong> ID: 3309 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is using a version of Opera that is vulnerable to a number of remote Denial of<br />

Service (DoS) attacks. An attacker exploiting these flaws would need to be able to convince<br />

a user to browse to a malicious URI. Successful exploitation would result in the browser<br />

crashing.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-3946<br />

SQL Injector SQL Injection Tool Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3310 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running SQL Injector. SQL Injector is a tool that automates SQL<br />

Injection queries and tests database applications. Given a form or script that is vulnerable to<br />

SQL Injection, SQL Injector will take care of all the brute-forcing necessary to exploit the<br />

remote database. The script that SQL Injector appears to be targeting is\n\n%L<br />

Family Internet Services 853


Solution: Ensure that this application is being used in conjunction with corporate policies and<br />

guidelines.<br />

CVE Not available<br />

Nokia Intellisync Web Portal Detection<br />

<strong>PVS</strong> ID: 3312 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nThe remote server is a Nokia Intellisync web portal. These portals are<br />

designed for access by users of portable devices (PDA, cell phone, etc.). A user can<br />

configure their POP/IMAP mail servers, accounts and more via this interface. Intellisync<br />

supports an option for forcing these communications over an encrypted (SSL) channel. This<br />

is the recommended configuration.<br />

Solution: Ensure that clients are forced into an SSL channel.<br />

CVE Not available<br />

Testing NAT-T RFC VPN Detection<br />

<strong>PVS</strong> ID: 3313 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Testing NAT-T RFC VPN server.<br />

Solution: N/A<br />

CVE Not available<br />

Windows 2000 VPN Detection<br />

<strong>PVS</strong> ID: 3314 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Windows 2000 VPN Server.<br />

Solution: N/A<br />

CVE Not available<br />

Windows 2003 VPN Detection<br />

<strong>PVS</strong> ID: 3315 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Windows 2003 VPN Server.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 854


Windows XP VPN Detection<br />

<strong>PVS</strong> ID: 3316 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Windows XP VPN Server.<br />

Solution: N/A<br />

CVE Not available<br />

Ipswitch IMail Format String and 'LIST' Command DoS<br />

<strong>PVS</strong> ID: 3317 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a format string flaw.\n\nThe remote host is<br />

running a version of the Ipswitch Collaboration Suite / Ipswitch IMail IMAP server that is<br />

prone to a format string flaw. An attacker exploiting this flaw would send a malformed<br />

string to the remote mail server. Successful exploitation would result in the attacker<br />

executing arbitrary code. The affected SMTP arguments are: EXPN, MAIL, MAIL FROM,<br />

and RCPT TO. In addition, the remote host is vulnerable to a flaw when processing very<br />

long 'LIST' commands. Successful exploitation results in the remote service crashing.<br />

Solution: Upgrade to version 8.22.0 of IMail or version 2.0.0.2 of the Ipswitch Collaboration Suite.<br />

Curl <<br />

CVE-2005-2923<br />

<strong>PVS</strong> ID: 3318 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using a version of curl (or libcurl) that is vulnerable to a remote buffer overflows. To<br />

exploit, an attacker would have to set up a rogue web server and entice a curl user into<br />

browsing to the malicious server. Upon successful exploitation, the attacker would be able<br />

to execute arbitrary commands with the rights of the web server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-1985<br />

PHPMyAdmin < 2.7.0 pl1 Global Variable Overwrite<br />

<strong>PVS</strong> ID: 3319 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw where attackers can overwrite critical<br />

variables.\n\nThe remote host is running phpMyAdmin, a web interface for administering<br />

MySQL database servers. This version of phpMyAdmin is vulnerable to a flaw that allows<br />

remote attackers to overwrite global variables. An attacker exploiting this flaw would only<br />

need to be able to send an HTTP query to the web server. Successful exploitation would<br />

result in critical variables being overwritten. This can lead to a partial loss of data integrity.<br />

Family Internet Services 855


Solution: Upgrade to version 2.7.0 pl1 or higher.<br />

CVE-2005-4079<br />

Apache James < 2.2.1 Spooler retrieve Function DoS<br />

<strong>PVS</strong> ID: 3320 FAMILY: POP Server<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running the Apache James software, a Java-based POP3, SMTP, and NNTP<br />

server. This version of JAMES is vulnerable to a flaw in the way that the spooler handles<br />

malformed messages. An attacker exploiting this flaw would need to be able to send<br />

multiple malformed emails to the server. Successful exploitation would result in the<br />

JAMES server depleting all system resources and eventually crashing.<br />

Solution: Upgrade to version 2.2.1 or higher.<br />

CVE-2004-2650<br />

Apache James < 2.2.1 Spooler retrieve Function DoS<br />

<strong>PVS</strong> ID: 3321 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running the Apache James software, a Java-based POP3, SMTP, and NNTP<br />

server. This version of JAMES is vulnerable to a flaw in the way that the spooler handles<br />

malformed messages. An attacker exploiting this flaw would need to be able to send<br />

multiple malformed emails to the server. Successful exploitation would result in the<br />

JAMES server depleting all system resources and eventually crashing.<br />

Solution: Upgrade to version 2.2.1 or higher.<br />

CVE-2004-2650<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Courier Mail Server < 0.52.2 Deactivated Account Authentication Bypass<br />

<strong>PVS</strong> ID: 3322 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may allow deactivated users to access their accounts using<br />

their old credentials.\n\nThe remote host is running Courier Mail Server, an open source<br />

mail server for Linux and Unix. The installed version of Courier is prone to a bug in the<br />

way that it handles deactivated accounts. Versions of Courier less than 0.52.2 will still<br />

allow deactivated accounts to be accessed and used. An attacker exploiting this flaw would<br />

need to have the deactivated credentials in order to exploit this flaw.<br />

Solution: Upgrade to Courier Mail Server 0.52.2 or higher.<br />

Family Internet Services 856


CVE-2005-3532<br />

Contenido < 4.6.4 class.inuse.php Multiple Parameter Remote File Inclusion<br />

<strong>PVS</strong> ID: 3323 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an flaw that allows attackers to execute<br />

arbitrary commands\n\nThe remote host is running Contenido, a web content-management<br />

application. This version of Contenido is vulnerable to an unspecified 'command execution'<br />

flaw. It is reported that an attacker can, by sending a malformed query, coerce the<br />

application into running system commands. This flaw can only be executed if the<br />

"allow_url_fopen" and "register_globals" PHP variables are enabled. Successful<br />

exploitation would result in loss of confidential data as well as a compromise of system<br />

integrity.<br />

Solution: Upgrade to version 4.6.4 or higher.<br />

Lyris List Manager <<br />

CVE-2005-4132<br />

<strong>PVS</strong> ID: 3324 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Lyris List Manager, a mailing list manager. This version of Lyris is vulnerable to<br />

multiple flaws. There is a flaw in the way that Lyris handles SQL queries that an attacker<br />

could use to execute arbitrary commands on the backend database. There is a flaw that<br />

would allow an attacker to execute arbitrary commands with the permissions of the web<br />

server. Finally, there are several flaws that would allow an attacker to access information<br />

that was not intended for public consumption. An attacker exploiting these flaws would<br />

likely be able to access confidential data and tarnish the integrity of both the web server<br />

and the database.<br />

Solution: Upgrade to a version higher than 8.8a.<br />

CVE-2005-4142<br />

Sights 'N Sounds Media Server <<br />

<strong>PVS</strong> ID: 3325 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Sights 'N Sounds, a media server that streams content to remote web clients. This<br />

version of Sights 'N Sounds is vulnerable to a remote buffer overflow. Specifically, when<br />

an attacker sends an overly long request such as 'GET /MediaListing.exe?', it causes the SWS.exe process to overwrite memory and either crash or<br />

execute arbitrary code.<br />

Solution: Upgrade to a version of higher than 2.0.3b.<br />

Family Internet Services 857


CVE-2005-4194<br />

Sights 'N Sounds Media Server Detection<br />

<strong>PVS</strong> ID: 3326 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Sights 'N Sounds, a media server that streams content to remote<br />

web clients.<br />

Solution: N/A<br />

CVE Not available<br />

Blackboard Academic Suite < 7.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3327 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Blackboard, a web-based academic software package that allows organizations<br />

to teach students remotely. This version of Blackboard is vulnerable to multiple flaws that<br />

allow remote attackers to bypass authentication, gain administrative access, and display<br />

untrusted domain content within a trusted frame (cross-domain content insertion). An<br />

attacker exploiting the 'cross-domain' flaw would need to be able to convince a user to<br />

browse to a malicious URI.<br />

Solution: Upgrade to version 7.0 or higher.<br />

CVE-2006-0511<br />

PHP Support Tickets < 2.1 index.php Multiple Field SQL Injection<br />

<strong>PVS</strong> ID: 3328 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running PHP Support Tickets, a PHP help-desk application. An attacker exploiting this<br />

flaw would only need to be able to send HTTP queries to the remote application.<br />

Successful exploitation would result in the attacker being able to execute arbitrary<br />

commands on the backend database server.<br />

Solution: Upgrade to version 2.1 or higher.<br />

CVE-2005-4264<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

SSH Tectia Server < 5.0.1 Host Authentication Authorization Bypass<br />

<strong>PVS</strong> ID: 3329 FAMILY: SSH RISK: HIGH NESSUS ID:20316<br />

Description: Synopsis :\n\nIt is possible to bypass the authentication of the remote SSH server.\n\nThe<br />

remote host is running the Tectia SSH Server. This version of Tectia is older than 5.0.1.<br />

Versions older than 5.0.1 are vulnerable to a flaw in which an attacker may bypass the<br />

Family Internet Services 858


authentication routine. However the SSH server must be configured to use Host-Based<br />

authentication only.<br />

Solution: Upgrade to version 5.0.1 or higher.<br />

CVE-2005-4310<br />

ColdFusion < 7.01 MX Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3330 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Macromedia ColdFusion, a web application server. This version of ColdFusion<br />

is vulnerable to a number of flaws. Some of the attacks are remote in nature; however, most<br />

of the attacks require local user access. Successful exploitation results in remote users<br />

bypassing security mechanisms or local users escalating their privileges (potentially to<br />

Administrator rights)<br />

Solution: Upgrade to ColdFusion 7.01 MX or higher.<br />

CVE-2005-4345<br />

Dropbear SSH Server < 0.47 svr_ses.childpidsize Remote Overflow<br />

<strong>PVS</strong> ID: 3331 FAMILY: SSH<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of the Dropbear SSH server that is vulnerable to a remote buffer<br />

overflow. An attacker exploiting this flaw would need to be able to log into a valid account.<br />

After logging in, the user would send a malformed request to the SSH server which would<br />

result in a buffer overflow and execution of arbitrary code.<br />

Solution: Upgrade to version 0.47 or higher .<br />

CVE-2005-4178<br />

Pegasus Email Client < 4.31 Multiple Remote Overflows<br />

<strong>PVS</strong> ID: 3332 FAMILY: SMTP Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to several remote buffer overflows.\n\nThe<br />

remote host is running the Pegasus Email client. This version of Pegasus is vulnerable to<br />

two (2) distinct remote buffer overflows. In the first instance, an attacker, convincing a<br />

Pegasus user to connect to a malicious server, can cause a buffer overflow resulting in<br />

execution of arbitrary code. In the second instance, an attacker would need to be able to<br />

convince a Pegasus user to view the email 'headers'. Successful exploitation would result in<br />

the execution of arbitrary code.<br />

Family Internet Services 859


Solution: Upgrade to version 4.31 or higher.<br />

CVE-2005-4445<br />

PhpGedView PGV_BASE_DIRECTORY Parameter Remote File Inclusion<br />

<strong>PVS</strong> ID: 3333 FAMILY: CGI RISK: HIGH NESSUS ID:20339<br />

Description: Synopsis :\n\nThe remote web server contains a PHP application that is prone to a remote<br />

file inclusion vulnerability.\n\nThe remote host appears to be running PhpGedView, a<br />

web-based genealogy program written in PHP. The version of PhpGedView installed on the<br />

remote host fails to sanitize user-supplied input to the 'PGV_BASE_DIRECTORY'<br />

parameter of the 'help_text_vars.php' script before using it in a PHP 'require' function.<br />

Provided PHP's 'register_globals' setting is enabled, an unauthenticated attacker may be<br />

able to exploit this flaw to read arbitrary files on the remote host and or run arbitrary code,<br />

possibly taken from third-party hosts, subject to the privileges of the web server user ID. In<br />

addition, the application reportedly fails to sanitize user input to the 'user_language',<br />

'user_email', and 'user_gedcomid' parameters of the 'login_register.php' script, which could<br />

be used by an attacker to inject arbitrary PHP code into a log file that can then be executed<br />

on the affected host, subject to the permissions of the web server user ID.<br />

Solution: Upgrade to version 3.3.7 or 4.0 beta 3 and apply the patch referenced in the vendor<br />

advisory above.<br />

CVE-2005-4468<br />

<strong>Network</strong> Block Device Server Detection<br />

<strong>PVS</strong> ID: 3334 FAMILY: Generic RISK: LOW NESSUS ID:20340<br />

Description: Synopsis :\n\nThe remote host is running a remote storage service.\n\nThe remote host is<br />

running a <strong>Network</strong> Block Device (NBD) server, which allows one Linux host to use<br />

another as one of its block devices.<br />

Solution: Ensure that you are running the latest version of NBD.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mantis < 0.19.5 Multiple Unspecified Vulnerabilities<br />

<strong>PVS</strong> ID: 3335 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack as well as other unspecified vulnerabilities.\n\nThe remote host appears to be<br />

running a vulnerable version of Mantis, a bug tracker web application written in PHP. It is<br />

reported that versions 0.19.3 and lower are vulnerable to a number of flaws. While the<br />

details of the flaws are unknown, it is believed that successful exploitation of the flaws<br />

would lead to an attacker uploading files or executing code on the remote database.<br />

Solution: Upgrade to version 0.19.5 (or 1.0.0 RC5) or higher.<br />

Family Internet Services 860


CVE-2006-0841<br />

MIMESweeper Detection<br />

<strong>PVS</strong> ID: 3336 FAMILY: CGI RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an antivirus server.\n\nThe remote host is running<br />

a 'MIMESweeper for Web' antivirus product.<br />

Solution: Ensure that you are running the latest version of MIMESweeper.<br />

CVE Not available<br />

Cerberus Help Desk < 2.7.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3337 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple injection-type attacks.\n\nThe<br />

remote host is running Cerberus, a web-based Help Desk. This version of Cerberus is<br />

vulnerable to multiple flaws. The more serious of these flaws involves SQL Injection. An<br />

attacker can send a malformed request that, when parsed, will execute arbitrary commands<br />

on the remote database server.<br />

Solution: Upgrade to version 2.7.0 or higher.<br />

CVE-2005-4427<br />

MyBulletinBoard < 1.01 function_upload.php SQL Injection<br />

<strong>PVS</strong> ID: 3338 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running MyBulletinBoard, a PHP-based bulletin board. The<br />

remote version of this software is prone to SQL injection attacks due to its failure to<br />

sanitize user-supplied input to various scripts before using it in database queries. This may<br />

allow an attacker to uncover sensitive information (such as password hashes), access the<br />

Admin Control Panel without authentication, modify existing data, and launch attacks<br />

against the underlying database.<br />

Solution: Upgrade to version 1.01 or higher.<br />

CVE-2005-4602<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Web Wiz Multiple Products check_user.asp txtUserName Parameter SQL Injection<br />

<strong>PVS</strong> ID: 3339 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running Web Wiz, a suite of products which offers services via HTTP. The installed<br />

version of Web Wiz is prone to a SQL Injection flaw. An attacker exploiting this flaw<br />

Family Internet Services 861


would send a malformed HTTP query to the application. Successful exploitation would<br />

result in the attacker being able to read or write confidential data. In addition, the attack<br />

may be able to execute arbitrary code on the remote database server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-4606<br />

IBM AIX WebSM Detection<br />

<strong>PVS</strong> ID: 3340 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote server is running a web-based system manager.\n\nThe remote<br />

host is running IBM's WebSM, a web-based system manager. An attacker browsing this<br />

page would be able to gain information regarding the underlying operating system. Further,<br />

web-based system managers allow a point of attack for attackers who wish to brute-force<br />

accounts and passwords. Also, the application is not configured to use encryption. A<br />

passive attacker with the means to capture local traffic can sniff system configuration<br />

information.<br />

Solution: Ensure that this application utilizes both strong encryption as well as authentication.<br />

CVE Not available<br />

IBM AIX WebSM getCommand.new Local Traversal Vulnerability<br />

<strong>PVS</strong> ID: 3341 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a local 'directory traversal' flaw.\n\nThe<br />

remote host is running the IBM AIX WebSM, a web-based system manager. This version<br />

of WebSM is vulnerable to a flaw where local users can gain access to potentially<br />

confidential data by passing a malformed query to the getCommand.new utility.<br />

Specifically, a request for a file like '../../../../' will retrieve the file as if the<br />

system manager had requested it.<br />

Solution: No solution is known at this time.<br />

CVE-2006-0133<br />

Gmail File System Detection<br />

<strong>PVS</strong> ID: 3342 FAMILY: Policy<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote client is using the Gmail File System (GmailFS), an<br />

application that allows users to use their Google email account as a virtual drive. Users can<br />

treat the GmailFS as if it were an additional drive within their computer. They can<br />

drag-and-drop files into the drive. There is an inherent risk with 1) storing data on a public<br />

mail server 2) passing data to/from the public mail server in plaintext and 3) allowing<br />

Family Internet Services 862


anonymous users to possibly inject files into the virtual filesystem.<br />

Solution: Ensure that corporate policies and guidelines allow users to store data on public Internet<br />

servers.<br />

CVE Not available<br />

Sophos Control Center Detection<br />

<strong>PVS</strong> ID: 3343 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Sophos Control Center. Sophos is an antivirus software and<br />

the Control Center allows the central management of multiple Sophos clients.<br />

Solution: Ensure that you are running the latest version of Sophos Control Center.<br />

CVE Not available<br />

WinProxy < 6.1a Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3344 FAMILY: FTP Servers RISK: HIGH NESSUS ID:20393<br />

Description: Synopsis :\n\nThe remote proxy is affected by multiple vulnerabilities.\n\nThe remote host<br />

is running WinProxy, a proxy server for Windows. This version of WinProxy suffers from<br />

denial of service and buffer overflow vulnerabilities in its telnet and web proxy servers. An<br />

attacker may be able to exploit these issues to crash the proxy or even execute arbitrary<br />

code on the affected host.<br />

Solution: Upgrade to version 6.1a or higher.<br />

CVE-2005-3654<br />

HylaFAX < 4.2.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3345 FAMILY: Generic RISK: HIGH NESSUS ID:20387<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running HylaFAX, a fax transmission software. It is reported that HylaFAX is prone to a<br />

number of flaws that would allow a remote attacker to execute arbitrary commands with the<br />

permission of the process running HylaFAX. In addition, the application is vulnerable to a<br />

flaw that would allow remote attackers to bypass authentication, giving them administrative<br />

access without the proper credentials. An attacker exploiting either of these flaws will be<br />

able to gain control of the remote HylaFAX server.<br />

Solution: Upgrade to version 4.2.4 or higher.<br />

TFTP Client Detection<br />

CVE-2005-3538<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3346 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 863


Description: The remote host is running a TFTP client.<br />

Solution: N/A<br />

CVE Not available<br />

Broadlogic XLT Router Default Password<br />

<strong>PVS</strong> ID: 3347 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Broadlogic XLT router server with the default<br />

login and password set ('webadmin'/'webadmin').\nThe affected web application is:\n%P<br />

Solution: Do not use default passwords for this device.<br />

CVE Not available<br />

'admin/1234' Default Password<br />

<strong>PVS</strong> ID: 3348 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a web server with the default login and password<br />

set to 'admin/1234'.\nThe affected web application is:\n%P<br />

Solution: Do not use default passwords.<br />

CVE Not available<br />

Apache < 2.0.3 mod_auth_pgsql Module Server Log Format String<br />

<strong>PVS</strong> ID: 3358 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote 'format string' flaw.\n\nThe remote<br />

host is running the Apache mod_auth_pgsql module, a module for authenticating remote<br />

users against a PostgreSQL database. This version of mod_auth_pgsql is vulnerable to<br />

multiple format string flaws. An attacker exploiting these flaws would be able to execute<br />

arbitrary code on the remote web server.<br />

Solution: Upgrade to version 2.0.3 or higher.<br />

CVE-2005-3656<br />

SocketScanner Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3359 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 864


Description: The remote host is running SocketScanner, a security tool that inspects and blocks<br />

malicious traffic. SocketScanner is often run in conjunction with WormRadar. WormRadar<br />

is a tool that monitors worm activity and sends the information to the wormradar.com<br />

servers.<br />

Solution: Ensure that you are running the latest version of SocketScanner.<br />

CVE Not available<br />

Apache < 1.6.1 auth_ldap Module Remote Format String<br />

<strong>PVS</strong> ID: 3360 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote 'format string' flaw.\n\nThe remote<br />

host is running the Apache auth_ldap module, a module for authenticating remote users<br />

against an LDAP server. This version of auth_ldap is vulnerable to a format string flaw. An<br />

attacker exploiting this flaw would be able to execute arbitrary code on the remote web<br />

server.<br />

Solution: Upgrade to version 1.6.1 or higher.<br />

CVE-2006-0150<br />

Eudora Internet Mail Server < 3.2.8 NTLM Authentication Request DoS<br />

<strong>PVS</strong> ID: 3361 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running Eudora Internet Mail Server (EIMS), an SMTP server for Mac OS.<br />

The installed version of EIMS is vulnerable to a remote Denial of Service (DoS). An<br />

attacker exploiting this flaw would be able to cause the remote mail server to crash,<br />

impacting the availability of the service to valid users.<br />

Solution: Upgrade to version 3.2.8 or higher.<br />

CVE-2006-0141<br />

ClamAV < 0.88.0 UPX File Processing Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3362 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a heap overflow.\n\nThe remote host is<br />

running ClamAV, an open-source antivirus solution for Unix and Windows systems. This<br />

version of ClamAV is reported to be vulnerable to a flaw where the parsing of a malicious<br />

file will cause the clamav process to execute arbitrary code. While the details of the attack<br />

are currently unknown, it is rumoured that an attacker exploiting this flaw would only need<br />

to be able to craft and send a malformed email to a ClamAV server. Successful exploitation<br />

results in the server executing arbitrary code or crashing.<br />

Family Internet Services 865


Solution: Upgrade to version 0.88.0 or higher.<br />

CVE-2006-0162<br />

PostgreSQL postmaster Connection Saturation DoS<br />

<strong>PVS</strong> ID: 3363 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running PostgreSQL, an open source relational database. This version is<br />

vulnerable to a Denial of Service (DoS) flaw. Specifically, an attacker initiating multiple<br />

connections to the 'postmaster' service may be able to cause the service to fail. This can<br />

lead to a loss of availability.<br />

Solution: Upgrade to version 8.0.6, 8.1.2 or higher.<br />

CVE-2006-0105<br />

Quicktime < 7.0.4 (Windows) Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3364 FAMILY: Web Clients RISK: HIGH NESSUS ID:20395<br />

Description: Synopsis :\n\nThe remote version of QuickTime is affected by multiple code execution<br />

vulnerabilities.\n\nThe remote version of Quicktime is vulnerable to various buffer<br />

overflows involving specially crafted images and media files. An attacker may be able to<br />

leverage these issues to execute arbitrary code on the remote host by sending a malformed<br />

file to a victim and having him/her open it using QuickTime player.<br />

Solution: Upgrade to version 7.0.4 or higher.<br />

CVE-2005-4092<br />

Microsoft Outlook / Exchange TNEF Decoding Arbitrary Code Execution<br />

<strong>PVS</strong> ID: 3365 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:20390<br />

Description: Arbitrary code can be executed on the remote host through the email client or the email<br />

server. The remote host is running a version of Outlook that is vulnerable to a bug in the<br />

Transport Neutral Encapsulation Format (TNEF) MIME attachment handling routine that<br />

may allow an attacker execute arbitrary code on the remote host by sending a specially<br />

crafted email.<br />

Solution: Microsoft has released a set of patches for Office 2000, 2002, XP, and 2003.<br />

CVE-2006-0002<br />

Microsoft Outlook Email Client Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3366 FAMILY: SMTP Clients RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 866


Description: The remote host is running the Microsoft Outlook email client, version: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

BEA WebLogic < 8.1.0 SP6 MBeanHome Config Information Disclosure<br />

<strong>PVS</strong> ID: 3367 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files.\n\nThe remote host is running a version of BEA WebLogic Server or<br />

WebLogic Express that is prone to a flaw in the way that it handles anonymous RMI<br />

connections. An attacker exploiting this flaw would be able to retrieve sensitive<br />

configuration files anonymously. Such information would undoubtedly aid the attacker in<br />

more sophisticated attacks.<br />

Solution: Upgrade to version 8.1.0 SP6 or higher.<br />

CVE-2003-1290<br />

PHP < 5.1.2 mysqli Error Message Format String<br />

<strong>PVS</strong> ID: 3368 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote 'format string' flaw.\n\nThe remote<br />

host is running a version of PHP that is older than 5.1.2. Versions 5.1.0 and 5.1.1 are<br />

potentially vulnerable to a remote format string vulnerabilty. Specifically, if PHP is<br />

configured to log MySQL errors, then an attacker may be able to trigger a condition<br />

wherein arbitrary commands or code are executed.<br />

Solution: Upgrade to version 5.1.2 or higher.<br />

CVE-2006-0200<br />

Nokia Intellisync Portable Device Detection<br />

<strong>PVS</strong> ID: 3374 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is a portable device (PDA, laptop, cell phone, etc.) that is managed by a<br />

Nokia Intellisync server.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Client Detection (PORT)<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3375 FAMILY: FTP Clients RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 867


Description: The remote host is running an FTP client.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Client Detection (PASV)<br />

<strong>PVS</strong> ID: 3376 FAMILY: FTP Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running an FTP client.<br />

Solution: N/A<br />

FTP Client Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 3377 FAMILY: FTP Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running an FTP client.<br />

Solution: N/A<br />

WinComet Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 3378 FAMILY: Peer-To-Peer File Sharing RISK: LOW NESSUS ID:Not Available<br />

Description: The remote client was observed signing into a 'Torrent' P2P network. This sort of network<br />

allows users to upload and download files.<br />

Solution: Ensure that such activity is authorized with respect to corporate guidelines and policies.<br />

CVE Not available<br />

ELOG < 2.6.2 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3379 FAMILY: CGI RISK: HIGH NESSUS ID:20750<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

appears to be using ELOG, a web-based electronic logbook application. The version of<br />

ELOG installed on the remote host fails to filter directory traversal strings before<br />

processing GET requests. An attacker can exploit this issue to retrieve the contents of<br />

arbitrary files from the remote host, subject to the privileges under which ELOG runs. In<br />

addition, the application is reportedly affected by a format string vulnerability in the<br />

'write_logfile'. Provided logging is enabled, an attacker may be able to exploit this via the<br />

'uname' parameter of the login form to crash the application or execute arbitrary code<br />

remotely.<br />

Family Internet Services 868


Solution: Upgrade to version 2.6.2 or higher.<br />

CVE-2006-0599<br />

Lysator LSH Seed-file File Descriptor Leak<br />

<strong>PVS</strong> ID: 3380 FAMILY: SSH RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Lysator's LSH, a version of Secure Shell (SSH) that is available for Unix-like<br />

platforms. This version of LSH is reported to be vulnerable to a local flaw. Specifically,<br />

this version of LSH leaks its file descriptors. A local attacker armed with this knowledge<br />

may be able to access confidential data or cause the LSH server to fail.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-0353<br />

Microsoft CryptoAPI Version Check<br />

<strong>PVS</strong> ID: 3381 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Microsoft CryptoAPI, version %L<br />

Solution: N/A<br />

CVE Not available<br />

Cisco VPN Concentrator 3000 < 4.7.3 Crafted HTTP Packet DoS<br />

<strong>PVS</strong> ID: 3382 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running the Cisco VPN Concentrator 3000 product. This version of the VPN<br />

Concentrator is vulnerable to a remote Denial of Service (DoS) attack. Specifically, an<br />

attacker with access to the HTTP port(s) can send a malformed query that, upon parsing,<br />

would cause the Concentrator to fail. Successful exploitation would result in a denial of<br />

service to valid users.<br />

Solution: Upgrade to version 4.7.3 or higher.<br />

CVE-2006-0483<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mercury Mail Transport System < 4.01b ph Service Buffer Overflow<br />

<strong>PVS</strong> ID: 3383 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:20812<br />

Description: Synopsis :\n\nThe remote ph service is affected by a buffer overflow vulnerability.\n\nThe<br />

remote host is running the Mercury Mail Transport System, a free suite of server products<br />

for Windows and NetWare associated with Pegasus Mail. The remote installation of<br />

Mercury includes a ph server that is vulnerable to buffer overflow attacks. By leveraging<br />

Family Internet Services 869


this issue, an unauthenticated remote attacker is able to crash the remote service and<br />

possibly execute arbitrary code remotely.<br />

Solution: Upgrade to version 4.01b or higher.<br />

CVE-2005-4411<br />

Mercury PH Server Detection<br />

<strong>PVS</strong> ID: 3384 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Mercury PH Server, version %L<br />

Solution: Ensure that you are running the latest version of Mercury PH Server.<br />

CVE Not available<br />

Shareaza P2P Fileshare Client Integer Overflow<br />

<strong>PVS</strong> ID: 3385 FAMILY: Peer-To-Peer File Sharing RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote overflow.\n\nThe remote host is<br />

using Shareaza, a peer-to-peer (P2P) fileshare client. This version of Shareaza is vulnerable<br />

to a flaw in the way that it handles integer values. An attacker exploiting this flaw would<br />

send a malformed query to the Shareaza client. Successful exploitation would result in the<br />

attacker executing arbitrary code on the target system.<br />

Solution: Upgrade to a version of Shareaza greater than 2.2.1.0.<br />

TiVo Detection<br />

CVE-2006-0474<br />

<strong>PVS</strong> ID: 3386 FAMILY: Web Servers RISK: INFO NESSUS ID:20813<br />

Description: Synopsis :\n\nThe remote host is a personal video recorder (PVR).\n\nThe remote host is a<br />

TiVo, a personal video recorder. The version as advertised by port banners is:\n\n%L<br />

Solution: Ensure that the use of such devices is authorized by corporate security policy.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Communigate Pro < 5.0.7 LDAP Module BER Decoding DoS<br />

<strong>PVS</strong> ID: 3387 FAMILY: Web Servers RISK: HIGH NESSUS ID:20827<br />

Description: Synopsis :\n\nThe remote application is prone to denial of service attacks.\n\nThe remote<br />

host appears to be running CommuniGate Pro, a commercial email and groupware<br />

application. The version of CommuniGate Pro installed on the remote host includes an<br />

LDAP server that reportedly fails to handle requests with negative BER lengths. A user can<br />

leverage this issue to crash not just the LDAP server but also the entire application on the<br />

Family Internet Services 870


emote host.<br />

Solution: Upgrade to version 5.0.7 or higher.<br />

CVE-2006-0468<br />

Ximian Evolution < 2.3.8 Inline XML Content-parsing Overflow<br />

<strong>PVS</strong> ID: 3388 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of the Ximian Evolution email client that does not properly parse<br />

user-supplied data. Specifically, this version of Evolution is reported to be vulnerable to a<br />

flaw in the way that it handles inline XML attachments. A remote attacker can craft an<br />

email message such that, upon opening, Evolution crashes or executes arbitrary code.<br />

Solution: Upgrade to version 2.3.8 or higher.<br />

HTTP Proxy Detection<br />

CVE-2006-0040<br />

<strong>PVS</strong> ID: 3389 FAMILY: Web Servers RISK: NONE NESSUS ID:Not Available<br />

Description: The remote host is a proxy server. <strong>PVS</strong> has determined this due to the format of the HTTP<br />

request. <strong>PVS</strong> observed a client issuing this request: \n%P\n\nThe server replied with: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Winamp < 5.13 Malformed Playlist File Handling Overflow<br />

<strong>PVS</strong> ID: 3390 FAMILY: Generic RISK: HIGH NESSUS ID:20826<br />

Description: Synopsis :\n\nA multimedia application that is affected by a buffer overflow vulnerability<br />

is installed on the remote Windows host.\n\nThe remote host is using Winamp, a popular<br />

media player for Windows. It's possible that a remote attacker using a specially-crafted<br />

playlist can cause a buffer overflow in the version of Winamp installed on the remote host<br />

resulting in a crash of the application or even execution of arbitrary code remotely subject<br />

to the user's privileges. This flaw can reportedly be exploited without user interaction by<br />

linking to a '.pls' file in an IFRAME tag.<br />

Solution: Upgrade to version 5.13 or higher.<br />

PmWiki <<br />

CVE-2005-3188<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3391 FAMILY: CGI NESSUS ID:Not Available<br />

Family Internet Services 871


RISK:<br />

MEDIUM<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running PmWiki, an open-source Wiki. This version of PmWiki is vulnerable to several<br />

flaws. An attacker exploiting these flaws would be able to upload and run arbitrary PHP<br />

code as well as possibly execute code within an unsuspecting user's browser.<br />

Solution: Upgrade to version 2.1 Beta21 or higher.<br />

CVE-2006-0479<br />

PostgreSQL Database Detection<br />

<strong>PVS</strong> ID: 3392 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a PostgreSQL database.<br />

Solution: N/A<br />

CVE Not available<br />

Microsoft SQL Server Database Detection<br />

<strong>PVS</strong> ID: 3393 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Microsoft SQL Server.<br />

Solution: N/A<br />

CVE Not available<br />

MySQL Database Detection<br />

<strong>PVS</strong> ID: 3394 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a MySQL database.<br />

Solution: N/A<br />

CVE Not available<br />

Oracle Database Detection<br />

<strong>PVS</strong> ID: 3395 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running an Oracle database.<br />

Solution: N/A<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 872


VMWare Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 3396 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nThe remote host is running VMWare, an application that allows users to run<br />

multiple operating systems virtually. VMWare passes the license key in plaintext across the<br />

Internet. An attacker sniffing the network will be able to gain access to the VMWare<br />

key:\n\n%L<br />

Solution: Disable automatic updates and only use encrypted sessions to update VMWare software.<br />

CVE Not available<br />

Invision Power Board Dragoran Forum < 1.4 index.php site Parameter SQL Injection<br />

<strong>PVS</strong> ID: 3397 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running the Dragoran Forum, a PHP-based web portal. This version of Dragoran is<br />

vulnerable to a SQL Injection flaw. An attacker exploiting this flaw would be able to<br />

execute arbitrary SQL commands on the Dragoran backend database server.<br />

Solution: Upgrade to version 1.4 or higher.<br />

CVE-2006-0520<br />

Oracle Database Detection<br />

<strong>PVS</strong> ID: 3398 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running an Oracle database.<br />

Solution: N/A<br />

CVE Not available<br />

Nmap Scanner Detection<br />

<strong>PVS</strong> ID: 3399 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Nmap port scanner.<br />

Solution: Ensure that this tool is authorized according to corporate policies and guidelines.<br />

CVE Not available<br />

Nmap Scanner Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 873


<strong>PVS</strong> ID: 3400 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Nmap port scanner.<br />

Solution: Ensure that this tool is authorized according to corporate policies and guidelines.<br />

CVE Not available<br />

Nmap Scanner Detection<br />

<strong>PVS</strong> ID: 3401 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Nmap port scanner.<br />

Solution: Ensure that this tool is authorized according to corporate policies and guidelines.<br />

CVE Not available<br />

Nmap Scanner Detection<br />

<strong>PVS</strong> ID: 3402 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Nmap port scanner.<br />

Solution: Ensure that this tool is authorized according to corporate policies and guidelines.<br />

CVE Not available<br />

uTorrent Client Detection<br />

<strong>PVS</strong> ID: 3403 FAMILY: Peer-To-Peer File Sharing RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the uTorrent P2P BitTorrent client. This client is used for<br />

downloading files from a Peer-To-Peer File Sharing network. The version number is: \n<br />

%L<br />

Solution: Ensure that P2P clients are authorized on this network.<br />

CVE Not available<br />

uTorrent Server Detection<br />

<strong>PVS</strong> ID: 3404 FAMILY: Peer-To-Peer File Sharing RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the uTorrent P2P BitTorrent server. This server is used to store<br />

and upload files to Peer-To-Peer File Sharing clients.<br />

Solution: Ensure that P2P servers are authorized on this network.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 874


Mozilla Firefox < 1.5.0.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3405 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running an older version of the Firefox browser. The installed version of Firefox is<br />

reported to be prone to a cross-domain scripting flaw. An attacker exploiting this flaw<br />

would need to be able to convince a user to browse to a malicious URI. Successful<br />

exploitation would result in the attacker executing malicious script code within the Firefox<br />

browser. In addition, the remote browser is vulnerable to a memory corruption and<br />

authentication bypass flaw. An attacker exploiting these flaws would be able to execute<br />

arbitrary code on the remote browser or gain access to critical functions.<br />

Solution: Upgrade to version 1.5.0.1 or higher.<br />

CVE-2006-0496<br />

Computer Associates Message Queuing DoS<br />

<strong>PVS</strong> ID: 3406 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote version of Computer Associates Message Queuing Service contains a flaw when<br />

handling specially crafted packets destined for port 4105. An attacker exploiting these<br />

flaws would be able to render the service unavailable.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-0529<br />

L2TP VPN Client Detection<br />

<strong>PVS</strong> ID: 3407 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running a L2TP VPN client.<br />

Solution: Ensure that this software is authorized and configured correctly.<br />

CVE Not available<br />

L2TP VPN Server Detection<br />

<strong>PVS</strong> ID: 3408 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running a L2TP VPN server.<br />

Solution: Ensure that this software is authorized and configured correctly.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 875


DidTheyReadIt Email Tracker (Client) Detection<br />

<strong>PVS</strong> ID: 3409 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nThe remote host has opened an email that is being tracked by DidTheyReadIt.<br />

This software embeds a tiny HTML link within an email such that when the user opens or<br />

highlights the email, a connection is made to an Internet server that tells the email sender<br />

when the email was opened, the operating system of the recipient, the email client of the<br />

recipient, the geographic location of the recipient, and more.<br />

Solution: Use anti-spam software to block 'phone home' applications or disable HTML within the<br />

email reader.<br />

CVE Not available<br />

ReadNotify Email Tracker (Client) Detection<br />

<strong>PVS</strong> ID: 3410 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nThe remote host has opened an email that is being tracked by ReadNotify. This<br />

software embeds a tiny HTML link within an email such that when the user opens or<br />

highlights the email, a connection is made to an Internet server that tells the email sender<br />

when the email was opened, the operating system of the recipient, the email client of the<br />

recipient, the geographic location of the recipient, and more.<br />

Solution: Use anti-spam software to block 'phone home' applications or disable HTML within the<br />

email reader.<br />

CVE Not available<br />

PointOfMail Email Tracker (Client) Detection<br />

<strong>PVS</strong> ID: 3411 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nThe remote host has opened an email that is being tracked by PointofMail. This<br />

software embeds a tiny HTML link within an email such that when the user opens or<br />

highlights the email, a connection is made to an Internet server that tells the email sender<br />

when the email was opened, the operating system of the recipient, the email client of the<br />

recipient, the geographic location of the recipient, and more.<br />

Solution: Use anti-spam software to block 'phone home' applications or disable HTML within the<br />

email reader.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 876


DidTheyReadIt Email Tracker Application Detection<br />

<strong>PVS</strong> ID: 3412 FAMILY: SMTP Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is using DidTheyReadIt to track when and where emails are read. This<br />

technology embeds a tiny link within an email. When the recipient opens the email, the link<br />

is retrieved from a xpostmail.com server and the original sender is notified when the image<br />

was read as well as the IP address of the recipient. This is done without the knowledge of<br />

the recipient.<br />

Solution: Ensure that such activity is allowed according to corporate policies and guidelines.<br />

CVE Not available<br />

pointofmail Email Tracker Application Detection<br />

<strong>PVS</strong> ID: 3413 FAMILY: SMTP Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is using pointofmail to track when and where emails are read. This<br />

technology embeds a tiny link within an email. When the recipient opens the email, the link<br />

is retrieved from a pointofmail server and the original sender is notified when the image<br />

was read as well as the IP address of the recipient. This is done without the knowledge of<br />

the recipient.<br />

Solution: Ensure that such activity is allowed by corporate policies and guidelines.<br />

CVE Not available<br />

ReadNotify Email Tracker Application Detection<br />

<strong>PVS</strong> ID: 3414 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is using ReadNotify to track when and where emails are read. This<br />

technology embeds a tiny link within an email. When the recipient opens the email, the link<br />

is retrieved from a ReadNotify server and the original sender is notified when the email was<br />

read as well as the IP address of the recipient. This is done without the knowledge of the<br />

recipient. In the case of ReadNotify, the recipient is presented with a dialogue asking if<br />

they would like to send the sender a notification that they have received the email. Even if<br />

the user clicks 'No' or 'Cancel', the sender is still notified, regardless of the recipients<br />

wishes.<br />

Solution: Ensure that such activity is allowed by corporate policies and guidelines.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Communigate Pro < 5.0.8 LDAP Module BER Decoding DoS<br />

<strong>PVS</strong> ID: 3415 FAMILY: Web Servers RISK: HIGH NESSUS ID:20827<br />

Family Internet Services 877


Description: Synopsis :\n\nThe remote application is prone to a denial of service (DoS) attack.\n\nThe<br />

remote host appears to be running CommuniGate Pro, a commercial email and groupware<br />

application. The version of CommuniGate Pro installed on the remote host includes an<br />

LDAP server that reportedly fails to handle malformed LDAP requests. A user can leverage<br />

this issue to crash not just the LDAP server but also the entire application on the remote<br />

host.<br />

Solution: Upgrade to version 5.0.8 or higher.<br />

CVE-2006-0468<br />

Lotus Domino Server < 7.0.1 LDAP Component Unspecified DoS<br />

<strong>PVS</strong> ID: 3416 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running a version of Lotus Domino Server that is prone to a Denial of<br />

Service (DoS) attack. While the details are unknown, it is alleged that a malformed LDAP<br />

query will cause the server to become unresponsive. This can lead to a loss of availability.<br />

Solution: Upgrade to version 7.0.1 or higher.<br />

CVE-2005-2712<br />

MyBulletinBoard < 1.04 SQL Injection<br />

<strong>PVS</strong> ID: 3417 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running MyBulletinBoard, a PHP-based bulletin board. The<br />

remote version of this software is prone to SQL injection attacks due to its failure to<br />

sanitize user-supplied input to various scripts before using it in database queries. This may<br />

allow an attacker to uncover sensitive information such as password hashes, access the<br />

Admin Control Panel without authentication, modify existing data, and launch attacks<br />

against the underlying database.<br />

Solution: Upgrade to version 1.04 or higher.<br />

CVE-2006-0638<br />

McAfee Client Detection (SPIPE)<br />

<strong>PVS</strong> ID: 3418 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is running McAfee security software and is centrally managed by ePolicy<br />

Orchestrator.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 878


McAfee ePolicy Orchestrator Server Detection<br />

<strong>PVS</strong> ID: 3419 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is running McAfee ePolicy Orchestrator. This software is used to<br />

centrally manage multiple remote McAfee clients. The remote server is version: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

McAfee Client Detection (UPDATE)<br />

<strong>PVS</strong> ID: 3420 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is running McAfee security software.<br />

Solution: N/A<br />

IKE Server Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 3421 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a VPN server. VPN servers are used to connect remote hosts to internal<br />

resources. You should ensure that this VPN server is authorized for your company's<br />

computing environment and that the VPN utilizes strong encryption and strong<br />

authentication.<br />

Solution: Contact your VPN vendor to ensure that you are operating at a security level commensurate<br />

with the assets being protected.<br />

CVE Not available<br />

Lotus Notes < 6.5.5 or 7.0.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3422 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a Lotus Notes email client. Lotus Notes client versions 6.5.4 and 7.0.0 (and earlier)<br />

could allow a remote attacker to execute arbitrary code. Specifically, several of the routines<br />

that handle the uncompression of archived files do not properly handle malformed files. An<br />

attacker exploiting this flaw would need to be able to entice a Lotus Notes user into<br />

opening an archived file.<br />

Solution: Upgrade to version 6.5.5, 7.0.1 or higher.<br />

CVE-2006-0663<br />

RunCMS < 1.3a3 Arbitrary File Upload<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 879


<strong>PVS</strong> ID: 3423 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a file upload flaw.\n\nThe remote host is<br />

running RunCMS, a web-based messaging system. This version of RunCMS is vulnerable<br />

to a remote file upload flaw. Specifically, an attacker can create a malicious .php3 or .php5<br />

script and upload it to the RunCMS server. The attacker can then invoke the script, causing<br />

arbitrary code to be run on the RunCMS system.<br />

Solution: Upgrade to version 1.3a3 or higher, when available.<br />

Powerd Detection<br />

CVE-2006-1793<br />

<strong>PVS</strong> ID: 3424 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is using Powerd (version : %L ), an open-source application, to monitor<br />

UPS devices.<br />

Solution: N/A<br />

CVE Not available<br />

Powerd WHATIDO Variable Remote Overflow<br />

<strong>PVS</strong> ID: 3425 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using Powerd (version : %L ), an open-source application, to monitor the UPS device. This<br />

version of Powerd is vulnerable to a remote overflow. An attacker exploiting this flaw will<br />

be able to execute arbitrary code on the target machine.<br />

Solution: Block access to the powerd server port (532) from untrusted clients.<br />

LinPHA <<br />

CVE-2006-0681<br />

<strong>PVS</strong> ID: 3426 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:20892<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running LinPHA, a web photo gallery application written in PHP. The installed version<br />

of LinPHA suffers from a number of flaws, several of which may allow an unauthenticated<br />

attacker to view arbitrary files or to execute arbitrary PHP code on the remote host subject<br />

to the privileges of the web server user ID. Note that successful exploitation requires that<br />

PHP's 'magic_quotes_gpc' setting be disabled, that an attacker has the ability to create,<br />

upload or edit files on the remote host, or that the application's 'user login events log'<br />

setting be enabled. The host is also vulnerable to a cross-site scripting (XSS) and SQL<br />

injection attacks. Attackers exploiting the XSS flaw would be able to potentially execute<br />

malicious code within a user's browser. A successful SQL Injection attack would give the<br />

Family Internet Services 880


attacker the ability to execute arbitrary commands on the backend database server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-1924<br />

WebGUI < 6.8.6 'Anonymous' Account Creation<br />

<strong>PVS</strong> ID: 3427 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running WebGUI, a content management framework. The<br />

remote version of this software is vulnerable to a flaw where an anonymous user can be<br />

created even if the Administrator has configured the site to reject the creation of<br />

anonymous accounts. An attacker exploiting this flaw would only need to be able to send a<br />

malformed HTTP request to the WebGUI server. Successful exploitation would lead to the<br />

creation of an anonymous account.<br />

Solution: Upgrade to version 6.8.6 or higher.<br />

CVE-2006-0680<br />

AttachmateWRQ Reflection for Secure IT Server SFTP Format String<br />

<strong>PVS</strong> ID: 3428 FAMILY: SSH<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:20902<br />

Description: The remote SSH server is affected by a format string vulnerability. The remote host is<br />

running AttachmateWRQ Reflection for Secure IT Server / F-Secure SSH Server, a<br />

commercial SSH server. According to its banner, the installed version of this software<br />

contains a format string vulnerability in its SFTP subsystem. An remote authenticated<br />

attacker may be able to execute arbitrary code on the affected host subject to his privileges<br />

or crash the server itself.<br />

Solution: Upgrade or patch according to vendor recommendations or edit the software's configuration<br />

to disable the SFTP subsystem.<br />

CVE-2006-0705<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Microsoft Windows Media Player Bitmap File Processing Overflow (911565)<br />

<strong>PVS</strong> ID: 3429 FAMILY: Generic RISK: HIGH NESSUS ID:20905<br />

Description: Synopsis :\n\nArbitrary code can be executed on the remote host through the Windows<br />

Media Player.\n\nThe remote host is running Microsoft Media Player version 10. There is a<br />

vulnerability in the remote version of this software that may allow an attacker to execute<br />

arbitrary code on the remote host. To exploit this flaw, one attacker would need to set up a<br />

rogue BMP image and send it to a victim on the remote host.<br />

Family Internet Services 881


Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-0006<br />

Microsoft Windows Media Player Bitmap File Processing Overflow (911565)<br />

<strong>PVS</strong> ID: 3430 FAMILY: Generic RISK: HIGH NESSUS ID:20905<br />

Description: Synopsis :\n\nArbitrary code can be executed on the remote host through the Windows<br />

Media Player.\n\nThe remote host is running Microsoft Media Player version 9.0. There is<br />

a vulnerability in the remote version of this software that may allow an attacker to execute<br />

arbitrary code on the remote host. To exploit this flaw, one attacker would need to set up a<br />

rogue BMP image and send it to a victim on the remote host.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-0006<br />

Windows Media Player Bitmap File Processing Overflow (911565)<br />

<strong>PVS</strong> ID: 3431 FAMILY: Generic RISK: HIGH NESSUS ID:20905<br />

Description: Synopsis :\n\nArbitrary code can be executed on the remote host through the Windows<br />

Media Player.\n\nThe remote host is running Microsoft Media Player version 7.1. There is<br />

a vulnerability in the remote version of this software that may allow an attacker to execute<br />

arbitrary code on the remote host. To exploit this flaw, one attacker would need to set up a<br />

rogue BMP image and send it to a victim on the remote host.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-0006<br />

SSH Tectia Server SFTP Filename Logging Format String<br />

<strong>PVS</strong> ID: 3432 FAMILY: SSH<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:20927<br />

Description: Synopsis :\n\nThe remote SSH server may be affected by a format string<br />

vulnerability.\n\nThe remote host is running SSH Tectia Server, a commercial SSH server.<br />

According to its banner, the installed version of this software contains a format string<br />

vulnerability in its SFTP subsystem. An authenticated remote attacker may be able to<br />

execute arbitrary code on the affected host subject to his privileges or crash the server<br />

itself.<br />

Solution: Upgrade to version 4.3.7, 4.4.2 or higher.<br />

CVE-2006-0705<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

dotProject < 2.0.2 Multiple Script Remote File Inclusion<br />

<strong>PVS</strong> ID: 3433 FAMILY: CGI RISK: HIGH NESSUS ID:20925<br />

Family Internet Services 882


Description: Synopsis :\n\nThe remote web server contains a PHP application that is affected by<br />

multiple remote file inclusion vulnerabilities.\n\nThe remote host is running dotProject, a<br />

web-based, open-source project management application written in PHP. The installed<br />

version of dotProject fails to sanitize user input to various parameters and scripts before<br />

using it in calls to PHP functions such as 'include', and 'require_once()'. Provided PHP's<br />

'register_globals' setting is enabled, an unauthenticated attacker may be able to leverage<br />

these issues to view arbitrary files or to execute arbitrary PHP code on the remote host,<br />

subject to the privileges of the web server user ID.<br />

Solution: Upgrade to version 2.0.2 or higher.<br />

CVE-2006-0755<br />

Mac OS X < 10.4.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3434 FAMILY: Operating System Detection RISK: LOW NESSUS ID:20911<br />

Description: Synopsis :\n\nThe remote host is missing a Mac OS X update that fixes a security<br />

issue.\n\nThe remote host is running a version of Mac OS X 10.4 that is older than version<br />

10.4.5. Mac OS X 10.4.5 contains several security fixes for a local denial of service<br />

vulnerability. A malicious local user may trigger the vulnerability by invoking an<br />

undocumented system call.<br />

Solution: Upgrade to version 10.4.5 or higher.<br />

CVE-2006-0382<br />

WordPress < 2.0.1 Arbitrary Script Injection<br />

<strong>PVS</strong> ID: 3435 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection attack.\n\nThe installed<br />

version of WordPress on the remote host will accept and execute arbitrary PHP code. This<br />

version of Wordpress is vulnerable to a flaw where a remote attacker can, by sending a<br />

malformed request, execute arbitrary code on the WordPress server. The path to the<br />

installed Wordpress installation is:\n%P<br />

Solution: Upgrade to version 2.0.1 or higher.<br />

CVE-2006-0733<br />

Coppermine Gallery < 1.4.4 Script Injection<br />

<strong>PVS</strong> ID: 3436 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection attack.\n\nThe remote host<br />

is running CopperMine Gallery, a set of PHP scripts to handle galleries of pictures. There is<br />

an injection flaw in this version of Coppermine Gallery. An attacker exploiting this flaw<br />

would only need to be able to send standard HTTP requests to the server. Successful<br />

exploitation would result in the attacker running arbitrary code with the permissions of the<br />

Family Internet Services 883


web server.<br />

Solution: Upgrade to version 1.4.4 or higher.<br />

CVE-2006-0872<br />

Warez P2P Server/Client Detection<br />

<strong>PVS</strong> ID: 3437 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is running client software that may be considered<br />

questionable.\n\nThe remote server is running the Warez Peer-to-Peer (P2P) client/server<br />

application. This software is used to trade files between peers. The remote host is running<br />

version: \n %L<br />

Solution: Ensure that such software is in alignment with corporate policies and guidelines regarding<br />

appropriate network usage.<br />

CVE Not available<br />

Fedora DS Administration Server < 1.0.1 Information Disclosure<br />

<strong>PVS</strong> ID: 3438 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:20952<br />

Description: Synopsis :\n\nThe remote web server is affected by an information disclosure<br />

vulnerability.\n\nThe remote host appears to be running Fedora Directory Server, a<br />

directory server implementation for Fedora Core. The Administration Server, which is used<br />

to manage Fedora DS, allows an unauthenticated attacker to retrieve the admin password<br />

hash through a simple GET request.<br />

Solution: Upgrade to version 1.0.1 or higher.<br />

CVE-2005-3630<br />

Bugzilla Whinedays SQL Injection<br />

<strong>PVS</strong> ID: 3439 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running Bugzilla, a bug-tracking software with a web interface. The version of Bugzilla<br />

on the remote host suffers from a SQL Injection flaw. An attacker exploiting this flaw<br />

would only need to be able to send HTTP queries to the Bugzilla application. Successful<br />

exploitation would result in the attacker executing arbitrary commands on the remote<br />

database server that services Bugzilla.<br />

Solution: Upgrade to version 2.18.5, 2.20.1, 2.21.1 or higher.<br />

CVE-2006-0916<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 884


True North eMailServer SEARCH Command Remote Overflow<br />

<strong>PVS</strong> ID: 3440 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the True North eMailServer. This version of eMailServer is vulnerable to a remote<br />

buffer overflow when passed a long 'SEARCH' directive. An attacker exploiting this flaw<br />

would need to be able to authenticate with a valid account. Successful exploitation would<br />

result in the attacker executing arbitrary code.<br />

Solution: No solution is known at this time.<br />

CVE-2006-0853<br />

SquirrelMail < 1.4.7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3441 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:20970<br />

Description: Synopsis :\n\nThe remote webmail application is affected by multiple issues.\n\nThe<br />

installed version of SquirrelMail fails to sanitize user-supplied input to mailbox names<br />

before passing them to an IMAP server. An unauthenticated attacker may be able to<br />

leverage this issue to launch attacks against the underlying IMAP server or against a user's<br />

mailboxes by tricking him into clicking on a specially-formatted link in an email message.<br />

There are also reportedly several possible cross-site scripting flaws that could be exploited<br />

to inject arbitrary HTML and script code into a user's browser.<br />

Solution: Upgrade to version 1.4.7 or higher.<br />

CVE-2006-0188<br />

CherryPy < 2.1.1 staticfilter Directory Traversal Arbitrary File Access<br />

<strong>PVS</strong> ID: 3442 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:20961<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Directory Traversal flaw.\n\nThe remote<br />

host is running CherryPy, a web-based content management system written in python. This<br />

version of CherryPy is vulnerable to a directory traversal flaw. An attacker exploiting this<br />

flaw would send a malformed query to the application. Successful exploitation would result<br />

in the attacker being able to access confidential data outside of the web root directory.<br />

Solution: Upgrade to version 2.1.1 or higher.<br />

CVE-2006-0847<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

ViRobot Linux Server filescan Authentication Bypass<br />

<strong>PVS</strong> ID: 3443 FAMILY: Web Servers RISK: HIGH NESSUS ID:20968<br />

Family Internet Services 885


Description: Synopsis :\n\nThe remote web server is affected by an authentication bypass flaw.\n\nThe<br />

remote host is running ViRobot Linux Server, a commercial anti-virus application server.<br />

The installed version of ViRobot Linux Server has a flaw such that an attacker can bypass<br />

authentication and gain access to its 'filescan' component by supplying a special cookie. An<br />

unauthenticated attacker may be able to leverage this flaw to delete arbitrary files on the<br />

remote host or disable access to the service by submitting scans of a large number of large<br />

files on the remote host.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-0864<br />

Mambo Undisclosed Authentication Bypass<br />

<strong>PVS</strong> ID: 3444 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running the Mambo Content Server, an application<br />

for generating dynamic content for web servers. The remote application is vulnerable to a<br />

flaw where remote attackers can bypass authentication and access confidential data. The<br />

exact details of the flaw are unknown; however, it is believed that an attacker exploiting<br />

this flaw would be able to access confidential data that was readable by the web server<br />

process.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-1794<br />

Winamp < 5.14 .M3U File Handling Buffer Overflow<br />

<strong>PVS</strong> ID: 3445 FAMILY: Generic RISK: HIGH NESSUS ID:20826<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using Winamp, a popular media player for Windows. It is possible that a remote attacker<br />

using a specially-crafted playlist can cause a buffer overflow in the version of Winamp<br />

installed on the remote host, resulting in a crash of the application or even execution of<br />

arbitrary code subject to the user's privileges. An attacker exploiting this flaw would need<br />

to be able to convince a Winamp user to open a malicious '.m3u' file.<br />

Solution: Upgrade to version 5.14 or higher.<br />

CVE-2006-0720<br />

Brooky CubeCart < 3.0.7 connector.php Arbitrary File Upload<br />

<strong>PVS</strong> ID: 3446 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 886


Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection attack.\n\nThe remote host<br />

is running Brooky CubeCart, an online storefront application written in PHP. This version<br />

of CubeCart is vulnerable to a flaw where arbitrary PHP code can be uploaded to the web<br />

server and then executed with the permissions of the web server process. Successful<br />

exploitation would only require that the attacker can send malformed HTTP requests to the<br />

application.<br />

Solution: Upgrade to version 3.0.7 or higher.<br />

CVE-2006-0922<br />

ArGoSoft Mail Server < 1.8.8.6 '_DUMP' Information Disclosure<br />

<strong>PVS</strong> ID: 3447 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:20977<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running the ArGoSoft Mail Server. This<br />

version of ArGoSoft is prone to a remote unauthenticated access flaw. Specifically, as<br />

ArGoSoft does not require authentication prior to allowing the _DUMP directive, an<br />

unauthenticated user can cause the server to disclose potentially confidential data.<br />

Successful exploitation would give the attacker confidential server data.\n\nSecondly, the<br />

remote host is vulnerable to a directory traversal flaw within its IMAP component. An<br />

attacker exploiting this flaw would need to be authenticated. Successful exploitation would<br />

result in the attacker accessing confidential data outside of their default IMAP<br />

folder.\n\nThirdly, the remote server is vulnerable to an HTML Injeciton attack.<br />

Solution: Upgrade to version 1.8.8.6 or higher.<br />

CVE-2006-0928<br />

MTS Professional < 1.61.1.85 SMTP Open Relay<br />

<strong>PVS</strong> ID: 3448 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote SMTP server can be tricked into relaying email, regardless of its<br />

relay configuration.\n\nThe remote host is running the MTS Professional SMTP server.<br />

This version of MTS is vulnerable to a flaw in the way that it handles malformed 'MAIL<br />

FROM:' headers. An attacker exploiting this flaw would send malformed 'MAIL FROM:'<br />

directives to the server. Successful exploitation would result in the attacker being able to<br />

relay traffic through the host.<br />

Solution: Upgrade to version 1.61.1.85 or higher.<br />

CVE-2006-0977<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

MDaemon < 8.15 IMAP Mail Folder Name Remote Overflow<br />

<strong>PVS</strong> ID: 3449 FAMILY: Web Servers NESSUS ID:Not Available<br />

Family Internet Services 887


RISK:<br />

MEDIUM<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Alt-N MDaemon, an SMTP/IMAP server for Windows. This version of MDaemon<br />

is vulnerable to a flaw in the way that it handles malformed IMAP commands. An attacker<br />

exploiting this flaw would need to be able to authenticate to the server and issue IMAP<br />

'CREATE' and 'LIST' commands. Successful exploitation would result in the attacker<br />

executing arbitrary code or crashing the service.<br />

Solution: Upgrade to version 8.15 or higher.<br />

CVE-2006-0925<br />

Lighttpd < 1.4.10a Crafted Filename Request Source Disclosure<br />

<strong>PVS</strong> ID: 3450 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running Lighttpd, a small web server. This<br />

version of Lighttpd is vulnerable to a flaw where an attacker can retrieve source code files.<br />

An attacker exploiting this flaw would be able to retrieve potentially sensitive data that<br />

would aid them in further attacks.<br />

Solution: Upgrade to version 1.4.10a or higher.<br />

CVE-2006-0814<br />

<strong>Network</strong>Activ < 3.5.16 Crafted Filename Request Source Code Disclosure<br />

<strong>PVS</strong> ID: 3451 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running <strong>Network</strong>Activ, a web server. This<br />

version of <strong>Network</strong>Activ is vulnerable to a flaw where an attacker can request and<br />

download source code. This can lead to more sophisticated future attacks.<br />

Solution: Upgrade to version 3.5.16 or higher.<br />

CVE-2006-0815<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Woltlab Burning Board < 2.7.1 Multiple Script SQL Injection<br />

<strong>PVS</strong> ID: 3452 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running Woltlab Burning Board, a web bulletin board written<br />

in PHP. This version of Burning Board is vulnerable to a remote SQL Injection attack. An<br />

attacker exploiting this flaw would send a malformed 'fileid' parameter to the 'info_db.php'<br />

Family Internet Services 888


or 'database.php' PHP scripts. Succesful exploitation would result in the attacker being able<br />

to read or write confidential data. In some instances, the attacker may be able to execute<br />

arbitrary code on the remote database server.<br />

Solution: Upgrade to version 2.7.1 or higher.<br />

CVE-2006-1094<br />

Apache mod_python < 3.2.8 Remote Command Execution<br />

<strong>PVS</strong> ID: 3453 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an flaw that allows attackers to execute<br />

arbitrary commands.\n\nThe remote Apache server is running a version of mod_python that<br />

is equal to 3.2.7. It is reported that a flaw was introduced with version 3.2.7. Specifically, if<br />

'FileSession' has been enabled, a remote attacker can send a specially formatted session<br />

cookie that will, upon being parsed, force mod_python into executing arbitrary code. The<br />

exact details of the flaw are unknown.<br />

Solution: Upgrade to version 3.2.8, 3.3.1 or higher.<br />

CVE-2006-1095<br />

vBulletin < 3.5.4 HTML Injection<br />

<strong>PVS</strong> ID: 3454 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML Injection attack.\n\nThe version<br />

of vBulletin installed on the remote host fails to properly sanitize user-supplied input.<br />

Given this, the application is prone to an HTML injection attack. An attacker exploiting<br />

this flaw would post a malicious entry to the vBulletin board. Unsuspecting users perusing<br />

the board would have code executed within their browser. Successful exploitation could<br />

lead to the theft of confidential data.<br />

Solution: Upgrade to version 3.5.4 or higher.<br />

CVE-2006-1040<br />

RaidenHTTPd < 1.1.48 Crafted Request Script Source Disclosure<br />

<strong>PVS</strong> ID: 3455 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running RaidenHTTPd. RaidenHTTPd is a<br />

web server that is designed for the Microsoft platform. This version of RaidenHTTPd is<br />

vulnerable to a flaw where an attacker can send a malformed 'GET' request that will, upon<br />

being parsed, cause the Raiden web server to send back potentially confidential files (such<br />

as source code for active scripts).<br />

Family Internet Services 889


Solution: Upgrade to version 1.1.48 or higher.<br />

CVE-2006-0949<br />

SPLUNK Online Log Search Detection<br />

<strong>PVS</strong> ID: 3456 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running SPLUNK, a web-based application that allows<br />

remote users to search syslog log files. This application may give remote attackers the<br />

ability to gain information useful in future attacks.<br />

Solution: Ensure that access to SPLUNK is restricted to administrative users.<br />

CVE Not available<br />

Gallery < 2.0.3 GalleryUtilities.class X_FORWARDED_FOR HTTP Header XSS<br />

<strong>PVS</strong> ID: 3457 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML Injection attack.\n\nThe remote<br />

host is running the Gallery web-based photo album. This version of Gallery is vulnerable to<br />

a cross-site scripting (XSS) flaw. The vendor has released version 2.0.3 as a fix. An<br />

attacker exploiting this flaw would need to be able to convince a user to browse to a<br />

malicious URI. Successful exploitation could lead to the loss of potentially confidential<br />

data.<br />

Solution: Upgrade to version 2.0.3 or higher.<br />

CVE-2006-1127<br />

Listserv < 14.5 Multiple Buffer Overflows<br />

<strong>PVS</strong> ID: 3458 FAMILY: Web Servers RISK: HIGH NESSUS ID:21016<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Listserv, a mailing list management application. According to its version number,<br />

the Listserv install on the remote host suffers from as-yet unspecified buffer overflows,<br />

including one that reportedly can be exploited by an unauthenticated attacker to execute<br />

arbitrary code on the affected host.<br />

Solution: Upgrade to version 14.5 or higher.<br />

CVE-2006-1044<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Retrospect Client for Windows Malformed Packet DoS<br />

Family Internet Services 890


<strong>PVS</strong> ID: 3459 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:20996<br />

Description: Synopsis :\n\nThe remote backup client is susceptible to denial of service<br />

attacks.\n\nAccording to its version number, the installed instance of Retrospect Client for<br />

Windows reportedly will stop working if it receives a packet starting with a<br />

specially-crafted sequence of bytes. An unauthenticated remote attacker may be able to<br />

leverage this flaw to prevent the affected host from being backed up.<br />

Solution: Upgrade to version 6.5.138, 7.0.109 or higher.<br />

CVE-2006-0995<br />

Retrospect Client for Windows Malformed Packet DoS<br />

<strong>PVS</strong> ID: 3460 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:20996<br />

Description: Synopsis :\n\nThe remote backup client is susceptible to denial of service<br />

attacks.\n\nAccording to its version number, the installed instance of Retrospect Client for<br />

Windows reportedly will stop working if it receives a packet starting with a<br />

specially-crafted sequence of bytes. An unauthenticated remote attacker may be able to<br />

leverage this flaw to prevent the affected host from being backed up.<br />

Solution: Upgrade to version 6.5.138, 7.0.109 or higher.<br />

CVE-2006-0995<br />

Retrospect Client < 6.5.138 / 7.0.109 Malformed Packet DoS<br />

<strong>PVS</strong> ID: 3461 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:20996<br />

Description: Synopsis :\n\nThe remote backup client is susceptible to denial of service<br />

attacks.\n\nAccording to its version number, the installed instance of Retrospect Client for<br />

Windows reportedly will stop working if it receives a packet starting with a<br />

specially-crafted sequence of bytes. An unauthenticated remote attacker may be able to<br />

leverage this flaw to prevent the affected host from being backed up.<br />

Solution: Upgrade to version 6.5.138, 7.0.109 or higher.<br />

CVE-2006-0995<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Invision Power Board showtopic.php st Parameter SQL Injection<br />

<strong>PVS</strong> ID: 3462 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running Invision Board, a CGI suite designed to set up a<br />

bulletin board system on the remote web server. This version of Invision Board is<br />

vulnerable to a flaw in the way that it handles the 'st' parameter of the 'showtopic' php<br />

Family Internet Services 891


script. Successful exploitation may allow an attacker to execute arbitrary SQL statements<br />

against the remote host.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-2217<br />

Acme thttpd < 2.26 htpasswd Utility Overflow<br />

<strong>PVS</strong> ID: 3463 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a vulnerable version of Acme thttpd. It is reported that versions prior to 2.26<br />

contain a flaw within the 'htpasswd' utility. The htpasswd binary does not correctly verify<br />

the amount of data that it is parsing. Given this, a long argument passed to the htpasswd<br />

utility may cause a buffer overflow. An attacker exploiting this flaw would need to be able<br />

to find a system that calls htpasswd via a dynamic page (such as a CGI script). In addition,<br />

the application is vulnerable to a flaw in the way that it creates local temporary files. A<br />

local attacker exploiting this flaw would be able to modify or delete files with the privileges<br />

of the thttpd server process.<br />

Solution: Upgrade to version 2.26 or higher.<br />

CVE-2006-1079<br />

Geeklog lib-sessions.php Session Cookie Handling Administrative Bypass<br />

<strong>PVS</strong> ID: 3464 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the<br />

bypassing of authentication.\n\nThe remote host is running Geeklog, an<br />

open-source weblog powered by PHP and MySQL. The installed version of<br />

Geeklog is vulnerable to a flaw in the 'lib-sessions.php' script. Specifically, a<br />

remote attacker can use the script to bypass authentication and gain<br />

administrative access to the Geeklog application. Successful exploitation gives<br />

the attacker the ability to gather confidential data, the ability to compromise file<br />

integrity, and the ability to interrupt services to valid users.<br />

Solution: Upgrade to version 1.3.11sr5, 1.3.9sr5, 1.4.0sr2, or higher.<br />

CVE-2006-1069<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Owl Intranet Engine xrms_file_root Parameter Remote File Inclusion<br />

<strong>PVS</strong> ID: 3465 FAMILY: CGI RISK: HIGH NESSUS ID:21025<br />

Description: Synopsis :\n\nThe remote web server contains a PHP script that suffers from a remote file<br />

include vulnerability.\n\nThe remote host is running Owl Intranet Engine, a web-based<br />

document management system written in PHP. The version of Owl Intranet Engine on the<br />

remote host fails to sanitize user-supplied input to the 'xrms_file_root' parameter of the<br />

'lib/OWL_API.php' script before using it in a PHP 'require_once' function. An<br />

Family Internet Services 892


unauthenticated attacker may be able to exploit this issue to view arbitrary files on the<br />

remote host or to execute arbitrary PHP code, possibly taken from third-party hosts.<br />

Solution: No solution is known at this time.<br />

CVE-2006-1149<br />

Dropbear < 0.48 Authorization-Pending Connection Saturation DoS<br />

<strong>PVS</strong> ID: 3466 FAMILY: SSH<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:21023<br />

Description: Synopsis :\n\nThe remote SSH server is susceptible to denial of service attacks.\n\nThe<br />

remote host is running Dropbear, a small, open-source SSH server. The version of<br />

Dropbear installed on the remote host by default has a limit of 30 connections in the<br />

authorization-pending state; subsequent connections are closed immediately. This issue can<br />

be exploited trivially by an unauthenticated attacker to deny service to legitimate users.<br />

Solution: Upgrade to version 0.48 or higher.<br />

CVE-2006-1206<br />

Mac OS X Intel Detection<br />

<strong>PVS</strong> ID: 3467 FAMILY: Web Clients RISK: NONE NESSUS ID:Not Available<br />

Description: The remote host is running Mac OS X on the Intel platform.<br />

Solution: N/A<br />

CVE Not available<br />

PeerCast < 0.1217 procConnectArgs Function Remote Overflow<br />

<strong>PVS</strong> ID: 3468 FAMILY: Web Servers RISK: HIGH NESSUS ID:21041<br />

Description: Synopsis :\n\nThe remote web server suffers from a buffer overflow vulnerability.\n\nThe<br />

version of PeerCast installed on the remote host copies the supplied option string without<br />

limit into a finite-size buffer. An unauthenticated attacker can leverage this issue to crash<br />

the affected application and possibly to execute arbitrary code on the remote host subject to<br />

the privileges of the user running PeerCast.<br />

Solution: Upgrade to version 0.1217 or higher.<br />

CVE-2006-1148<br />

Kerio MailServer < 6.1.3 Patch 1 Remote DoS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3469 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 893


Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running Kerio MailServer version 6.0.10 or lower. There is a flaw in the<br />

remote version of this server that would allow an attacker to cause the application to fail.<br />

While the details of the flaw are unknown, it is alledged that an attacker can launch the<br />

attack without any credentials and render the target service unavailable.<br />

Solution: Upgrade to version 6.1.3 Patch 1 or higher.<br />

CVE-2006-0742<br />

Easy File Sharing Web Server Format String<br />

<strong>PVS</strong> ID: 3470 FAMILY: Web Servers RISK: HIGH NESSUS ID:21039<br />

Description: Synopsis :\n\nThe remote web server suffers from a format string vulnerability.\n\nThe<br />

remote host is running Easy File Sharing Web Server, a file sharing application / web<br />

server for Windows. The version of Easy File Sharing Web Server installed on the remote<br />

host may crash if it receives requests with an option parameter consisting of a format string.<br />

It is unknown whether this issue can be exploited to execute arbitrary code on the remote<br />

host, although it is likely the case. In addition, the application reportedly allows remote<br />

users to upload arbitrary files to arbitrary locations on the affected host. An attacker may be<br />

able to leverage this issue to completely compromise the host by placing them in the startup<br />

folder and waiting for a reboot. Additionally, it fails to sanitize input to the 'Description'<br />

field when creating a folder or uploading a file, which could lead to cross-site scripting<br />

attacks. Note that by default the application runs with the privileges of the user who started<br />

it, although it can be configured to run as a service.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-1160<br />

Gallery < 2.0.4 Watermark Function stepOrder Parameter Local File Inclusion<br />

<strong>PVS</strong> ID: 3472 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:21040<br />

Description: Synopsis :\n\nThe remote web server contains a PHP application that is affected by<br />

multiple local file include flaws.\n\nThe remote host is running Gallery, a web-based photo<br />

album application written in PHP. The version of Gallery installed on the remote host fails<br />

to sanitize input to the 'stepOrder' parameter of the 'upgrade/index.php' and<br />

'install/index.php' scripts before using it in a PHP 'require()' function. An unauthenticated<br />

attacker may be able to exploit this issue to view arbitrary files or to execute arbitrary PHP<br />

code on the affected host provided PHP's 'register_globals' setting is enabled.<br />

Solution: Upgrade to version 2.0.4 or higher.<br />

CVE-2006-1219<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Ipswitch Multiple Products < 2006.03 IMAP FETCH Command Overflow<br />

Family Internet Services 894


<strong>PVS</strong> ID: 3473 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:21051<br />

Description: Synopsis :\n\nThe remote IMAP server is affected by a buffer overflow<br />

vulnerability.\n\nThe remote host is running Ipswitch Collaboration Suite / IMail Secure<br />

Server / IMail Server, commercial messaging and collaboration suites for Windows.<br />

According to its banner, the version of Ipswitch Collaboration Suite / IMail Secure Server /<br />

IMail Server installed on the remote host has a buffer overflow issue in its IMAP server<br />

component. Using a specially-crafted FETCH command with excessive data, an<br />

authenticated attacker can crash the IMAP server on the affected host, thereby denying<br />

service to legitimate users and possibly execute arbitrary code as LOCAL SYSTEM.<br />

Solution: Upgrade to version 2006.03 or higher.<br />

CVE-2005-3526<br />

Mac OS X Multiple Vulnerabilities (<strong>Security</strong> Update 2006-002)<br />

<strong>PVS</strong> ID: 3474 FAMILY: Operating System Detection RISK: HIGH NESSUS ID:21073<br />

Description: Synopsis :\n\nThe remote operating system is missing vendor supplied patches. The remote<br />

host is running Apple Mac OS X, but lacks <strong>Security</strong> Update 2006-002. This security update<br />

contains fixes for the following applications<br />

:\n\napache_mod_php\nCoreTypes\nLaunchServices\nMail\nSafari\nrsync<br />

Solution: Retrieve security patch 2006-002 from Apple.<br />

CVE-2006-1220<br />

Mac OS X Multiple Vulnerabilities (<strong>Security</strong> Update 2006-002)<br />

<strong>PVS</strong> ID: 3475 FAMILY: Operating System Detection RISK: HIGH NESSUS ID:21073<br />

Description: Synopsis :\n\nThe remote operating system is missing vendor supplied patches. The remote<br />

host is running Apple Mac OS X, but lacks <strong>Security</strong> Update 2006-002. This security update<br />

contains fixes for the following applications<br />

:\n\napache_mod_php\nCoreTypes\nLaunchServices\nMail\nSafari\nrsync<br />

Solution: Retrieve security patch 2006-002 from Apple.<br />

CVE-2006-0399<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Simple PHP Blog < 0.4.7.2 install05.php Local File Inclusion<br />

<strong>PVS</strong> ID: 3476 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a local 'file inclusion' flaw.\n\nThe remote<br />

host is running the Simple PHP Blog, web log (or blog) package. This version of Simple<br />

PHP Blog is vulnerable to a flaw where remote users can manipulate the application to<br />

include any local file within an executed query. For example, the attacker could request that<br />

the /etc/passwd file be used in a PHP query that would then return confidential data back to<br />

Family Internet Services 895


the attacker. An attacker exploiting this flaw would gain access to confidential data.<br />

Solution: Upgrade to version 0.4.7.2 or higher.<br />

CVE-2006-1243<br />

Horde < 3.1 go.php url Parameter File Disclosure<br />

<strong>PVS</strong> ID: 3477 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:21081<br />

Description: The remote web server contains a PHP application that is affected by an information<br />

disclosure flaw. The version of Horde installed on the remote host fails to validate input to<br />

the 'url' parameter of the 'services/go.php' script before using it to read files and return their<br />

contents. An unauthenticated attacker may be able to leverage this issue to retrieve the<br />

contents of arbitrary files on the affected host subject to the privileges of the web server<br />

user ID. This can result in the disclosure of authentication credentials used by the affected<br />

application as well as other sensitive information. Note that successful exploitation of this<br />

issue seems to require that PHP's 'magic_quotes_gpc' be disabled, although this has not<br />

been confirmed by the vendor.<br />

Solution: Upgrade to version 3.1 or higher.<br />

CVE-2006-1260<br />

Dwarf HTTP Server < 1.3.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3478 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the Dwarf HTTP Server. This version of Dwarf is vulnerable to multiple input<br />

flaws due to a lack of data validation. An attacker exploiting these flaws will be able to<br />

impact confidentiality and integrity on the remote server.<br />

Solution: Upgrade to version 1.3.3 or higher.<br />

CVE-2006-0820<br />

PHP iCalendar Local File Inclusion<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3479 FAMILY: CGI RISK: HIGH NESSUS ID:17129<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running PHP iCalendar, an open-source PHP blog. This version of iCalendar is<br />

vulnerable to a flaw wherein a local user can gain access to confidential data by requesting<br />

the data from the iCalendar application. Successful exploitation would lead to a local user<br />

gaining access to confidential data. In addition, the remote host is vulnerable to a remote<br />

file upload flaw. An attacker exploiting this flaw would be able to manipulate the<br />

application into uploading and executing potentially malicious scripts. The referenced URI<br />

is:\n%P<br />

Family Internet Services 896


Solution: No solution is known at this time.<br />

CVE-2006-1292<br />

Mercur Mailserver Remote Overflow<br />

<strong>PVS</strong> ID: 3480 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote IMAP<br />

server is running Mercur Mailserver %L.\n\nThis version of Mercur is vulnerable to a flaw<br />

where remote users can send specially crafted IMAP LOGIN and SELECT commands.<br />

Upon parsing of these commands, the Mercur Mailserver crashes, potentially executing<br />

arbitrary system code.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-7041<br />

Curl < 7.15.3 TFTP URL Parsing Overflow<br />

<strong>PVS</strong> ID: 3481 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using a version of curl (or libcurl) that is vulnerable to a remote buffer overflows. An<br />

attacker would have to set up a rogue web server and entice a curl user to browse to the<br />

malicious server to exploit this vulnerability. Upon successful exploitation, the attacker<br />

would be able to execute arbitrary commands with the rights of the web server. The<br />

specific flaw occurs when processing long 'tftp://' URIs. E.g.,<br />

tftp://www.somesite.com/[512 bytes]<br />

Solution: Upgrade to version 7.15.3 or higher.<br />

CVE-2006-1061<br />

MailEnable WebMail Multiple Products Quoted Printable Mail DoS<br />

<strong>PVS</strong> ID: 3482 FAMILY: IMAP Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running a version of MailEnable's WebMail service that is prone to a remote<br />

Denial of Service (DoS) attack. Specifically, an attacker sending malformed web data can<br />

crash the service. An attacker exploiting this flaw would only need to be able to create and<br />

send a malformed email to a valid WebMail user. Successful exploitation leads to a loss of<br />

availability.<br />

Solution: Upgrade to MailEnable Professional 1.73 or higher or to MailEnable Enterprise Edition<br />

1.21 or higher.<br />

Family Internet Services 897


CVE-2006-1338<br />

MailEnable Multiple Products POP3 Authentication Bypass<br />

<strong>PVS</strong> ID: 3483 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the<br />

bypassing of authentication.\n\nThe remote host is running a vulnerable version<br />

of the MailEnable email server. While the details of the flaw are unknown, it is<br />

alleged that a remote attacker can create a query such that they gain<br />

administrative access without actually authenticating.<br />

Solution: Upgrade to MailEnable Professional 1.74 or higher, MailEnable Enterprise Edition 1.22 or<br />

higher, or Mailenable 1.94 or higher.<br />

CVE-2006-1337<br />

Sendmail < 8.13.6 Unspecified Overflow<br />

<strong>PVS</strong> ID: 3484 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote Sendmail<br />

server is running a version less than 8.13.6. There is a flaw in versions of Sendmail less<br />

than 8.13.6. At this time, the details are unknown, although it is believed that an attacker<br />

can overwrite stack memory with a successful attack.<br />

Solution: Upgrade to version 8.13.6 or higher.<br />

CVE Not available<br />

RealPlayer for Linux, Mac, and Windows Remote Overflows<br />

<strong>PVS</strong> ID: 3485 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote Windows application is affected by several overflow<br />

vulnerabilities.\n\nThe installed version of RealPlayer on the remote host is prone to buffer<br />

overflow vulnerabilities. An attacker may be able to leverage these issues to execute<br />

arbitrary code on the remote host subject to the permissions of the user running the affected<br />

application. Note that a user doesn't necessarily need to explicitly access a malicious media<br />

file since the browser may automatically pass the file to the RealPlayer application.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-2922<br />

Orion < 2.0.7 Crafted Filename Extension Source Code Disclosure<br />

<strong>PVS</strong> ID: 3486 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 898


Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running the Orion HTTP Server. This version<br />

of Orion is vulnerable to a flaw where a malformed HTTP query can manipulate the web<br />

server into disclosing potentially sensitive source code. An attacker exploiting this flaw<br />

would be able to gain access to confidential data that would be useful in future attacks.<br />

Solution: Upgrade to version 2.0.7 or higher.<br />

CVE-2006-0816<br />

Sendmail < 8.13.6 Signal Handler Remote Overflow<br />

<strong>PVS</strong> ID: 3487 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote Sendmail<br />

server is running a version less than 8.13.6. There is a flaw in versions of Sendmail less<br />

than 8.13.6. At this time, the details are unknown, although it is believed that an attacker<br />

can overwrite stack memory with a successful attack.<br />

Solution: Upgrade to version 8.13.6 or higher.<br />

CVE-2006-0058<br />

phpPGAds/phpAdNew < 2.0.8 Multiple Injection Vulnerabilities<br />

<strong>PVS</strong> ID: 3488 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to HTML Injection and Cross-Site Scripting<br />

attacks.\n\nThere is a flaw in the remote phpAdNew/phpPgAds PHP Ads server, a banner<br />

management and tracking system written in PHP. This version of phpAdNew is vulnerable<br />

to an HTML injection and a Cross-Site Scripting (XSS) flaw. An attacker exploiting these<br />

flaws would be able to gain access to potentially confidential data<br />

Solution: Upgrade to version 2.0.8 or higher.<br />

CVE-2006-1397<br />

GreyMatter gm-upload.cgi Arbitrary File Upload<br />

<strong>PVS</strong> ID: 3489 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection attack.\n\nThe remote host<br />

is running Greymatter, a log and journal application. This version of Greymatter is<br />

vulnerable to a flaw where an attacker can upload and execute arbitrary code with the rights<br />

of the web server. Successful exploitation would lead to the attacker executing arbitrary<br />

code that would impact confidentiality, integrity and availability.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

Family Internet Services 899


CVE-2006-1485<br />

Horde < 3.1.1 Help Viewer Code Execution<br />

<strong>PVS</strong> ID: 3490 FAMILY: CGI RISK: HIGH NESSUS ID:21164<br />

Description: The remote web server contains a PHP application that allows execution of arbitrary PHP<br />

code. The version of Horde installed on the remote host fails to sanitize user-supplied input<br />

before using it in the Help viewer to evaluate code. An unauthenticated attacker could<br />

exploit this flaw to execute arbitrary command on the remote host subject to the privileges<br />

of the web server user ID.<br />

Solution: Upgrade to version 3.1.1 or higher.<br />

CVE-2006-1491<br />

MPlayer Crafted Media File Integer Overflow<br />

<strong>PVS</strong> ID: 3491 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an integer overflow\n\nThe remote host is<br />

using a version of MPlayer, a multimedia video and audio application. This version of<br />

MPlayer is vulnerable to an integer overflow due to a lack of content parsing. An attacker<br />

exploiting this flaw would need to craft a malicious media file and then convince a local<br />

user to download and play the file within MPlayer. Successful exploitation would result in<br />

arbitrary code being executed locally.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-1502<br />

OneOrZero Helpdesk < 1.6.5.3 index.php id Parameter SQL Injection<br />

<strong>PVS</strong> ID: 3492 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running OneOrZero, an open-source helpdesk application. This version of OneOrZero is<br />

vulnerable to a SQL Injection flaw. An attacker exploiting this flaw would be able to<br />

execute arbitrary SQL commands on the backend SQL server. This can lead to loss of<br />

confidentiality, integrity and availability.<br />

Solution: Upgrade to version 1.6.5.3 or higher.<br />

CVE-2006-1501<br />

ZoneAlarm < 6.1.744.001 VSMON.exe Path Subversion Local Privilege Escalation<br />

<strong>PVS</strong> ID: 3493 FAMILY: Generic<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:21165<br />

Family Internet Services 900


Description: The remote Windows application is prone to a local privilege escalation issue. The remote<br />

host is running ZoneAlarm, a firewall for Windows. The TrueVector service associated<br />

with the version of ZoneAlarm installed on the remote host loads as part of its startup<br />

several necessary DLLs without specifying their pathnames. An attacker with local access<br />

can exploit this flaw to execute arbitrary programs on the affected host with LOCAL<br />

SYSTEM privileges.<br />

Solution: Upgrade to version 6.1.744.001 or higher.<br />

Tablet PC Detection<br />

CVE-2006-1221<br />

<strong>PVS</strong> ID: 3494 FAMILY: Mobile Devices RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Tablet PC version %L<br />

Solution: N/A<br />

CVE Not available<br />

Cellular Phone Browser Detection<br />

<strong>PVS</strong> ID: 3495 FAMILY: Mobile Devices RISK: INFO NESSUS ID:Not Available<br />

Description: The remote HTTP client is a cellular phone.<br />

Solution: N/A<br />

CVE Not available<br />

Debian Operating System Detection<br />

<strong>PVS</strong> ID: 3496 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Debian operating system. The reported version information<br />

is '%L'<br />

Solution: N/A<br />

CVE Not available<br />

Ubuntu Operating System Detection<br />

<strong>PVS</strong> ID: 3497 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Ubuntu operating system. The reported version number is:<br />

'%L '<br />

Solution: N/A<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 901


CVE Not available<br />

Internet Explorer Version 7 Detection<br />

<strong>PVS</strong> ID: 3498 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Internet Explorer version 7.<br />

Solution: N/A<br />

CVE Not available<br />

Samba < 3.0.22 Local File Permissions Credentials Disclosure<br />

<strong>PVS</strong> ID: 3499 FAMILY: Samba RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a local flaw in the way that it creates log<br />

files.\n\nThe remote Samba server, according to its version number, may be vulnerable to a<br />

local flaw. Specifically, if debugging has been set to level 5 or higher, the local SAMBA<br />

process will log account credentials. These credentials can be read by local users and used<br />

in future attacks.<br />

Solution: Upgrade to version 3.0.22 or higher.<br />

CVE-2006-1059<br />

Policy - Virtual War Gaming Server Detection<br />

<strong>PVS</strong> ID: 3500 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized by corporate<br />

policy.\n\nThe remote server is running the Virtual War Gaming Server. This application is<br />

used to manage game events and profiles.<br />

Solution: Ensure that the software is authorized.<br />

CVE Not available<br />

BASE < 1.2.4 base_maintenance Authentication Bypass<br />

<strong>PVS</strong> ID: 3501 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:21174<br />

Description: The remote web server contains a PHP script that is prone to an authentication bypass<br />

vulnerability. The remote host is running BASE, a web-based tool for analyzing alerts from<br />

one or more SNORT sensors. The version of BASE installed on the remote host allows a<br />

remote attacker to bypass authentication to the 'base_maintenance.php' script and then<br />

perform selected maintenance tasks.<br />

Family Internet Services 902


Solution: Upgrade to version 1.2.4 or higher.<br />

CVE-2006-1505<br />

Mac OS X < 10.4.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3502 FAMILY: Operating System Detection RISK:<br />

MEDIUM<br />

NESSUS ID:21175<br />

Description: Synopsis :\n\nThe remote host is missing a Mac OS X update that fixes a security<br />

issue.\n\nThe remote host is running a version of Mac OS X 10.4 that is older than version<br />

10.4.6. Mac OS X 10.4.5 contains several security fixes for a local authentication bypass<br />

vulnerability. A malicious local user may exploit this vulnerability to bypass the firmware<br />

password and gain access to Single User mode.<br />

Solution: Upgrade to version 10.4.6 or higher.<br />

CVE-2006-0401<br />

NOD32 < 2.51.26 Antivirus Local File Overwrite<br />

<strong>PVS</strong> ID: 3503 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote antivirus software can be tricked by local users into replacing<br />

system files.\n\nThe remote host is running the NOD32 antivirus software. This software is<br />

vulnerable to a flaw where local users can execute arbitrary code by quarantining a file and<br />

then 'restoring' the file in such a manner that, when next executed, the file is run with<br />

SYSTEM privileges.<br />

Solution: Upgrade to version 2.51.26 or higher.<br />

CVE-2006-1649<br />

McAfee WebShield < 4.5 MR2 Bounced Emails Format String<br />

<strong>PVS</strong> ID: 3504 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote 'format string' flaw.\n\nThe remote<br />

host is running the McAfee WebShield SMTP server. This version of WebShield is<br />

vulnerable to a flaw in the way that it processes 'bounced' emails. An attacker can send a<br />

malformed email that, upon being bounced, will overflow the remote mail server.<br />

Solution: Upgrade to version 4.5 MR2 or higher.<br />

CVE-2006-0559<br />

ClamAV < 0.88.1 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3505 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 903


Description: Synopsis : \n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is running ClamAV, an antivirus application. The remote host is running<br />

version: \n %L \n\nThere are a number of flaws that affect this version of ClamAV, and the<br />

vendor recommends upgrading to version 0.88.1 or higher.<br />

Solution: Upgrade to version 0.88.1 or higher.<br />

CVE-2006-1630<br />

GlobalSCAPE Secure FTP Server < 3.1.4 Build 01.10.2006 Custom Command Remote DoS<br />

<strong>PVS</strong> ID: 3506 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:21188<br />

Description: Synopsis :\n\nThe remote FTP server is prone to denial of service<br />

attacks.\n\nGlobalSCAPE Secure FTP Server is installed on the remote Windows host. The<br />

installed version of GlobalSCAPE Secure FTP Server on the remote host is affected by a<br />

denial of service vulnerability involving a lengthy parameter line to an unspecified custom<br />

command.<br />

Solution: Upgrade to version 3.1.4 Build 01.10.2006 or higher.<br />

CVE-2006-1693<br />

GNU Mailman < 2.1.8 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3507 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the GNU mailman application. It is running a version of Mailman prior to 2.1.8.<br />

These versions of Mailman are prone to several remote attacks that may impact<br />

confidentiality and integrity.<br />

Solution: Upgrade to version 2.1.8 or higher.<br />

CVE-2006-1712<br />

Cherokee Web Server < 0.5.1 XSS<br />

<strong>PVS</strong> ID: 3508 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote Cherokee web server is vulnerable to a flaw in the way that it parses user requests.<br />

Specifically, an attacker can create queries such that unsanitized script code is displayed in<br />

user browsers. An attacker exploiting this flaw would need to be able to convince a user to<br />

browse to a malicious URI. Successful exploitation would result in a possible loss of<br />

confidential materials.<br />

Solution: Upgrade to version 0.5.1 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 904


CVE-2006-1681<br />

PHP < 5.1.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3509 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows local attackers to execute<br />

arbitrary commands.\n\nThe remote host is running a version of PHP that is older than<br />

5.1.4. This version is reported vulnerable to several flaws that may allow an attacker, with<br />

the right to execute PHP scripts, the ability to execute arbitrary code. Executed code would<br />

be run with the permissions of the web server process.<br />

Solution: Upgrade to version 5.1.4 or higher.<br />

CVE-2006-1494<br />

Outlook Express .wab File Processing Overflow<br />

<strong>PVS</strong> ID: 3510 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote client is<br />

running Microsoft Outlook Express. The noted version of Outlook Express is vulnerable to<br />

a buffer overflow in the way that it handles the parsing of .wab files. An attacker exploiting<br />

this flaw would need to be able to entice the user into opening the attachment. Successful<br />

exploitation would result in code being executed with the rights of the compromised user.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-0014<br />

Nokia Intellisync Web Portal Detection<br />

<strong>PVS</strong> ID: 3511 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is a Nokia Intellisync Server. These portals are designed for access by<br />

users of portable devices (PDA, cell phone). One of the server components is a syncing port<br />

(TCP/3102) that maintains state and synchronization with the remote clients.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Firefox < 1.5.0.2 or 1.0.8 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3512 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is using Firefox. The installed version of Firefox contains various security<br />

issues, several of which are critical as they can be easily exploited to execute arbitrary shell<br />

Family Internet Services 905


code on the remote host. The version of Firefox is vulnerable to multiple denial of service<br />

attacks, overflows, information disclosure, privilege escalation, and other issues. An<br />

attacker exploiting these flaws would need to be able to convince a Firefox user to browse<br />

to a malicious URI.<br />

Solution: Upgrade to version 1.5.0.2, 1.0.8 or higher.<br />

CVE-2006-1730<br />

Mozilla Thunderbird < 1.5.0.2 or 1.0.8 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3513 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is running a vulnerable version of Mozilla Thunderbird mail client. This<br />

version of Thunderbird is vulnerable to multiple denial of service attacks, overflows,<br />

information disclosure, privilege escalation, and other issues. An attacker exploiting these<br />

flaws would need to be able to convince a user to open or read a malicious email.<br />

Successful exploitation would give the attacker the ability to execute arbitrary code with<br />

the permissions of the user running Thunderbird.<br />

Solution: Install version 1.5.0.2, 1.0.8 or higher.<br />

CVE-2006-1730<br />

Mozilla Browser < 1.7.13 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3514 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is using Mozilla. The installed version of Mozilla contains various security<br />

issues, several of which are critical as they can be easily exploited to execute arbitrary shell<br />

code on the remote host. The version of Mozilla is vulnerable to multiple denial of service<br />

attacks, overflows, information disclosure, privilege escalation, and other issues. An<br />

attacker exploiting these flaws would need to be able to convince a Mozilla user to browse<br />

to a malicious URI.<br />

Solution: Upgrade to version 1.7.13 or higher.<br />

CVE-2006-1730<br />

Opera < 8.54 signedness StyleSheet Overflow<br />

<strong>PVS</strong> ID: 3515 FAMILY: Web Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:21221<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to a buffer<br />

overflow vulnerability.\n\nThe remote host is using Opera. The version of Opera installed<br />

on the remote host contains a buffer overflow that can be triggered by a long value within a<br />

stylesheet attribute. Successful exploitation can lead to a browser crash and possibly allow<br />

for the execution of arbitrary code subject to the privileges of the user running Opera.<br />

Family Internet Services 906


Solution: Upgrade to version 8.54 or higher.<br />

CVE-2006-1834<br />

SeaMonkey < 1.0.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3516 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is using SeaMonkey. The installed version of SeaMonkey contains various<br />

security issues, several of which are critical as they can be easily exploited to execute<br />

arbitrary shell code on the remote host. The version of SeaMonkey is vulnerable to multiple<br />

denial of service attacks, overflows, information disclosure, privilege escalation, and other<br />

issues. An attacker exploiting these flaws would need to be able to convince a user to<br />

browse to a malicious URI.<br />

Solution: Upgrade to version 1.0.1 or higher.<br />

Sysinfo Detection<br />

CVE-2006-1730<br />

<strong>PVS</strong> ID: 3517 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running sysinfo, a perl CGI script that administrators use to<br />

monitor servers. Sysinfo gives potential attackers information regarding system<br />

configuration. In addition, many versions of sysinfo are vulnerable to many different flaws.<br />

The remote host is running version: \n %L \n<br />

Solution: Ensure that this application is approved and protected according to existing policies and<br />

procedures.<br />

Serendipity <<br />

CVE Not available<br />

<strong>PVS</strong> ID: 3518 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection attack.\n\nThe remote host<br />

is running Serendipity, an open-source web log application. This version of Serendipity is<br />

vulnerable to a flaw where a remote attack can upload and execute PHP scripts with the<br />

rights of the web server. Successful exploitation may lead to partial loss of confidentiality,<br />

integrity, and availability.<br />

Solution: No solution is known at this time.<br />

CVE-2006-1910<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 907


MyBB < 1.1.1 Multiple Script Variable Overwrite<br />

<strong>PVS</strong> ID: 3519 FAMILY: CGI RISK: HIGH NESSUS ID:21239<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote<br />

version of MyBB does not properly initialize global variables in the 'global.php' and<br />

'inc/init.php' scripts. An unauthenticated attacker can leverage this issue to overwrite global<br />

variables through GET and POST requests and launch other attacks against the affected<br />

application.<br />

Solution: Upgrade to verison 1.1.1 or higher.<br />

CVE-2006-1912<br />

Coppermine Photo Gallery < 1.4.5 index.php file Parameter Local File Inclusion<br />

<strong>PVS</strong> ID: 3520 FAMILY: CGI RISK: HIGH NESSUS ID:21240<br />

Description: Synopsis :\n\nThe remote web server contains a PHP script that is affected by a local file<br />

include issue.\n\nThe version of Coppermine Gallery installed on the remote host fails to<br />

properly sanitize input to the 'file' parameter of the 'index.php' script before using it in a<br />

PHP 'include_once()' function. Provided PHP's 'register_globals' setting is enabled, an<br />

unauthenticated attacker may be able to exploit this issue to view arbitrary files or to<br />

execute arbitrary PHP code on the remote host, subject to the privileges of the web server<br />

user ID.<br />

Solution: Upgrade to version 1.4.5 or higher.<br />

CVE-2006-1909<br />

Help Center Live < 2.1.0 osTicket Multiple SQL Injection<br />

<strong>PVS</strong> ID: 3521 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote web<br />

server is running Help Center Live, a help desk application written in PHP. The remote<br />

version of this software is vulnerable to a SQL Injection flaw. An attacker exploiting this<br />

flaw would send malformed HTTP requests to the web application that would, upon being<br />

parsed, execute arbitrary commands on the database server.<br />

Solution: Upgrade to version 2.1.0 or higher.<br />

CVE-2006-2039<br />

DeleGate < 8.11.6 Invalid DNS Response DoS<br />

<strong>PVS</strong> ID: 3522 FAMILY: DNS Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:21293<br />

Family Internet Services 908


Description: Synopsis :\n\nA rogue DNS server may crash the remote proxy.\n\nThe remote version of<br />

this software is vulnerable to a denial of service when processing invalid DNS responses.<br />

An attacker may exploit this flaw to disable this service remotely. To exploit this flaw, an<br />

attacker would need to be able to inject malformed DNS responses to the queries sent by<br />

the remote application.<br />

Solution: Upgrade to version 8.11.6 or higher.<br />

CVE-2006-2072<br />

ISC BIND < 9.3.3 DNS Message Malformed TSIG Remote DoS<br />

<strong>PVS</strong> ID: 3523 FAMILY: DNS Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote BIND DNS server is vulnerable to a flaw in the way that it handles TSIG responses.<br />

An attacker exploiting this flaw would need to have the ability to send malformed<br />

responses to the vulnerable DNS Server. Successful exploitation would lead to the BIND<br />

server crashing.<br />

Solution: Upgrade to version 9.3.3 or higher.<br />

CVE-2006-2073<br />

Oracle 10g Application Server SQL Injection<br />

<strong>PVS</strong> ID: 3524 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running a version of the Oracle 10g Application Server that is vulnerable to a remote<br />

SQL injection attack. An attacker exploiting this flaw would gain limited access to the<br />

remote database server. Successful exploitation would allow the attacker the ability to<br />

execute SQL commands on the database server.<br />

Solution: Upgrade to version 10.1.3.0.0 or higher.<br />

CVE-2007-1609<br />

ClamAV < 0.88.2 HTTP Header Remote Overflow<br />

<strong>PVS</strong> ID: 3525 FAMILY: Web Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running ClamAV, an antivirus application. The remote host is running version: \n %L<br />

\n\nThere is a remote buffer overflow within this version of ClamAV. Specifically, if an<br />

attacker were able to spoof or gain control of a ClamAV update server, the attacker could<br />

craft a malicious HTTP response that would trigger a buffer overflow. Successful<br />

exploitation would result in the execution of arbitrary code.<br />

Family Internet Services 909


Solution: Upgrade to version 0.88.2 or higher.<br />

Limbo CMS <<br />

CVE-2006-1989<br />

<strong>PVS</strong> ID: 3526 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the Limbo Content Management System (CMS). This version of Limbo is<br />

vulnerable to a flaw where remote attackers can include arbitrary code within HTTP<br />

requests. By using such a tactic, the remote attacker can execute arbitrary code with the<br />

permissions of the remote web server. In addition, the remote host is vulnerable to a SQL<br />

Injection attack. An attacker exploiting this flaw would send a malformed HTTP query to<br />

the server that would, upon parsing, cause the web server to execute arbitrary SQL<br />

commands on the backend database server.<br />

Solution: No solution is known at this time.<br />

CVE-2008-0734<br />

MySQL Remote Overflow and Information Disclosure Vulnerabilities<br />

<strong>PVS</strong> ID: 3527 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nAccording to its<br />

version number, the installation of MySQL on the remote host may be prone to multiple<br />

buffer overflows. The MySQL server is also vulnerable to multiple information disclosure<br />

flaws. An attacker exploiting the overflow would need to be able to authenticate to the<br />

MySQL server. An attacker exploiting the information disclosure flaw would only need to<br />

be able to send malformed 'login' packets to the server. This version of MySQL is also<br />

prone to a remote Denial of Service (DoS) due to an inability to properly parse a<br />

malformed call to the date_format function.<br />

Solution: Upgrade to version 4.0.27 / 4.1.19 / 5.0.27 / 5.1.10 or higher.<br />

sBLOG <<br />

CVE-2006-1516<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3528 FAMILY: CGI RISK: HIGH NESSUS ID:21313<br />

Description: The remote web server contains a PHP script that is prone to SQL injection attacks. The<br />

remote host is running sBLOG, a PHP-based blog application. The installed version of<br />

sBLOG fails to validate user input to the 'keyword' parameter of the 'search.php' script<br />

before using it to generate database queries. Regardless of PHP's 'magic_quotes_gpc'<br />

setting, an unauthenticated attacker can leverage this issue to manipulate database queries<br />

to bypass authentication, disclose sensitive information, modify data, or launch attacks<br />

against the underlying database.<br />

Family Internet Services 910


Solution: No solution is known at this time.<br />

CVE-2006-2189<br />

ArGoSoft FTP Server < 1.4.3.7 RNTO Overflow<br />

<strong>PVS</strong> ID: 3529 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the ArGoSoft FTP Server. This version of ArGoSoft FTP Server is vulnerable to a<br />

flaw when parsing a malicious RNTO command from an authenticated (or anonymous)<br />

user. An attacker exploiting this flaw would be able to execute arbitrary code on the remote<br />

FTP server.<br />

Solution: Upgrade to version 1.4.3.7 or higher.<br />

CVE-2006-2170<br />

CGI:IRC Server Detection<br />

<strong>PVS</strong> ID: 3530 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized according to<br />

corporate policy.\n\nThe remote host is running CGI:IRC, a web-based IRC client that<br />

allows users to access IRC channels via their web browser.<br />

Solution: Ensure that the application is authorized according to corporate policies and guidelines.<br />

CVE-2006-2148<br />

Mozilla Firefox < 1.5.0.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3531 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is using Firefox. The installed version of Firefox contains various security<br />

issues, several of which are critical as they can be easily exploited to execute arbitrary shell<br />

code on the remote host. The version of Firefox is vulnerable to multiple denial of service<br />

attacks, overflows, information disclosure, privilege escalation, and other issues. An<br />

attacker exploiting these flaws would need to be able to convince a user to browse to a<br />

malicious URI.<br />

Solution: Upgrade to version 1.5.0.3 or higher.<br />

CVE-2006-1993<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

FileZilla FTP Server < 0.9.17 MLSD Command Overflow<br />

Family Internet Services 911


<strong>PVS</strong> ID: 3532 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running FileZilla, an FTP server. There is a flaw in the remote version of this software that<br />

may allow an authenticated attacker to issue a malformed request such that a buffer<br />

overflow occurs. Successful exploitation would result in the attacker executing arbitrary<br />

code.<br />

Solution: Upgrade to version 0.9.17 or higher.<br />

CVE-2006-2173<br />

WarFTP Daemon < 1.82.00-RC11 Remote Overflow<br />

<strong>PVS</strong> ID: 3533 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running WarFTPd, an FTP server for the Microsoft platform. The version of WarFTPd<br />

running on this host contains a vulnerability that may allow a potential intruder to craft a<br />

special command such that execution of the command results in a buffer overflow.<br />

Successful exploitation would allow the attacker to execute arbitrary code on the remote<br />

server.<br />

Solution: Upgrade to version 1.82.00-RC11 or higher.<br />

CVE-2006-2171<br />

Gene6 FTP Server < 3.8.0.34 Multiple Command Remote Overflows<br />

<strong>PVS</strong> ID: 3534 FAMILY: FTP Servers RISK: HIGH NESSUS ID:21324<br />

Description: Synopsis :\n\nThe remote FTP server is affected by buffer overflow flaws.\n\nThe remote<br />

host appears to be using Gene6 FTP Server, a professional FTP server for Windows.<br />

According to its banner, the version of Gene6 FTP Server installed on the remote host<br />

contains buffer overflow vulnerabilities that can be exploited by an authenticated, possibly<br />

anonymous, user with specially-crafted 'MKD', 'RMD', 'XMKD', and 'XRMD' commands<br />

to crash the affected application or execute arbitrary code on the affected host.<br />

Solution: Upgrade to version 3.8.0.34 or higher.<br />

SAMI FTP Server <<br />

CVE-2006-2172<br />

<strong>PVS</strong> ID: 3535 FAMILY: FTP Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 912


Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running SAMI FTP server. It has been reported that this version of SAMI is vulnerable to a<br />

buffer overflow in the way that it handles USER and PASSWORD information. An<br />

attacker exploiting this flaw would be able to execute arbitrary code on the remote SAMI<br />

FTP server.<br />

Solution: No solution is known at this time.<br />

CVE-2006-2212<br />

AWStats < 6.6 migrate Variable Command Execution<br />

<strong>PVS</strong> ID: 3536 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an arbitrary 'command insertion'<br />

flaw.\n\nThe remote host is running AWStats, a CGI log analyzer. There are various<br />

content-parsing flaws in the remote version of this software that would allow an attacker to<br />

execute code on the remote host. An attacker exploiting this flaw would only need to be<br />

able to generate HTTP requests to the awstats.pl CGI script. A successful attack would<br />

allow the attacker to run system commands with the privileges of the CGI script.<br />

Solution: Upgrade to version 6.6 or higher.<br />

CVE-2006-2237<br />

Distributed <strong>Network</strong> Protocol v3 Client Detection (SCADA)<br />

<strong>PVS</strong> ID: 3552 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is running the Distributed <strong>Network</strong> Protocol v3 client. This<br />

protocol is common on SCADA networks and should be protected or segmented from<br />

the production network.<br />

Solution: N/A<br />

CVE Not available<br />

Distributed <strong>Network</strong> Protocol v3 Server Detection<br />

<strong>PVS</strong> ID: 3553 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is running the Distributed <strong>Network</strong> Protocol v3 server. This<br />

protocol is common on SCADA networks and should be protected or segmented from<br />

the production network.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 913


COTP Server Detection (SCADA)<br />

<strong>PVS</strong> ID: 3554 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is running the ISO 8073 Connection-Oriented Transport Protocol. This<br />

protocol is common on SCADA networks and should be protected or segmented from the<br />

production network.<br />

Solution: N/A<br />

CVE Not available<br />

COTP Client Detection (SCADA)<br />

<strong>PVS</strong> ID: 3555 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is running the ISO 8073 Connection-Oriented Transport Protocol. This<br />

protocol is common on SCADA networks and should be protected or segmented from the<br />

production network.<br />

Solution: N/A<br />

CVE Not available<br />

MODBUS Server Detection (SCADA)<br />

<strong>PVS</strong> ID: 3556 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is running the MODBUS protocol. This protocol is common on SCADA<br />

or process control networks.<br />

Solution: N/A<br />

CVE Not available<br />

MODBUS Client Detection (SCADA)<br />

<strong>PVS</strong> ID: 3557 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is running the MODBUS protocol. This protocol is common on SCADA<br />

or process control networks.<br />

Solution: N/A<br />

Nagios Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 3558 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 914


Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running Nagios, an open-source application that allows<br />

administrators to track the availability of network hosts.<br />

Solution: Ensure that Nagios is only accessible from trusted IP ranges, running the latest version, and<br />

requires strong authentication.<br />

CVE Not available<br />

IBM WebSphere < 6.0.2.3 Authentication Bypass<br />

<strong>PVS</strong> ID: 3559 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote WebSphere web server is vulnerable to an<br />

information leak. There is a flaw in the way that WebSphere processes filtered requests<br />

which end with a '/'. For instance, if the file test.jsp required authentication, an attacker<br />

could simply request test.jsp/ and retrieve the page.<br />

Solution: Upgrade to version 6.0.2.3 or higher.<br />

CVE-2006-2342<br />

PHP-Fusion < 6.00.307 Local File Inclusion<br />

<strong>PVS</strong> ID: 3560 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nAccording to its version number, the remote host is running a<br />

version of PHP-Fusion that suffers from a flaw where remote attackers can specify arbitrary<br />

'include' files which will be retrieved and displayed by the web server. An attacker<br />

exploiting this flaw would simply need to supply '../' to the PHP-Fusion<br />

application. Successful exploitation would result in the attacker gaining access to<br />

confidential data.<br />

Solution: Upgrade to version 6.00.307 or higher.<br />

MyBB <<br />

CVE-2006-2331<br />

<strong>PVS</strong> ID: 3561 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote<br />

version of MyBB does not properly parse user-supplied input to the showthread.php script.<br />

An attacker can pass data to showthread.php such that, upon parsing, the web server is<br />

tricked into sending a malformed SQL query to the backend database. Successful<br />

exploitation results in the attacker executing arbitrary SQL commands on the database.<br />

Family Internet Services 915


Solution: No solution is known at this time.<br />

CVE-2006-2336<br />

Simple Scanning Tool (SAT) Scanner Detection<br />

<strong>PVS</strong> ID: 3562 FAMILY: Policy<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized according to<br />

corporate policy.\n\nThe remote host is running an instance of the SAT vulnerability<br />

scanner.<br />

Solution: Ensure that the owner of this machine is scanning within corporate policy.<br />

CVE Not available<br />

Windows XP SP1 VPN Detection<br />

<strong>PVS</strong> ID: 3563 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Windows XP SP1 VPN Server. A VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN that allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

Windows 2003 or XP SP2 VPN Detection<br />

<strong>PVS</strong> ID: 3564 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Windows 2003 or XP SP2 VPN Server. A VPN (Virtual<br />

Private <strong>Network</strong>) allows remote users to connect to an internal network as if they were<br />

local users. A VPN that allows split-tunneling will essentially serve as a bridge between the<br />

remote network and the internal network. Special care should be taken to ensure that<br />

remote VPN clients connect securely and do not introduce an unacceptable level of risk to<br />

the internal computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

Firewall-1 NGX VPN Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3565 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 916


Description: The remote host is running the Firewall-1 NGX VPN Server. A VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN that allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

SSH IPSEC Express 4.1.1 VPN Detection<br />

<strong>PVS</strong> ID: 3566 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the SSH IPSEC Express 4.1.1 VPN Server. A VPN (Virtual<br />

Private <strong>Network</strong>) allows remote users to connect to an internal network as if they were<br />

local users. A VPN that allows split-tunneling will essentially serve as a bridge between the<br />

remote network and the internal network. Special care should be taken to ensure that<br />

remote VPN clients connect securely and do not introduce an unacceptable level of risk to<br />

the internal computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

SSH IPSEC Express 5.0 VPN Detection<br />

<strong>PVS</strong> ID: 3567 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the SSH IPSEC Express 5.0 VPN Server. A VPN (Virtual<br />

Private <strong>Network</strong>) allows remote users to connect to an internal network as if they were<br />

local users. A VPN that allows split-tunneling will essentially serve as a bridge between the<br />

remote network and the internal network. Special care should be taken to ensure that<br />

remote VPN clients connect securely and do not introduce an unacceptable level of risk to<br />

the internal computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

SSH IPSEC Express 5.0.0 VPN Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3568 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the SSH IPSEC Express 5.0.0 VPN Server. A VPN (Virtual<br />

Private <strong>Network</strong>) allows remote users to connect to an internal network as if they were<br />

local users. A VPN that allows split-tunneling will essentially serve as a bridge between the<br />

remote network and the internal network. Special care should be taken to ensure that<br />

remote VPN clients connect securely and do not introduce an unacceptable level of risk to<br />

the internal computing environment.<br />

Family Internet Services 917


Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

SSH IPSEC Express 5.1.0 VPN Detection<br />

<strong>PVS</strong> ID: 3569 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the SSH IPSEC Express 5.1.0 VPN Server. A VPN (Virtual<br />

Private <strong>Network</strong>) allows remote users to connect to an internal network as if they were<br />

local users. A VPN that allows split-tunneling will essentially serve as a bridge between the<br />

remote network and the internal network. Special care should be taken to ensure that<br />

remote VPN clients connect securely and do not introduce an unacceptable level of risk to<br />

the internal computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

SSH IPSEC Express 5.1.1 VPN Detection<br />

<strong>PVS</strong> ID: 3570 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the SSH IPSEC Express 5.1.1 VPN Server. A VPN (Virtual<br />

Private <strong>Network</strong>) allows remote users to connect to an internal network as if they were<br />

local users. A VPN that allows split-tunneling will essentially serve as a bridge between the<br />

remote network and the internal network. Special care should be taken to ensure that<br />

remote VPN clients connect securely and do not introduce an unacceptable level of risk to<br />

the internal computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

RFC 3947 NAT-T VPN Detection<br />

<strong>PVS</strong> ID: 3571 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the RFC 3947 NAT-T VPN Server. A VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN that allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 918


Nortel Contivity VPN Detection<br />

<strong>PVS</strong> ID: 3572 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Nortel Contivity VPN Server. A VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN that allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

SonicWall VPN Detection<br />

<strong>PVS</strong> ID: 3573 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the SonicWall VPN Server. A VPN (Virtual Private <strong>Network</strong>)<br />

allows remote users to connect to an internal network as if they were local users. A VPN<br />

that allows split-tunneling will essentially serve as a bridge between the remote network<br />

and the internal network. Special care should be taken to ensure that remote VPN clients<br />

connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

SSH QuickSec 0.9.0 VPN Detection<br />

<strong>PVS</strong> ID: 3574 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the SSH QuickSec 0.9.0 VPN Server. A VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN that allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to corporate guidelines and policies.<br />

CVE Not available<br />

SSH QuickSec 1.1.0 VPN Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3575 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 919


Description: The remote host is running the SSH QuickSec 1.1.0 VPN Server. A VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN that allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

SSH QuickSec 1.1.1 VPN Detection<br />

<strong>PVS</strong> ID: 3576 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the SSH QuickSec 1.1.1 VPN Server. A VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN that allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

SSH QuickSec 1.1.2 VPN Detection<br />

<strong>PVS</strong> ID: 3577 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the SSH QuickSec 1.1.2 VPN Server. A VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN that allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

SSH QuickSec 1.1.3 VPN Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3578 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the SSH QuickSec 1.1.3 VPN Server. A VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN that allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Family Internet Services 920


Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

MacOS 10.x VPN Detection<br />

<strong>PVS</strong> ID: 3579 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the MacOS 10.x VPN Server. A VPN (Virtual Private <strong>Network</strong>)<br />

allows remote users to connect to an internal network as if they were local users. A VPN<br />

that allows split-tunneling will essentially serve as a bridge between the remote network<br />

and the internal network. Special care should be taken to ensure that remote VPN clients<br />

connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

StrongSwan 2.2.0 VPN Detection<br />

<strong>PVS</strong> ID: 3580 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the StrongSwan 2.2.0 VPN Server. A VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN that allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

StrongSwan 2.2.1 VPN Detection<br />

<strong>PVS</strong> ID: 3581 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the StrongSwan 2.2.1 VPN Server. A VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN that allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable accoirding to corporate guidelines and policies.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 921


StrongSwan 2.2.2 VPN Detection<br />

<strong>PVS</strong> ID: 3582 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the StrongSwan 2.2.2 VPN Server. A VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN that allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

StrongSwan 2.3.0 VPN Detection<br />

<strong>PVS</strong> ID: 3583 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the StrongSwan 2.3.0 VPN Server. A VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN that allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

StrongSwan 2.3.1 VPN Detection<br />

<strong>PVS</strong> ID: 3584 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the StrongSwan 2.3.1 VPN Server. A VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN that allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

StrongSwan 2.3.2 VPN Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3585 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 922


Description: The remote host is running the StrongSwan 2.3.2 VPN Server. A VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN that allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

StrongSwan 2.4.0 VPN Detection<br />

<strong>PVS</strong> ID: 3586 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the StrongSwan 2.4.0 VPN Server. A VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN that allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

StrongSwan 2.4.1 VPN Detection<br />

<strong>PVS</strong> ID: 3587 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the StrongSwan 2.4.1 VPN Server. A VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN that allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

XyXEL ZyWALL Router VPN Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3588 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the XyXEL ZyWALL Router VPN Server. A VPN (Virtual<br />

Private <strong>Network</strong>) allows remote users to connect to an internal network as if they were<br />

local users. A VPN that allows split-tunneling will essentially serve as a bridge between the<br />

remote network and the internal network. Special care should be taken to ensure that<br />

remote VPN clients connect securely and do not introduce an unacceptable level of risk to<br />

the internal computing environment.<br />

Family Internet Services 923


Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

Linux FreeS/WAN 2.00 VPN Detection<br />

<strong>PVS</strong> ID: 3589 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Linux FreeS/WAN 2.00 VPN Server. A VPN (Virtual<br />

Private <strong>Network</strong>) allows remote users to connect to an internal network as if they were<br />

local users. A VPN that allows split-tunneling will essentially serve as a bridge between the<br />

remote network and the internal network. Special care should be taken to ensure that<br />

remote VPN clients connect securely and do not introduce an unacceptable level of risk to<br />

the internal computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

Linux FreeS/WAN 2.01 VPN Detection<br />

<strong>PVS</strong> ID: 3590 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Linux FreeS/WAN 2.01 VPN Server. A VPN (Virtual<br />

Private <strong>Network</strong>) allows remote users to connect to an internal network as if they were<br />

local users. A VPN that allows split-tunneling will essentially serve as a bridge between the<br />

remote network and the internal network. Special care should be taken to ensure that<br />

remote VPN clients connect securely and do not introduce an unacceptable level of risk to<br />

the internal computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

Linux FreeS/WAN 2.02 VPN Detection<br />

<strong>PVS</strong> ID: 3591 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Linux FreeS/WAN 2.02 VPN Server. A VPN (Virtual<br />

Private <strong>Network</strong>) allows remote users to connect to an internal network as if they were<br />

local users. A VPN that allows split-tunneling will essentially serve as a bridge between the<br />

remote network and the internal network. Special care should be taken to ensure that<br />

remote VPN clients connect securely and do not introduce an unacceptable level of risk to<br />

the internal computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 924


Linux FreeS/WAN 2.03 VPN Detection<br />

<strong>PVS</strong> ID: 3592 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Linux FreeS/WAN 2.03 VPN Server. A VPN (Virtual<br />

Private <strong>Network</strong>) allows remote users to connect to an internal network as if they were<br />

local users. A VPN that allows split-tunneling will essentially serve as a bridge between the<br />

remote network and the internal network. Special care should be taken to ensure that<br />

remote VPN clients connect securely and do not introduce an unacceptable level of risk to<br />

the internal computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

Linux FreeS/WAN 2.04 VPN Detection<br />

<strong>PVS</strong> ID: 3593 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Linux FreeS/WAN 2.04 VPN Server. A VPN (Virtual<br />

Private <strong>Network</strong>) allows remote users to connect to an internal network as if they were<br />

local users. A VPN that allows split-tunneling will essentially serve as a bridge between the<br />

remote network and the internal network. Special care should be taken to ensure that<br />

remote VPN clients connect securely and do not introduce an unacceptable level of risk to<br />

the internal computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

Linux FreeS/WAN 2.05 VPN Detection<br />

<strong>PVS</strong> ID: 3594 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Linux FreeS/WAN 2.05 VPN Server. A VPN (Virtual<br />

Private <strong>Network</strong>) allows remote users to connect to an internal network as if they were<br />

local users. A VPN that allows split-tunneling will essentially serve as a bridge between the<br />

remote network and the internal network. Special care should be taken to ensure that<br />

remote VPN clients connect securely and do not introduce an unacceptable level of risk to<br />

the internal computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

Linux FreeS/WAN 2.06 VPN Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3595 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 925


Description: The remote host is running the Linux FreeS/WAN 2.06 VPN Server. A VPN (Virtual<br />

Private <strong>Network</strong>) allows remote users to connect to an internal network as if they were<br />

local users. A VPN that allows split-tunneling will essentially serve as a bridge between the<br />

remote network and the internal network. Special care should be taken to ensure that<br />

remote VPN clients connect securely and do not introduce an unacceptable level of risk to<br />

the internal computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

Openswan 2.2.0 VPN Detection<br />

<strong>PVS</strong> ID: 3596 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Openswan 2.2.0 VPN Server. A VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN that allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

Openswan 2.3.0 VPN Detection<br />

<strong>PVS</strong> ID: 3597 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Openswan 2.3.0 VPN Server. A VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN that allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

OpenPGP VPN Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3598 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the OpenPGP VPN Server. A VPN (Virtual Private <strong>Network</strong>)<br />

allows remote users to connect to an internal network as if they were local users. A VPN<br />

that allows split-tunneling will essentially serve as a bridge between the remote network<br />

and the internal network. Special care should be taken to ensure that remote VPN clients<br />

connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Family Internet Services 926


Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

FortiGate VPN Detection<br />

<strong>PVS</strong> ID: 3599 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the FortiGate VPN Server. A VPN (Virtual Private <strong>Network</strong>)<br />

allows remote users to connect to an internal network as if they were local users. A VPN<br />

that allows split-tunneling will essentially serve as a bridge between the remote network<br />

and the internal network. Special care should be taken to ensure that remote VPN clients<br />

connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

Netscreen VPN Detection<br />

<strong>PVS</strong> ID: 3600 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Netscreen VPN Server. A VPN (Virtual Private <strong>Network</strong>)<br />

allows remote users to connect to an internal network as if they were local users. A VPN<br />

that allows split-tunneling will essentially serve as a bridge between the remote network<br />

and the internal network. Special care should be taken to ensure that remote VPN clients<br />

connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

Netscreen VPN Detection<br />

<strong>PVS</strong> ID: 3601 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Netscreen VPN Server. A VPN (Virtual Private <strong>Network</strong>)<br />

allows remote users to connect to an internal network as if they were local users. A VPN<br />

that allows split-tunneling will essentially serve as a bridge between the remote network<br />

and the internal network. Special care should be taken to ensure that remote VPN clients<br />

connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 927


Netscreen VPN Detection<br />

<strong>PVS</strong> ID: 3602 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Netscreen VPN Server. A VPN (Virtual Private <strong>Network</strong>)<br />

allows remote users to connect to an internal network as if they were local users. A VPN<br />

that allows split-tunneling will essentially serve as a bridge between the remote network<br />

and the internal network. Special care should be taken to ensure that remote VPN clients<br />

connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

Netscreen VPN Detection<br />

<strong>PVS</strong> ID: 3603 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Netscreen VPN Server. A VPN (Virtual Private <strong>Network</strong>)<br />

allows remote users to connect to an internal network as if they were local users. A VPN<br />

that allows split-tunneling will essentially serve as a bridge between the remote network<br />

and the internal network. Special care should be taken to ensure that remote VPN clients<br />

connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

Netscreen VPN Detection<br />

<strong>PVS</strong> ID: 3604 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Netscreen VPN Server. A VPN (Virtual Private <strong>Network</strong>)<br />

allows remote users to connect to an internal network as if they were local users. A VPN<br />

that allows split-tunneling will essentially serve as a bridge between the remote network<br />

and the internal network. Special care should be taken to ensure that remote VPN clients<br />

connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

Netscreen VPN Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3605 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 928


Description: The remote host is running the Netscreen VPN Server. A VPN (Virtual Private <strong>Network</strong>)<br />

allows remote users to connect to an internal network as if they were local users. A VPN<br />

that allows split-tunneling will essentially serve as a bridge between the remote network<br />

and the internal network. Special care should be taken to ensure that remote VPN clients<br />

connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

Netscreen VPN Detection<br />

<strong>PVS</strong> ID: 3606 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Netscreen VPN Server. A VPN (Virtual Private <strong>Network</strong>)<br />

allows remote users to connect to an internal network as if they were local users. A VPN<br />

that allows split-tunneling will essentially serve as a bridge between the remote network<br />

and the internal network. Special care should be taken to ensure that remote VPN clients<br />

connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

Netscreen VPN Detection<br />

<strong>PVS</strong> ID: 3607 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Netscreen VPN Server. A VPN (Virtual Private <strong>Network</strong>)<br />

allows remote users to connect to an internal network as if they were local users. A VPN<br />

that allows split-tunneling will essentially serve as a bridge between the remote network<br />

and the internal network. Special care should be taken to ensure that remote VPN clients<br />

connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

Netscreen VPN Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3608 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Netscreen VPN Server. A VPN (Virtual Private <strong>Network</strong>)<br />

allows remote users to connect to an internal network as if they were local users. A VPN<br />

that allows split-tunneling will essentially serve as a bridge between the remote network<br />

and the internal network. Special care should be taken to ensure that remote VPN clients<br />

connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Family Internet Services 929


Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

Netscreen VPN Detection<br />

<strong>PVS</strong> ID: 3609 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Netscreen VPN Server. A VPN (Virtual Private <strong>Network</strong>)<br />

allows remote users to connect to an internal network as if they were local users. A VPN<br />

that allows split-tunneling will essentially serve as a bridge between the remote network<br />

and the internal network. Special care should be taken to ensure that remote VPN clients<br />

connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

Netscreen VPN Detection<br />

<strong>PVS</strong> ID: 3610 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Netscreen VPN Server. A VPN (Virtual Private <strong>Network</strong>)<br />

allows remote users to connect to an internal network as if they were local users. A VPN<br />

that allows split-tunneling will essentially serve as a bridge between the remote network<br />

and the internal network. Special care should be taken to ensure that remote VPN clients<br />

connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

Netscreen VPN Detection<br />

<strong>PVS</strong> ID: 3611 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Netscreen VPN Server. A VPN (Virtual Private <strong>Network</strong>)<br />

allows remote users to connect to an internal network as if they were local users. A VPN<br />

that allows split-tunneling will essentially serve as a bridge between the remote network<br />

and the internal network. Special care should be taken to ensure that remote VPN clients<br />

connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 930


Avaya VPN Detection<br />

<strong>PVS</strong> ID: 3612 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Avaya VPN Server. A VPN (Virtual Private <strong>Network</strong>)<br />

allows remote users to connect to an internal network as if they were local users. A VPN<br />

that allows split-tunneling will essentially serve as a bridge between the remote network<br />

and the internal network. Special care should be taken to ensure that remote VPN clients<br />

connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

StoneGate VPN Detection<br />

<strong>PVS</strong> ID: 3613 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the StoneGate VPN Server. A VPN (Virtual Private <strong>Network</strong>)<br />

allows remote users to connect to an internal network as if they were local users. A VPN<br />

that allows split-tunneling will essentially serve as a bridge between the remote network<br />

and the internal network. Special care should be taken to ensure that remote VPN clients<br />

connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

StoneGate VPN Detection<br />

<strong>PVS</strong> ID: 3614 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the StoneGate VPN Server. A VPN (Virtual Private <strong>Network</strong>)<br />

allows remote users to connect to an internal network as if they were local users. A VPN<br />

that allows split-tunneling will essentially serve as a bridge between the remote network<br />

and the internal network. Special care should be taken to ensure that remote VPN clients<br />

connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable according to corporate guidelines and policies.<br />

CVE Not available<br />

EMC Retrospect Client Packet Handling Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3615 FAMILY: Generic RISK: HIGH NESSUS ID:21327<br />

Family Internet Services 931


Description: Synopsis :\n\nIt is possible to execute code on the remote backup client.\n\nAccording to<br />

its version number, the installed instance of Retrospect client is vulnerable to a buffer<br />

overflow when it receives a packet starting with a specially-crafted sequence of bytes. An<br />

unauthenticated remote attacker may be able to exploit this flaw to execute code on the<br />

remote host.<br />

Solution: Upgrade to version 6.5.140 ,7.0.112, 7.5.116 or higher.<br />

CVE-2006-2391<br />

Quicktime < 7.1 on Mac OS X Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3616 FAMILY: Web Clients RISK: HIGH NESSUS ID:21554<br />

Description: Synopsis :\n\nThe remote version of QuickTime is affected by multiple overflow<br />

vulnerabilities.\n\nThe remote Mac OS X host is running a version of Quicktime prior to<br />

7.1. The remote version of Quicktime is vulnerable to various integer and buffer overflows<br />

involving specially-crafted image and media files. An attacker may be able to leverage<br />

these issues to execute arbitrary code on the remote host by sending a malformed file to a<br />

victim and having it opened using QuickTime player.<br />

Solution: Install version 7.1 or higher.<br />

CVE-2006-1460<br />

Mac OS X Multiple Vulnerabilities (<strong>Security</strong> Update 2006-003)<br />

<strong>PVS</strong> ID: 3617 FAMILY: Operating System Detection RISK: HIGH NESSUS ID:21341<br />

Description: Synopsis :\n\nThe remote operating system is missing vendor supplied patches.\n\nThe<br />

remote host is running Apple Mac OS X, but lacks <strong>Security</strong> Update 2006-003. This security<br />

update contains fixes for the following applications<br />

:\nAppKit\nImageIO\nBOM\nCF<strong>Network</strong>\nClamAV (Mac OS X Server<br />

only)\nCoreFoundation\nCoreGraphics\nFinder\nFTPServer\nFlash<br />

Player\nKeyChain\nLaunchServices\nlibcurl\nMail\nMySQL Manager (Mac OS X Server<br />

only)\nPreview\nQuickDraw\nQuickTime Streaming Server\nRuby\nSafari<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-1457<br />

BEA WebLogic Server Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3618 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of BEA WebLogic Server that is vulnerable to eleven (11) distinct<br />

vulnerabilities. An attacker exploiting these flaws would be able to impact availability,<br />

confidentiality and integrity.<br />

Family Internet Services 932


Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

SonicWall Firewall Detection<br />

<strong>PVS</strong> ID: 3619 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a SonicWall Firewall.<br />

Solution: N/A<br />

CVE Not available<br />

FortressSSH < 0.47 SSH_MSG_KEXINIT Logging Remote Overflow<br />

<strong>PVS</strong> ID: 3620 FAMILY: SSH RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of the FortressSSH SSH server that is vulnerable to a remote buffer<br />

overflow. An attacker exploiting this flaw would send a malformed key exchange.<br />

Successful exploitation would give the attacker the ability to execute arbitrary code on the<br />

remote server.<br />

Solution: Upgrade to version 0.47 or higher.<br />

CVE-2006-2421<br />

Resin < 3.0.19 Directory Traversal and Path Disclosure Vulnerabilities<br />

<strong>PVS</strong> ID: 3621 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote web<br />

server is running Resin. Versions 3.0.17 and 3.0.18 are vulnerable to multiple flaws which<br />

impact Confidentiality. An attacker exploiting these flaws would be able to disclose<br />

physical paths and read files outside of the web server root directory. Reading of<br />

confidential files could lead to more sophisticated attacks.<br />

Solution: Upgrade to version 3.0.19 or higher.<br />

CVE-2006-1953<br />

PHP-Fusion < 6.00.308 SQL Injection<br />

<strong>PVS</strong> ID: 3622 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nAccording to its<br />

version number, the remote host is running a version of PHP-Fusion that suffers from a<br />

flaw within the 'messages.php' script. messages.php fails to correctly parse user-supplied<br />

data and is vulnerable to a SQL injection attack. An attacker exploiting this flaw would<br />

Family Internet Services 933


send a specially formed query to the script. Successful exploitation would result in the<br />

attacker being able to execute arbitrary SQL commands on the backend database server.<br />

Solution: Upgrade to version 6.00.308 or higher.<br />

CVE-2006-2459<br />

QuickBooks Enterprise Database Server Detection<br />

<strong>PVS</strong> ID: 3623 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running QuickBooks Enterprise. This software is used to manage<br />

accounting data and often contains confidential information. This server is acting as the<br />

central server that hosts corporate database files.<br />

Solution: Ensure that this server utilizes strong authentication and access controls.<br />

CVE Not available<br />

WhatsUp <strong>Network</strong> Monitoring Tool Detection<br />

<strong>PVS</strong> ID: 3624 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running WhatsUp, a network monitoring tool that discovers and<br />

monitors network resources.<br />

Solution: N/A<br />

CVE Not available<br />

WhatsUp <strong>Network</strong> Monitoring Tool Default Administrative Credentials<br />

<strong>PVS</strong> ID: 3625 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running WhatsUp, a network monitoring tool that<br />

discovers and monitors network resources. The remote install of WhatsUp is still utilizing<br />

the default administrative credentials (e.g. admin/admin). An attacker exploiting this flaw<br />

would be able to log into the application and gain information regarding the network,<br />

change the configuration of the device, and run arbitrary administrative commands on the<br />

WhatsUp application.<br />

Solution: Change the default passwords for the application.<br />

CVE Not available<br />

FCKeditor with PHPNuke < 2.3 Beta upload.php Arbitrary File Upload<br />

<strong>PVS</strong> ID: 3626 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:21573<br />

Family Internet Services 934


Description: Synopsis :\n\nThe remote web server contains a PHP application that is affected by an<br />

arbitrary file upload vulnerability.\n\nThe version of FCKeditor installed on the remote<br />

host allows an unauthenticated attacker to upload arbitrary files containing PHP code and<br />

then to execute them subject to the privileges of the web server user ID.<br />

Solution: Either edit 'editor/filemanager/upload/php/config.php' to disable file uploads or upgrade to<br />

FCKeditor 2.3 Beta or higher.<br />

CVE-2006-2529<br />

Skype Technologies < 2.5.0.78 Arbitrary File Download<br />

<strong>PVS</strong> ID: 3627 FAMILY: Internet Messengers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is using Skype, a peer-to-peer chat and VoIP<br />

software. The remote version of this software contains a flaw where a Skype client,<br />

previously configured to allow downloads, will allow remote attackers to download<br />

arbitrary files from the local file system. This can allow attackers to gain access to<br />

confidential data that may be useful for more sophisticated attacks.<br />

Solution: Upgrade to version 2.5.0.78 or higher.<br />

CVE-2006-2312<br />

Cyrus IMAPD < 2.3.4 'POP3D USER' Command Remote Overflow<br />

<strong>PVS</strong> ID: 3628 FAMILY: IMAP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nAccording to its<br />

banner, the remote Cyrus IMAPD server is vulnerable to a remote buffer overflow attack.<br />

The flaw is in the way that IMAPD handles malformed data sent with the 'POP3D USER'<br />

command. An attacker exploiting this flaw would need to be able to communicate with the<br />

IMAPD server (usually on TCP port 143). A successful attack would result in the attacker<br />

executing arbitrary code on the IMAPD server.<br />

Solution: Upgrade to version 2.3.4 or higher.<br />

CVE-2006-2502<br />

XOOPS < 2.0.9.4 include/common.php nocommon Parameter Local File Inclusion<br />

<strong>PVS</strong> ID: 3629 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:21581<br />

Description: Synopsis :\n\nThe remote web server contains a PHP application that is vulnerable to local<br />

file include attacks.\n\nThe version of XOOPS installed on the remote host allows an<br />

unauthenticated attacker to skip processing of the application's 'include/common.php' script<br />

and thereby to gain control of the variables '$xoopsConfig[language]' and<br />

'$xoopsConfig[theme_set]', which are used by various scripts to include PHP code from<br />

Family Internet Services 935


other files. Successful exploitation of these issues requires that PHP's 'register_globals'<br />

setting be enabled and can be used to view arbitrary files or to execute arbitrary PHP code<br />

on the remote host, subject to the privileges of the web server user ID.<br />

Solution: Upgrade to version 2.0.9.4 or higher.<br />

CVE-2006-2516<br />

<strong>Network</strong>er Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3630 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running EMC Legato <strong>Network</strong>er, an enterprise application that enables centralized file<br />

management, backup and more. This version of <strong>Network</strong>er is vulnerable to a number of<br />

vulnerabilities including buffer overflows. Given this, an attacker can gain full control of<br />

the remote server using a number of attack vectors.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-3658<br />

Woltlab Burning Board < 2.3.5 links.php cat Parameter SQL Injection<br />

<strong>PVS</strong> ID: 3631 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running Woltlab Burning Board, a web bulletin board written<br />

in PHP. This version of Burning Board is vulnerable to a remote SQL Injection attack. An<br />

attacker exploiting this flaw would send a malformed 'cat' parameter to the 'links.php'<br />

script. Succesful exploitation would result in the attacker being able to read or write<br />

confidential data. In some instances, the attacker may be able to execute arbitrary code on<br />

the remote database server.<br />

Solution: Upgrade to version 2.3.5 or higher.<br />

CVE-2006-3256<br />

PostgreSQL SQL Injection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3632 FAMILY: Database RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running PostgreSQL, an open source relational database. This version is vulnerable to a<br />

SQL Injection flaw when passed properly formatted SQL queries coupled with<br />

invalidly-encoded multibyte data. An attacker exploiting this flaw would need to be able to<br />

send queries to the PostgreSQL server. As such, this exploit typically requires<br />

authentication. Successful exploitation would result in the attacker executing arbitrary SQL<br />

commands on the database server.<br />

Family Internet Services 936


Solution: Upgrade to version 7.3.15, 7.4.13, 8.0.8, 8.1.4, or higher.<br />

CVE-2006-2314<br />

Nucleus CMS < 3.23 PLUGINADMIN.php DIR_LIBS Parameter Remote File Inclusion<br />

<strong>PVS</strong> ID: 3633 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:21596<br />

Description: Synopsis :\n\nThe remote web server contains a PHP script that is prone to remote file<br />

inclusion attacks.\n\nThe remote host is running Nucleus CMS, an open-source content<br />

management system. The version of Nucleus CMS installed on the remote host fails to<br />

sanitize input to the 'DIR_LIBS' parameter before using it in a PHP include() function in<br />

the 'nucleus/libs/PLUGINADMIN.php' script. Provided PHP's 'register_globals' setting is<br />

enabled, an unauthenticated attacker may be able to exploit this flaw to view arbitrary files<br />

on the remote host or to execute arbitrary PHP code, possibly taken from third-party hosts.<br />

Solution: Upgrade to version 3.23 or higher.<br />

CVE-2006-2583<br />

MDaemon < 8.1.4 Remote Overflow<br />

<strong>PVS</strong> ID: 3634 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Alt-N MDaemon, an SMTP/IMAP server for Windows. According to its banner,<br />

the version of MDaemon on the remote host is prone to a remote buffer overflow. Versions<br />

of Alt-N prior to 8.1.4 are vulnerable. The attacker exploiting this flaw would send a<br />

malformed request before the authentication process. Successful exploitation would allow<br />

the attacker to execute arbitrary code.<br />

Solution: Upgrade to version 8.1.4 or higher.<br />

CVE-2006-2646<br />

Geeklog < 1.4.0sr3 Multiple Injection Vulnerabilities<br />

<strong>PVS</strong> ID: 3635 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Geeklog, an open-source weblog powered by PHP and MySQL. The installed<br />

version of Geeklog is vulnerable to both Cross-Site Scripting and SQL Injection flaws. An<br />

attacker exploiting the SQL injection flaw would be able to execute arbitrary SQL<br />

commands on the backend database server. Exploitation of the XSS flaws would enable the<br />

attacker to execute script code within the vulnerable user's browser.<br />

Solution: Upgrade to version 1.4.0sr3 or higher.<br />

CVE-2006-2699<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 937


Firefox < 1.5.0.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3636 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is using Firefox. The installed version of Firefox contains multiple flaws that could allow<br />

an attacker to execute arbitrary code, disable the service, or gain access to confidential data.<br />

An attacker exploiting this flaw would need to be able to convince a user to browse to a<br />

malicious URI.<br />

Solution: Upgrade to version 1.5.0.4 or higher.<br />

CVE-2006-2781<br />

SeaMonkey < 1.0.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3637 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is using SeaMonkey. The installed version of SeaMonkey contains various<br />

security issues that may allow an attacker to execute code or escalate privileges on the<br />

remote browser. An attacker exploiting these flaws would need to be able to convince a<br />

user to browse to a malicious URI.<br />

Solution: Upgrade to version 1.0.2 or higher.<br />

CVE-2006-2781<br />

Thunderbird < 1.5.0.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3638 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is running a vulnerable version of Mozilla Thunderbird mail client. This<br />

version of Thunderbird is vulnerable to multiple flaws that might allow an attacker to<br />

launch Denial of Service attacks, buffer overflows, information disclosure, privilege<br />

escalation, and other issues. An attacker exploiting these flaws would need to be able to<br />

convince a user to open or read a malicious email. Successful exploitation would, at the<br />

most, give the attacker the ability to execute arbitrary code with the permissions of the user<br />

running Thunderbird.<br />

Solution: Upgrade to version 1.5.0.4 or higher.<br />

CVE-2006-2781<br />

SquirrelMail < 1.4.8 Local File Inclusion<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3639 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 938


Description: Synopsis :\n\nThe remote host is vulnerable to a remote 'file include' flaw.\n\nThe remote<br />

host is running Squirrelmail, a web-based email client. This version of Squirrelmail is<br />

vulnerable to a 'file include' flaw within the redirect.php script. An attacker exploiting this<br />

flaw would be able to execute local commands. This can lead to the reading, writing or<br />

deletion of critical data. To exploit this flaw, the attacker would only need to be able to<br />

send web requests to the server.<br />

Solution: Upgrade to version 1.4.8 or higher.<br />

CVE-2006-2842<br />

SpamAssassin spamd vpopmail Username Command Injection<br />

<strong>PVS</strong> ID: 3640 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an arbitrary 'command insertion'<br />

flaw.\n\nThe remote host is running SpamAssassin, an anti-spam software application that<br />

detects and blocks spam emails. Due to a content-parsing error, SpamAssassin can be<br />

tricked into executing arbitrary commands with the privileges of the SpamAssassin spamd<br />

process. Additionally, the remote version of SpamAssassin must be running with either<br />

'--vpopmail' or '--paranoid' enabled.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-2447<br />

BASE < 1.2.5 BASE_path Parameter Remote File Inclusion<br />

<strong>PVS</strong> ID: 3641 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:21611<br />

Description: Synopsis :\n\nThe remote web server contains a PHP application that is prone to remote file<br />

inclusion attacks.\n\nThe remote host is running BASE, a web-based tool for analyzing<br />

alerts from one or more SNORT sensors. The version of BASE installed on the remote host<br />

fails to sanitize input to the 'BASE_path' parameter before using it in PHP include_once()<br />

function in several scripts. Provided PHP's 'register_globals' setting is enabled, an<br />

unauthenticated attacker may be able to exploit this flaw to view arbitrary files on the<br />

remote host or to execute arbitrary PHP code, possibly taken from third-party hosts.<br />

Solution: Upgrade to version 1.2.5 or higher.<br />

CVE-2006-2685<br />

WinGate < 6.1.3 POST Request Buffer Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3642 FAMILY: Web Servers RISK: HIGH NESSUS ID:21674<br />

Family Internet Services 939


Description: Synopsis :\n\nThe remote HTTP proxy server is prone to a buffer overflow attack.\n\nThe<br />

remote host appears to be running WinGate Proxy Server, a Windows application for<br />

managing and securing Internet access. According to its banner, the version of WinGate<br />

installed on the remote host is affected by a buffer overflow vulnerability in its HTTP<br />

proxy service. An attacker with access to use the proxy may be able to exploit this issue to<br />

execute arbitrary code on the remote host. By default, the service operates with LOCAL<br />

SYSTEM privileges, which means that a successful attack may result in a complete<br />

compromise of the affected system.<br />

Solution: Upgrade to version 6.1.3 or higher.<br />

CVE-2006-2926<br />

'The Bat' Mass Mailer Detection<br />

<strong>PVS</strong> ID: 3643 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is running 'The Bat', a piece of software that is used to automate the<br />

sending of many emails. The presence of 'The Bat' often indicates the existence of a<br />

spamming mail server.<br />

realtime<br />

Solution: N/A<br />

CVE Not available<br />

Dynamic DNS Dynamic Update Client (DUC) Detection<br />

<strong>PVS</strong> ID: 3644 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is configured as a dynamic DNS server. Further, it is using software that<br />

automatically queries and updates an Internet DNS database whenever a new client IP<br />

address is obtained. This sort of software is often used by individuals who are connected to<br />

the Internet via a Dynamic (DHCP) IP address.<br />

Solution: Ensure that this dynamic domain name is being used in compliance with corporate<br />

standards and guidelines.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

TIBCO < 7.5.1 Rendezvous HTTP Administrative Interface Remote Overflow<br />

<strong>PVS</strong> ID: 3645 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the TIBCO Rendezvous web server. Rendezvous is part of the TIBCO messaging<br />

suite that facilitates network-based communication. This version of Rendezvous ( %L ) is<br />

vulnerable to a remote buffer overflow. An attacker exploiting this flaw would be able to<br />

execute arbitrary code on the remote Rendezvous server.<br />

Family Internet Services 940


Solution: Upgrade to version 7.5.1 or higher.<br />

CVE-2006-2830<br />

Courier Mail Server < 0.53.2 Crafted Username Encoding DoS<br />

<strong>PVS</strong> ID: 3646 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running Courier Mail Server, an open source mail server for Linux and Unix.<br />

The installed version of Courier is prone to a flaw in the way that it handles malformed<br />

'login' strings. Specifically, an attacker who sends a username that includes a '<br />

Solution: Upgrade to version 0.53.2 or higher.<br />

CVE-2006-2659<br />

WordPress < 2.0.3 Arbitrary Code Injection<br />

<strong>PVS</strong> ID: 3647 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an arbitrary 'command insertion'<br />

flaw.\n\nThe remote WordPress application is vulnerable to an arbitrary 'code injection'<br />

flaw. The application fails to sanitize cached 'username' data. An attacker exploiting this<br />

flaw would send a malformed request to the WordPress application. Successful exploitation<br />

would result in the attacker running arbitrary commands with the permission of the<br />

WordPress application. The path to the vulnerable WordPress application is '%P'<br />

Solution: Upgrade to version 2.0.3 or higher.<br />

CVE-2006-2667<br />

WinSCP < 3.8.2 Arbitrary Command Insertion<br />

<strong>PVS</strong> ID: 3648 FAMILY: SSH RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to an arbitrary 'command insertion'<br />

flaw.\n\nThe remote host is running WinSCP, a file transfer application that utilizes Secure<br />

Shell (SSH) as the transport protocol. This version of WinSCP is vulnerable to a flaw in the<br />

way that it parses URI strings. An attacker exploiting this flaw would need to be able to<br />

convince a WinSCP user to click on a malicious URI. Successful exploitation would result<br />

in the attacker executing arbitrary commands with the rights of the user running WinSCP.<br />

The reported version of WinSCP is: \n %L<br />

Solution: Upgrade to version 3.8.2 or higher.<br />

CVE-2006-3015<br />

MyBB < 1.1.3 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 941


<strong>PVS</strong> ID: 3649 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running an older version of MyBulletinBoard. The vendor has released version 1.1.3 in<br />

order to fix several flaws. An attacker exploiting the more serious of the flaws would be<br />

able to execute arbitrary script code on the remote web server.<br />

Solution: Upgrade to version 1.1.3 or higher.<br />

CVE-2006-2908<br />

Microsoft Windows Media Player PNG Processing Overflow (917734)<br />

<strong>PVS</strong> ID: 3650 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nArbitrary code can be executed on the remote host through Windows Media<br />

Player.\n\nThe remote host is running Microsoft Media Player version 10. There is a<br />

vulnerability in the remote version of this software that may allow an attacker to execute<br />

arbitrary code on the remote host. To exploit this flaw, one attacker would need to be able<br />

to convince a user to open a malicious media resource using the vulnerable player.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-0025<br />

Microsoft Windows Media Player PBG File Processing Overflow (917734)<br />

<strong>PVS</strong> ID: 3651 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nArbitrary code can be executed on the remote host through the Media<br />

Player.\n\nThe remote host is running Microsoft Windows Media Player version 9. There is<br />

a vulnerability in the remote version of this software that may allow an attacker to execute<br />

arbitrary code on the remote host. To exploit this flaw, an attacker would need to be able to<br />

convince a user to open a malicious media resource using the vulnerable player.<br />

Solution: Patch or upgrade according to vendor recommendations.<br />

CVE-2006-0025<br />

IBM DB2 < 8.12.0 Multiple DoS<br />

<strong>PVS</strong> ID: 3652 FAMILY: Database<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running the IBM DB2 database. This version of DB2 is vulnerable to<br />

multiple flaws in the way that it processes user-supplied data. A remote attacker may deny<br />

access to legitimate database users. It is believed that authentication is required prior to the<br />

exploitation of this bug.<br />

Family Internet Services 942


Solution: Upgrade to version 8.12.0 or higher.<br />

CVE-2006-3066<br />

Sendmail < 8.13.7 Multi-part MIME Message Handling DoS<br />

<strong>PVS</strong> ID: 3653 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS)<br />

attack.\n\nAccording to its banner, the remote sendmail server is running a version less than<br />

8.13.7. There is a flaw in versions of Sendmail less than 8.13.7 that would allow a remote<br />

attacker to deny resources to legitimate users. An attacker exploiting this flaw would only<br />

need to be able to send email through the remote sendmail server.<br />

Solution: Upgrade to version 8.13.7 or higher.<br />

Calendarix <<br />

CVE-2006-1173<br />

<strong>PVS</strong> ID: 3654 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running Calendarix, a calendar application for web servers. This version of Calendarix is<br />

vulnerable to a flaw in the way that it parses user-supplied HTTP data. An attacker<br />

exploiting this flaw would be able to send specially formatted SQL commands that, upon<br />

being parsed, would execute on the remote database server. This can lead to a loss of<br />

confidentiality, integrity, and availability on the remote database server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

MERCUR < 2005 SP4 Multiple Remote DoS<br />

<strong>PVS</strong> ID: 3655 FAMILY: POP Server RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a number of Denial of Service (DoS)<br />

attacks.\n\nThe remote host is running the Atrium Software MERCUR mail server, a POP3,<br />

SMTP and IMAP server. This version of MERCUR is vulnerable to a number of flaws in<br />

the way that it handles user-supplied commands. Some of the commands do not require<br />

prior authentication. An attacker exploiting these flaws would be able to cause the<br />

MERCUR server to fail. Successful exploitation would result in the loss of availability.<br />

Solution: Upgrade to version 2005 SP4 or higher.<br />

CVE-2006-7041<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mambo < 4.6.1 Login Function usercookie Cookie SQL Injection<br />

Family Internet Services 943


<strong>PVS</strong> ID: 3656 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running the Mambo Content Server, an application for generating dynamic content for<br />

web servers. The remote application is vulnerable to a flaw where remote attackers can<br />

execute arbitrary SQL commands on the database server utilized by Mambo. In order to<br />

exploit this flaw, an attacker would only need to send a malformed HTTP query containing<br />

SQL commands to the 'Name' field of the 'Submit Weblink' form. Successful exploitation<br />

would result in a potential loss of confidentiality, integrity, and availability on the remote<br />

database server.<br />

Solution: Upgrade to version 4.6.1 or higher.<br />

CVE-2006-3262<br />

TWiki Privilege Escalation<br />

<strong>PVS</strong> ID: 3657 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the TWiki web application. This version of TWiki is vulnerable to a flaw where<br />

users can escalate their privileges, giving them administrative rights to the application. A<br />

valid user account is required in order to exploit this flaw. Successful exploitation leads to<br />

the attacker gaining administrative access. This can lead to a loss of confidentiality,<br />

integrity, and availability. In addition, the remote TWiki application is vulnerable to a 'file<br />

upload' flaw. An attacker exploiting this flaw would be able to insert and execute arbitrary<br />

script code with the permissions of the web server process. This can also lead to a loss of<br />

confidentiality, integrity, and availability.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-2942<br />

Winamp < 5.22 MIDI File Handling Overflow<br />

<strong>PVS</strong> ID: 3658 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Winamp, a multimedia software application. This version of Winamp is vulnerable<br />

to a buffer overflow. Specifically, when handling a malformed MIDI file, Winamp may<br />

crash, possibly executing arbitrary code. An attacker exploiting this flaw would need to be<br />

able to convince a Winamp user to open a malicious MIDI file.<br />

Solution: Upgrade to version 5.22 or higher.<br />

CVE-2006-3228<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Clearswift MAILsweeper for SMTP < 4.3.20 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3659 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 944


Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a vulnerable version of Clearswift MAILsweeper for SMTP. Clearswift<br />

MAILseeper for SMTP versions 4.3.19 and prior are reported prone to several security<br />

issues. According to the vendor, an attacker can bypass security or render the application<br />

unavailable for legitimate users.<br />

Solution: Upgrade to version 4.3.20 or higher.<br />

CVE-2006-3216<br />

GFI Languard Scanner Detection<br />

<strong>PVS</strong> ID: 3660 FAMILY: Policy<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote host is running an instance of GFI Languard vulnerability<br />

scanner.<br />

Solution: Ensure that this machine is scanning in accordance with corporate policies and procedures.<br />

CVE Not available<br />

Opera < 9.01 Malformed 'HREF' DoS<br />

<strong>PVS</strong> ID: 3661 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is using Opera 9.00. The version of Opera installed on the remote host contains<br />

a flaw in the way that it handles very large links. An attacker exploiting this flaw would<br />

need to be able to convince an Opera user to browse to a malicious URI. Successful<br />

exploitation would result in the browser crashing.<br />

Solution: Upgrade to version 9.01 or higher.<br />

CVE-2006-3199<br />

Opera < 9.01 Malformed JPEG Overflow<br />

<strong>PVS</strong> ID: 3662 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using Opera 9.00. The version of Opera installed on the remote host contains a flaw in the<br />

way that it handles JPEG images. An attacker exploiting this flaw would need to be able to<br />

convince an Opera user to browse to a malicious URI. Successful exploitation would result<br />

in the browser crashing and possibly executing arbitrary code.<br />

Solution: Upgrade to version 9.01 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 945


CVE-2006-3331<br />

MyBB < 1.1.4 SQL Injection<br />

<strong>PVS</strong> ID: 3663 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running an older version of MyBulletinBoard. The vendor has released version 1.1.4 in<br />

order to fix a flaw. Specifically, this version of MyBB is vulnerable to a remote SQL<br />

injection flaw. An attacker exploiting this flaw would only need to be able to send a<br />

malformed HTTP query that contains SQL commands. Successful exploitation would result<br />

in the attacker executing arbitrary SQL commands on the backend database server.<br />

Solution: Upgrade to version 1.1.4 or higher.<br />

CVE Not available<br />

Helix RealServer < 11.1.0.801 Remote Overflow<br />

<strong>PVS</strong> ID: 3664 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the Helix RealServer streaming media server. All versions of Helix 10.0.x and<br />

11.0.x are vulnerable to multiple remote buffer overflows. Apparently, the application does<br />

not properly sanitize malformed HTTP requests. An attacker exploiting this flaw would<br />

only need to be able to send HTTP requests to the Helix server. Successful exploitation<br />

would result in the attacker executing arbitrary code.<br />

Solution: Upgrade to version 11.1.0.801 or higher.<br />

Yahoo! Messenger <<br />

CVE-2006-3276<br />

<strong>PVS</strong> ID: 3665 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of Yahoo! Messenger that is reported vulnerable to a remote overflow.<br />

An attacker exploiting this flaw would craft a malicious message that included non-ASCII<br />

characters. The attacker would then send the malformed message to another Yahoo!<br />

Messenger user. When the user received the malicious message, the overflow would be<br />

triggered and the application would crash. In addition, the remote client is vulnerable to a<br />

flaw where remote users can initiate a browser connection by sending a malformed string to<br />

the Yahoo! Messenger Client.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-3298<br />

Nokia Intellisync Web Portal Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 946


<strong>PVS</strong> ID: 3666 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is a Nokia Intellisync Server. These portals are designed for access by<br />

users of portable devices (PDA, cell phone, etc.). One of the server components is a<br />

syncing port (TCP/3102) that maintains state and synchronization with the remote clients.<br />

Solution: N/A<br />

CVE Not available<br />

ZoneAlarm < 6.5.722.000 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3667 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:21165<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running ZoneAlarm, a firewall for Windows. The vendor has released version<br />

6.5.722.000 of ZoneAlarm. This version corrects several bugs within the firewall.<br />

Solution: Upgrade to version 6.5.722.000 or higher.<br />

BlueDragon <<br />

CVE-2006-1221<br />

<strong>PVS</strong> ID: 3668 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running BlueDragon, a ColdFusion Markup Language server. This version of<br />

BlueDragon is vulnerable to a Cross-Site Scripting (XSS) flaw where attackers can inject<br />

malicious scripting code that will run within the browser of BlueDragon clients. A second<br />

flaw would allow the attacker the ability to crash the application remotely, thereby denying<br />

services to legitimate users.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

YaBB SE <<br />

CVE-2006-2311<br />

<strong>PVS</strong> ID: 3669 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running the YaBB SE forum management system. There is a flaw in this version of<br />

YaBB SE that allows attackers to inject SQL commands via the web interface. An attacker<br />

exploiting this flaw would be able to execute arbitrary SQL commands on the backend<br />

database server used by YaBB SE.<br />

Solution: No solution is known at this time.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 947


CVE-2006-3275<br />

MailEnable SMTP Service HELO Command Remote DoS<br />

<strong>PVS</strong> ID: 3670 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running a vulnerable version of the MailEnable email server. While the<br />

details of the flaw are unknown, it is alleged that a remote attacker can create a query such<br />

that when the MailEnable server parses the query, the service crashes. Successful<br />

exploitation denies access to legitimate users.<br />

Solution: Upgrade to MailEnable Professional 1.74 or higher, MailEnable Enterprise Edition 1.22 or<br />

higher, or Mailenable Standard 1.94 or higher.<br />

CVE-2006-3277<br />

iTunes < 6.0.5 AAC File Parsing Overflow<br />

<strong>PVS</strong> ID: 3671 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:21781<br />

Description: Synopsis :\n\nThe remote host contains an application that is affected by a remote code<br />

execution flaw.\n\nDescription :\n\nThe remote host is running iTunes, a popular jukebox<br />

program.\nThe remote version of this software is vulnerable to an integer overflow when it<br />

parses specially crafted AAC files that may lead to the execution of arbitrary code.\n\nAn<br />

attacker may exploit this flaw by sending a malformed AAC file to a user on the remote<br />

host and wait for them to play it with iTunes.\n\nRisk factor :\n\nMedium<br />

Solution: Upgrade to version 6.0.5 or higher.<br />

CVE-2006-1467<br />

Mac OS X < 10.4.7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3672 FAMILY: Operating System Detection<br />

Description: Synopsis :\n\nThe remote host is missing a Mac OS X update that fixes a security<br />

10.4.7.\n\nMac OS X 10.4.7 contains several security fixes for the following prog<br />

Solution: Upgrade to Mac OS X 10.4.7 or<br />

higher:\nhttp://www.apple.com/support/downloads/macosxupdate1047intel.html\nhttp://www.apple.com/su<br />

OpenOffice.org Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

CVE-2006-1469<br />

<strong>PVS</strong> ID: 3673 FAMILY: Generic RISK: NONE NESSUS ID:Not Available<br />

Family Internet Services 948


Description: Synopsis :\n\nThe remote host is using the OpenOffice.org application.\n\nDescription<br />

:\n\nThe remote host is running OpenOffice.org %P<br />

Solution: N/A<br />

CVE Not available<br />

WordPress < 2.0.4 SQL Injection / Cross-site Scripting (XSS)<br />

<strong>PVS</strong> ID: 3674 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running WordPress blog, a web blog manager written in<br />

PHP.\nThe remote version of this software is vulnerable to various flaws that may\nallow<br />

an attacker to perform a SQL injection attack against the remote host.\nSuccessful<br />

exploitation would allow an attacker to read/write confidential\ndata as well as potentially<br />

execute arbitrary code on the remote database.\n\nIn addition, the remote host is vulnerable<br />

to multiple Cross-Site Scripting (XSS) flaws.\nThe path to the vulnerable application is<br />

'%P'<br />

Solution: Upgrade to version 2.0.4 or higher.<br />

F-Secure Scan Evasion<br />

CVE-2006-3390<br />

<strong>PVS</strong> ID: 3675 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote antivirus scanner may be tricked into not scanning certain<br />

files.\n\nThe remote host is running F-Secure, a firewall and antivirus software package.<br />

This version of F-Secure is vulnerable to a flaw where specially crafted file names are not<br />

scanned. This can lead to potentially damaging files not being deleted or quarantined. An<br />

attacker exploiting this flaw would only need the ability to create these files and deliver<br />

them to a vulnerable F-Secure user. Successful exploitation would result in a false sense of<br />

security.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-3490<br />

F-Secure Product Detection<br />

<strong>PVS</strong> ID: 3676 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running F-Secure, a firewall and antivirus software package.<br />

Solution: N/A<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 949


CVE Not available<br />

Geeklog FCKeditor < 1.4.0sr4 Arbitrary File Upload<br />

<strong>PVS</strong> ID: 3677 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:21780<br />

Description: Synopsis :\n\nThe remote web server contains a PHP application that is affected by an<br />

arbitrary file upload vulnerability.\n\nThe remote host is running Geeklog, an open-source<br />

weblog powered by PHP and MySQL. The version of Geeklog installed on the remote host<br />

includes an older version of FCKeditor that is enabled by default and allows an<br />

unauthenticated attacker to upload arbitrary files containing PHP code, and then to execute<br />

them subject to the privileges of the web server user ID.<br />

Solution: Upgrade to Geeklog 1.4.0sr4 or higher.<br />

CVE-2006-3362<br />

phpFormGenerator Arbitrary File Upload<br />

<strong>PVS</strong> ID: 3678 FAMILY: CGI RISK: HIGH NESSUS ID:21918<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection attack.\n\nThe remote host<br />

is running phpFormGenerator, a PHP-based tool for generating web forms. The version of<br />

phpFormGenerator installed on the remote host allows an unauthenticated attacker to create<br />

forms supporting arbitrary file uploads. This issue can then be leveraged to upload a file<br />

with arbitrary code and execute it subject to the privileges of the web server user ID.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

CommuniGate Pro < 5.1c2 POP3 Overflow<br />

<strong>PVS</strong> ID: 3679 FAMILY: Web Servers RISK: HIGH NESSUS ID:20827<br />

Description: Synopsis :\n\nThe remote mail server is prone to multiple attack vectors.\n\nAccording to<br />

its banner, the version of CommuniGate Pro running on the remote host will crash when<br />

certain mail clients try to open an empty mailbox. Remote code execution may even be<br />

possible.<br />

Solution: Upgrade to version 5.1c2 or higher.<br />

CVE-2006-0468<br />

Zope < 2.9.4 docutils Information Disclosure<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3680 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 950


Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote web server is a version of Zope that is older than<br />

2.9.4. There is a flaw in this version of Zope that may allow attackers to gain access to<br />

confidential data. It is reported that the 'docutils' module does not properly parse<br />

user-supplied data. Successful exploitation leads to loss of confidential data that may be<br />

useful in further attacks.<br />

Solution: Upgrade to version 2.9.4 or higher.<br />

CVE-2006-3458<br />

WinGate < 6.1.4 Build 1099 IMAP Service Traversal Arbitrary Mail Access<br />

<strong>PVS</strong> ID: 3681 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Directory Traversal flaw.\n\nThe remote<br />

host appears to be running WinGate Proxy Server, a Windows application for managing<br />

and securing Internet access. According to its banner, the version of WinGate installed on<br />

the remote host is affected by a directory traversal flaw in its IMAP service. An attacker<br />

exploiting this flaw would only need to be able to connect to the IMAP service port,<br />

authenticate and issue a malformed request. Successful exploitation would lead to a loss of<br />

confidential data.<br />

Solution: Upgrade to version 6.1.4 Build 1099 or higher.<br />

CVE-2006-2917<br />

Samba < 3.0.23 smdb Share Remote DoS<br />

<strong>PVS</strong> ID: 3682 FAMILY: Samba<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote Samba server, according to its version number ('%L'), may be vulnerable to a<br />

remote attack. An attacker can cause the Samba smbd service to fail by opening a large<br />

number of connections. Successful exploitation leads to a loss of availability.<br />

Solution: Upgrade to version 3.0.23 or higher.<br />

MetaSploit Detection<br />

CVE-2006-3403<br />

<strong>PVS</strong> ID: 3683 FAMILY: Policy<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote server is running a MetaSploit Framework server.<br />

Metasploit allows users to automatically exploit and backdoor vulnerable applications via<br />

the network. The version of MetaSploit is %L.<br />

Family Internet Services 951


Solution: Ensure that this application is authorized according to corporate policies and guidelines.<br />

CVE Not available<br />

SimpleBoard sbp Parameter Remote File Inclusion<br />

<strong>PVS</strong> ID: 3684 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:22023<br />

Description: Synopsis :\n\nThe remote web server contains a PHP application that is prone to remote file<br />

inclusion attacks.\n\nThe remote host is running SimpleBoard, a web-based bulletin board<br />

component for Mambo / Joomla. The version of SimpleBoard installed on the remote host<br />

fails to sanitize input to the 'sbp' parameter of the 'image_upload.php' and reportedly other<br />

scripts before using it to include PHP code. Provided PHP's 'register_globals' setting is<br />

enabled, an unauthenticated attacker may be able to exploit these flaws to view arbitrary<br />

files on the remote host or to execute arbitrary PHP code, possibly taken from third-party<br />

hosts.<br />

Solution: No solution is known at this time.<br />

CVE-2006-5043<br />

MetaSploit Shell Detection<br />

<strong>PVS</strong> ID: 3685 FAMILY: Policy<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote server is running a MetaSploit Framework server.<br />

Metasploit allows users to automatically exploit and backdoor vulnerable applications via<br />

the network. The version of MetaSploit is %L. \nFurther, the Metasploit shell server is<br />

bound to a non-localhost socket. This allows users to connect to the shell and run exploits<br />

from the server. You should ensure that this application can only be accessed by trusted<br />

security staff.<br />

Solution: Ensure that this application is authorized according to corporate policies and guidelines.<br />

WebInspect Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 3686 FAMILY: Policy<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote server is running a WebInspect web scanner. WebInspect<br />

is a security tool that allows security staff and administrators to automate web-based attacks<br />

and exploits against web servers.<br />

Family Internet Services 952


Solution: Ensure that this application is authorized according to corporate policies and guidelines.<br />

CVE Not available<br />

Mambo / Joomla Component / Module mosConfig_absolute_path Parameter Remote File Inclusion<br />

<strong>PVS</strong> ID: 3687 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:22049<br />

Description: Synopsis :\n\nThe remote web server contains a PHP application that is prone to remote file<br />

inclusion attacks.\n\nThe remote host contains a third-party Mambo / Joomla component or<br />

module. The version of at least one such component or module installed on the remote host<br />

fails to sanitize input to the 'mosConfig_absolute_path' parameter before using it to include<br />

PHP code. Provided PHP's 'register_globals' setting is enabled, an unauthenticated attacker<br />

may be able to exploit these flaws to view arbitrary files on the remote host or to execute<br />

arbitrary PHP code, possibly taken from third-party hosts.<br />

Solution: Disable PHP's 'register_globals' setting. Upgrade or patch according to vendor<br />

recommendations.<br />

CVE-2006-6962<br />

IceWarp < 5.6.1 lang_settings Parameter Remote File Inclusion<br />

<strong>PVS</strong> ID: 3688 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:22079<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection attack.\n\nThe remote host<br />

is running IceWarp Web Mail, a webmail product written in PHP that is distributed as a<br />

standalone application and also bundled with VisNetic Mail Server and Merak Mail Server.<br />

The version of IceWarp Web Mail installed on the remote host fails to sanitize<br />

user-supplied input to the 'lang_settings' parameter of the 'accounts/inc/include.php' and<br />

'admin/inc/include.php' scripts before using it to include PHP code. An unauthenticated<br />

attacker may be able to exploit these flaws to view arbitrary files on the remote host or to<br />

execute arbitrary PHP code after injecting it into the mail server's log file.<br />

Solution: Upgrade to version 5.6.1 or higher.<br />

CVE-2006-0818<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

MyBB < 1.1.6 HTTP Header CLIENT-IP Field SQL Injection<br />

<strong>PVS</strong> ID: 3689 FAMILY: CGI RISK: HIGH NESSUS ID:22055<br />

Description: Synopsis :\n\nThe remote web server contains a PHP application that is susceptible to a<br />

SQL injection attack.\n\nThe remote version of MyBB fails to sanitize input to the<br />

'CLIENT-IP' request header before using it in a database query when initiating a sesion in<br />

'inc/class_session.php'. This may allow an unauthenticated attacker to uncover sensitive<br />

information such as password hashes, modify data, launch attacks against the underlying<br />

database, and more. Note that successful exploitation is possible regardless of PHP's<br />

settings.<br />

Family Internet Services 953


Solution: Upgrade to version 1.1.6 or higher.<br />

CVE-2006-3775<br />

VisNetic MailServer < 8.5.0.5 lang_settings Parameter Remote File Inclusion<br />

<strong>PVS</strong> ID: 3690 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:22079<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection attack.\n\nThe remote host<br />

is running VisNetic MailServer, a commercial mail server for the Microsoft platform. The<br />

version of VisNetic MailServer installed on the remote host fails to sanitize user-supplied<br />

input to the 'lang_settings' parameter of the 'accounts/inc/include.php' and<br />

'admin/inc/include.php' scripts before using it to include PHP code. An unauthenticated<br />

attacker may be able to exploit these flaws to view arbitrary files on the remote host or to<br />

execute arbitrary PHP code after injecting it into the mail server's log file.<br />

Solution: Upgrade to version 8.5.0.5 or later.<br />

CVE-2006-0818<br />

X7 Chat Server Detection<br />

<strong>PVS</strong> ID: 3691 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nThe remote host is running X7 Chat, a web-based chat server. There have<br />

been security flaws associated with the X7 Chat server.<br />

Solution: Ensure that such software is authorized on your network and that it is completely patched<br />

against vulnerabilities.<br />

CVE Not available<br />

CheckPoint Firewall Default Web Server<br />

<strong>PVS</strong> ID: 3692 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is running a Checkpoint Firewall. Checkpoint Firewall, by default, opens<br />

a web server on port 18264 and allows external and internal access to the server. Many<br />

versions of this software are reported to be vulnerable to a directory traversal flaw.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

OpenCms < 6.2.2 Authentication Bypass<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3693 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 954


Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the<br />

bypassing of authentication.\n\nThe remote host is running OpenCms, an<br />

open-source content management system. This version of OpenCms ( %L ) is<br />

vulnerable to a remote flaw where attackers can bypass authentication and gain<br />

administrative access to accounts and confidential data. An attacker exploiting<br />

this flaw would just need to have knowledge of where administrative forms are<br />

stored within the web directory (trivial to find). Successful exploitation leads to<br />

the user gaining administrative access to the application.<br />

Solution: Upgrade to version 6.2.2 or higher.<br />

CVE Not available<br />

Mozilla Thunderbird < 1.5.0.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3694 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:22096<br />

Description: The remote Windows host contains a mail client that is affected by multiple vulnerabilities.<br />

The remote version of Mozilla Thunderbird suffers from various security issues, at least<br />

one of which may lead to execution of arbitrary code on the affected host subject to the<br />

user's privileges.<br />

Solution: Upgrade to version 1.5.0.5 or higher.<br />

CVE-2006-3811<br />

Firefox < 1.5.0.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3695 FAMILY: Web Clients RISK: HIGH NESSUS ID:22095<br />

Description: Synopsis :\n\nThe remote Windows host contains a web browser that is affected by<br />

multiple vulnerabilities.\n\nThe installed version of Firefox is affected by various security<br />

issues, some of which may lead to execution of arbitrary code on the affected host subject<br />

to the user's privileges.<br />

Solution: Upgrade to version 1.5.0.5 or higher.<br />

Help Center Live <<br />

CVE-2006-3812<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3696 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Directory Traversal flaw.\n\nThe remote<br />

web server is running Help Center Live, a help desk application written in PHP. The remote<br />

version of this software is vulnerable to a Directory Traversal flaw. An attacker exploiting<br />

this flaw would send a malformed HTTP request which included '../' (or similar) directory<br />

traversal strings. Successful exploitation would result in the attacker gaining access to<br />

confidential data.<br />

Family Internet Services 955


Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-3639<br />

MySQL MERGE Table Privilege Escalation<br />

<strong>PVS</strong> ID: 3697 FAMILY: Database RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nAccording to its version number, the installation of MySQL on<br />

the remote host may be prone to a flaw where an authenticated user can escalate privileges<br />

on the remote database server. Specifically, even if a user has had access revoked to a<br />

certain table, they may be able to access it from another table. Successful exploitation<br />

would lead to a loss of confidential data.<br />

Solution: Upgrade to version 4.1.21, 5.0.24 or higher.<br />

CVE-2006-4031<br />

IBM DB2 Version Detection<br />

<strong>PVS</strong> ID: 3698 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running IBM DB2 database version %L.<br />

Solution: N/A<br />

CVE Not available<br />

Hobbit Monitor < 4.1.2p2 config Command Traversal Arbitrary File Access<br />

<strong>PVS</strong> ID: 3699 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Directory Traversal flaw.\n\nThe remote<br />

host is running Hobbit Monitor, a web-based host/network monitoring software. This<br />

version of Hobbit Monitor is prone to a flaw where remote attackers can use the 'config'<br />

command to access confidential files. To exploit this issue, the attacker would connect to<br />

the Hobbit application (typically on port 1984) and send a 'config ../../../../../'<br />

request. Successful exploitation would result in the attacker gaining access to confidential<br />

data.<br />

Solution: Upgrade to version 4.1.2p2 or higher.<br />

CVE-2006-4003<br />

Yahoo! Messenger < 8.0.0.863 File Extension Spoofing<br />

<strong>PVS</strong> ID: 3700 FAMILY: Internet Messengers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 956


Description: Synopsis :\n\nThe remote host may be tricked into running an executable file.\n\nThe<br />

remote host is running a version of Yahoo! Messenger that is reported vulnerable to a<br />

remote file extension spoofing flaw. Specifically, if a user sends a malformed download<br />

query that includes many '~@' sequences, the displayed name of the file will obfuscate the<br />

true file type. An attacker can use this flaw to trick users into downloading files that they<br />

believe are not malicious. Successful exploitation might lead to the attacker executing<br />

arbitrary executables on the target system.<br />

Solution: Upgrade to a version higher than 8.0.0.863.<br />

CVE Not available<br />

ClamAV < 0.88.4 UPX rsize Content-Parsing Overflow<br />

<strong>PVS</strong> ID: 3701 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a heap overflow.\n\nThe remote host is<br />

running ClamAV, an antivirus application. The remote host is running version: \n %L<br />

\n\nThere is a remote content-parsing flaw in this version of ClamAV that could lead to a<br />

heap overflow by sending a malformed file compressed with UPX. Successful exploitation<br />

would result in the attacker executing arbitrary code.<br />

Solution: Upgrade to version 0.88.4 or higher.<br />

CVE-2006-4018<br />

ColdFusion Administrative Interface Authentication Bypass<br />

<strong>PVS</strong> ID: 3702 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the<br />

bypassing of authentication.\n\nThe remote host is running Macromedia<br />

ColdFusion, a web application server. This version of Macromedia is<br />

vulnerable to a flaw where an unauthenticated user can bypass authentication<br />

and gain administrative access over the application. Successful exploitation<br />

impacts confidentiality, integrity and availability.<br />

Solution: Upgrade to a version higher than 7,0,2,142559.<br />

CVE-2006-4724<br />

Recursive DNS Server Detection<br />

<strong>PVS</strong> ID: 3703 FAMILY: DNS Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10539<br />

Description: Synopsis :\n\nThe remote name server allows recursive queries to be performed.\n\nIt is<br />

possible to query the remote nameserver for third party names. If this is your internal<br />

nameserver, then disregard this warning. If the host allows these recursive queries via UDP,<br />

then the host can be used to 'bounce' Denial of Service attacks against another network or<br />

system.<br />

Family Internet Services 957


Solution: Restrict recursive queries to the hosts that should use this nameserver (such as those of the<br />

LAN connected to it). If you are using BIND 8, you can do this by using the instruction<br />

'allow-recursion' in the 'options' section of your named.conf. If you are using BIND 9, you<br />

can define a grouping of internal addresses using the 'acl' command. Then, within the<br />

options block, you can explicitly state: 'allow-recursion { hosts_defined_in_acl }'. If you<br />

are using another name server, consult its documentation.<br />

CVE-1999-0024<br />

Proxy/Firewall Detection<br />

<strong>PVS</strong> ID: 3704 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote device appears to be a network firewall or proxy server. <strong>PVS</strong> has determined<br />

this due to the device flagging as multiple operating systems within a short time frame.<br />

Solution: N/A<br />

CVE Not available<br />

Safari Version Detection<br />

<strong>PVS</strong> ID: 3705 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Safari, a web browser. The version of Safari is: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Firefox Version Detection<br />

<strong>PVS</strong> ID: 3706 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Firefox version: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Microsoft Internet Explorer Detection<br />

<strong>PVS</strong> ID: 3707 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Microsoft Internet Explorer version: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 958


Proxy / Firewall Detection<br />

<strong>PVS</strong> ID: 3708 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote device appears to be a network firewall or proxy server. <strong>PVS</strong> has determined<br />

this due to the device flagging as multiple operating systems within a short time frame.<br />

Solution: N/A<br />

CVE Not available<br />

Firewall / Proxy / NAT Dependency<br />

<strong>PVS</strong> ID: 3709 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host may be running a NAT device.<br />

Solution: N/A<br />

CVE Not available<br />

Firewall / Proxy / NAT Dependency<br />

<strong>PVS</strong> ID: 3710 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host may be running a NAT device.<br />

Solution: N/A<br />

CVE Not available<br />

Firewall / Proxy / NAT Dependency<br />

<strong>PVS</strong> ID: 3711 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host may be running a NAT device.<br />

Solution: N/A<br />

CVE Not available<br />

Firewall / Proxy / NAT dependency<br />

<strong>PVS</strong> ID: 3712 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host may be running a NAT device.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 959


Proxy / Firewall Detection<br />

<strong>PVS</strong> ID: 3715 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote device appears to be a network firewall or proxy server. <strong>PVS</strong> has determined<br />

this due to the device flagging as multiple operating systems within a short time frame.<br />

Solution: N/A<br />

CVE Not available<br />

Firewall / Proxy / NAT Dependency<br />

<strong>PVS</strong> ID: 3716 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host may be running a NAT device.<br />

Solution: N/A<br />

CVE Not available<br />

Firewall / Proxy / NAT Dependency<br />

<strong>PVS</strong> ID: 3717 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host may be running a NAT device.<br />

Solution: N/A<br />

CVE Not available<br />

Firewall / Proxy / NAT Dependency<br />

<strong>PVS</strong> ID: 3718 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host may be running a NAT device.<br />

Solution: N/A<br />

CVE Not available<br />

Proxy / Firewall Detection<br />

<strong>PVS</strong> ID: 3719 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote device appears to be a network firewall or proxy server. <strong>PVS</strong> has determined<br />

this due to the device flagging as multiple operating systems within a short time frame.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 960


Firewall / Proxy / NAT Dependency<br />

<strong>PVS</strong> ID: 3720 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host may be running a NAT device.<br />

Solution: N/A<br />

CVE Not available<br />

Firewall / Proxy / NAT Dependency<br />

<strong>PVS</strong> ID: 3721 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host may be running a NAT device.<br />

Solution: N/A<br />

CVE Not available<br />

Firewall / Proxy / NAT Dependency<br />

<strong>PVS</strong> ID: 3722 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host may be running a NAT device.<br />

Solution: N/A<br />

CVE Not available<br />

IPCheck Server Monitor < 5.3.3.639 Traversal Arbitrary File Access<br />

<strong>PVS</strong> ID: 3723 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:22205<br />

Description: Synopsis :\n\nThe remote web server is prone to a directory traversal attack.\n\nThe remote<br />

host is running IPCheck Server Monitor, a network resource monitoring tool for Windows.<br />

The installed version of IPCheck Server Monitor fails to filter directory traversal sequences<br />

from requests that pass through the web server interface. An attacker can exploit this issue<br />

to read arbitrary files on the remote host subject to the privileges under which the affected<br />

application runs.<br />

Solution: Upgrade to version 5.3.3.639 or higher.<br />

CVE-2006-4140<br />

Firefox < 1.5.0.6 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3724 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 961


Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe installed<br />

version of Firefox is affected by a flaw that could lead to a Denial of Service (DoS)<br />

condition within the browser. In addition, the version of Firefox is reported vulnerable to a<br />

buffer overflow when processing malformed XML documents. An attacker exploiting<br />

either of these flaws would need to be able to convince a user to visit a malicious URI.<br />

Solution: Upgrade to version 1.5.0.6 or higher.<br />

CVE-2006-4253<br />

Microsoft Internet Explorer Version Detection<br />

<strong>PVS</strong> ID: 3725 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Microsoft Internet Explorer version:\n'%L'\n\nNote that the<br />

version information passed within User-Agent strings is not typically granular.<br />

Solution: Ensure that the latest version of Microsoft IE is installed.<br />

CVE Not available<br />

Google Toolbar Detection<br />

<strong>PVS</strong> ID: 3726 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Google Toolbar version: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

HP OpenView Storage Data Protector Detection<br />

<strong>PVS</strong> ID: 3727 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running HP OpenView Storage Data Protector version %L .<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

HP OpenView Storage Data Protector Backup Agent Remote Arbitrary Command Execution<br />

<strong>PVS</strong> ID: 3728 FAMILY: Generic RISK: HIGH NESSUS ID:22225<br />

Description: Synopsis :\n\nIt is possible to execute code on the remote host through the backup<br />

agent.\n\nThe remote version of HP OpenView Data Protector is vulnerable to an<br />

authentication bypass flaw. By sending specially crafted requests to the remote host, an<br />

attacker may be able to execute unauthorized Backup commands. Due to the nature of the<br />

software, a successful exploitation of this vulnerability could result in remote code<br />

execution.<br />

Family Internet Services 962


Solution: If this service is not needed, disable it or filter incoming traffic to this port. HP has released<br />

a set of patches for Data Protector 5.10 and 5.50:<br />

http://itrc.hp.com/service/cki/docDisplay.do?docId<br />

CVE-2006-4201<br />

Owl Intranet Engine < 0.91 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3729 FAMILY: CGI RISK: HIGH NESSUS ID:22232<br />

Description: Synopsis :\n\nThe remote web server contains a PHP application that is prone to several<br />

issues.\n\nThe remote host is running Owl Intranet Engine, a web-based document<br />

management system written in PHP. The version of Owl Intranet Engine on the remote host<br />

fails to sanitize input to the session ID cookie before using it in a database query. Provided<br />

PHP's 'magic_quotes_gpc' setting is disabled, an unauthenticated attacker may be able to<br />

exploit this issue to uncover sensitive information such as password hashes, modify data,<br />

launch attacks against the underlying database, and more. In addition, the application<br />

reportedly suffers from at least one cross-site scripting (XSS) issue.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-4211<br />

Informix Database Detection (Windows)<br />

<strong>PVS</strong> ID: 3730 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:22228<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nThe remote host is running the Informix database server for Microsoft<br />

Windows. Further, clients connecting to this server are passing plaintext credentials across<br />

the network.<br />

Solution: Enable encrypted communications between the Informix client and server.<br />

CVE Not available<br />

Informix Database Detection (Unix)<br />

<strong>PVS</strong> ID: 3731 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:22228<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nThe remote host is running the Informix database server for Unix. Further,<br />

clients connecting to this server are passing plaintext credentials across the network.<br />

Solution: Enable encrypted communications between the Informix client and server.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 963


PHP < 4.4.4 / 5.1.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3732 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of PHP that is older than 4.4.4 or 5.1.5. This version is reported<br />

vulnerable to several flaws that may allow an attacker with the right to execute PHP scripts<br />

the ability to execute arbitrary code. Executed code would be run with the permissions of<br />

the web server process.<br />

Solution: Upgrade to version 4.4.4, 5.1.5 or higher.<br />

WFTPD <<br />

CVE-2006-4486<br />

<strong>PVS</strong> ID: 3733 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote WFTP<br />

server vulnerable to a remote buffer overflow. The server allegedly does not properly parse<br />

and verify input to the 'CWD', 'DELE', 'APPE', 'MDTM', 'MKD', 'RMD', 'MLST', 'RNFR',<br />

'SIZE', 'XCWD', 'XMKD', and XRMD commands. An attacker exploiting this flaw would<br />

need to be able to authenticate to the FTP server. Successful exploitation would result in<br />

the attacker executing arbitrary code on the WFTP server.<br />

Solution: No solution is known at this time.<br />

CVE-2006-5826<br />

ALT-N MDaemon POP Server < 9.06 USER / APOP Command Overflow<br />

<strong>PVS</strong> ID: 3734 FAMILY: POP Server<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nA buffer overflow<br />

vulnerability has been reported for MDaemon. The vulnerability is due to inadequate<br />

bounds checking one some POP server commands. Namely, 'USER' and 'APOP'. An<br />

attacker can exploit this vulnerability by submitting a very large values to these commands<br />

on the POP server. This will cause the MDaemon service to crash when attempting to<br />

process the command. Successful exploitation would lead to the attacker executing<br />

arbitrary code on the remote server.<br />

Solution: Upgrade to version 9.06 or higher.<br />

CVE-2006-4364<br />

phpCOIN < 1.2.4 Multiple Script _CCFG[_PKG_PATH_INCL] Parameter Remote File Inclusion<br />

<strong>PVS</strong> ID: 3735 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 964


Description: Synopsis :\n\nThe remote host is vulnerable to a 'File Inclusion' flaw.\n\nThe remote host is<br />

running phpCOIN version 1.2.2 or older. This version of phpCOIN is vulnerable to a<br />

remote 'file include' flaw. An attacker exploiting this flaw would be able to execute PHP<br />

script code on the remote web server with the permissions of the web server process.<br />

Successful exploitation would lead to partial loss of confidentiality, integrity, and<br />

availability.<br />

Solution: Upgrade to version 1.2.4 or higher.<br />

CVE-2006-4424<br />

CubeCart < 3.0.13 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3736 FAMILY: CGI RISK: HIGH NESSUS ID:22296<br />

Description: The remote web server contains a PHP application that suffers from multiple<br />

vulnerabilities. The version of CubeCart installed on the remote host fails to properly<br />

sanitize user-supplied input to the 'gateway' parameter before using it in the<br />

'includes/content/gateway.inc.php' script to include PHP code. An unauthenticated remote<br />

attacker may be able to exploit this issue to view arbitrary files or to execute arbitrary PHP<br />

code on the remote host, subject to the privileges of the web server user ID. In addition, the<br />

application fails to initialize the 'searchArray' and 'links' array variables, which could be<br />

leveraged to launch SQL injection and cross-site scripting attacks respectively against the<br />

affected installation as long as PHP's 'register_globals' setting is enabled.<br />

Solution: Upgrade to version 3.0.13 or higher.<br />

CVE-2006-4526<br />

Mailman < 2.1.9rc1 Spoofed Log Entry Injection<br />

<strong>PVS</strong> ID: 3737 FAMILY: CGI RISK: LOW NESSUS ID:22307<br />

Description: Synopsis :\n\nThe remote web server contains a Python application that is affected by a log<br />

spoofing vulnerability.\n\nThe version of Mailman installed on the remote host fails to<br />

sanitize user-supplied input before writing it to the application's 'error' log. An<br />

unauthenticated remote attacker can leverage this flaw to spoof log messages. In addition,<br />

the application is reportedly affected by a denial of service issue involving headers that do<br />

not conform to RFC 2231 as well as several cross-site scripting vulnerabilities.<br />

Solution: Upgrade to version 2.1.9rc1 or higher.<br />

CVE-2006-4624<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Ipswitch IMail Server RCPT String Remote Overflow<br />

<strong>PVS</strong> ID: 3738 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 965


Description: Synopsis :\n\nThe remote IMAP server is affected by a buffer overflow<br />

vulnerability.\n\nThe remote host is running Ipswitch IMail Server, a commercial<br />

messaging and collaboration software product for Windows. According to its banner, the<br />

version of Ipswitch installed on the remote host has a buffer overflow issue in its SMTP<br />

server component. The details of the exploit are not currently known. An attacker<br />

exploiting this flaw would send a malformed SMTP command to the server. Successful<br />

exploitation would result in arbitrary code being executed.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-4379<br />

HP OpenView BBC Service Detection<br />

<strong>PVS</strong> ID: 3739 FAMILY: CGI RISK: INFO NESSUS ID:22318<br />

Description: The remote host appears to be running one of the HP OpenView products. This<br />

specific service is an HTTP server. By sending special requests (version, info, status,<br />

ping, services), it is possible to obtain information about the remote host. The<br />

reported server version is: \n %L<br />

Solution: Ensure that this server is configured in accordance with corporate policies and procedures.<br />

CVE Not available<br />

RaidenHTTPD SoftParserFileXml Parameter Remote File Inclusion<br />

<strong>PVS</strong> ID: 3740 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:22317<br />

Description: The remote web server contains a PHP script that is susceptible to a remote file inclusion<br />

attack. The remote host is running RaidenHTTPD, a web server for Windows. The version<br />

of RaidenHTTPD on the remote host fails to sanitize user-supplied input to the<br />

'SoftParserFileXml' of the '/raidenhttpd-admin/slice/check.php' script before using it to<br />

include PHP code. An unauthenticated attacker may be able to exploit this issue to view<br />

arbitrary files or to execute arbitrary PHP code on the remote host, subject to the privileges<br />

of the user under which the application runs, which is LOCAL SYSTEM by default.<br />

Solution: No solution is known at this time.<br />

CVE-2006-4723<br />

Quicktime < 7.1.3 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3741 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote version of QuickTime is affected by multiple code execution<br />

vulnerabilities.\n\nThe remote version of Quicktime is vulnerable to various buffer<br />

overflows involving specially-crafted media files. An attacker may be able to leverage<br />

these issues to execute arbitrary code on the remote host by sending a malformed file to a<br />

victim and having them open it using QuickTime player.<br />

Family Internet Services 966


Solution: Upgrade to version 7.1.3 or higher.<br />

CVE-2006-4382<br />

Moodle < 1.6.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3742 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Moodle, an open-source content-management system written in PHP. This<br />

version of Moodle is vulnerable to a SQL Injection flaw, a cross-site scripting flaw, and an<br />

information disclosure flaw. An attacker exploiting these flaws would only need to be able<br />

to send malformed HTTP requests to the server. Successful exploitation would result in<br />

arbitrary SQL command execution on the remote database server, code execution within<br />

client browsers, or gleaning of information useful in future attacks.<br />

Solution: Upgrade to version 1.6.2 or higher.<br />

CVE-2006-4785<br />

Firefox < 1.5.0.7 Multiple Viulnerabilities<br />

<strong>PVS</strong> ID: 3743 FAMILY: Web Clients RISK: HIGH NESSUS ID:22369<br />

Description: Synopsis :\n\nThe remote Windows host contains a web browser that is affected by<br />

multiple vulnerabilities.\n\nThe installed version of Firefox is affected by multiple security<br />

issues, some of which may lead to execution of arbitrary code on the affected host subject<br />

to the user's privileges.<br />

Solution: Upgrade to version 1.5.0.7 or higher.<br />

CVE-2006-4566<br />

SeaMonkey < 1.0.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3744 FAMILY: Web Clients RISK: HIGH NESSUS ID:22371<br />

Description: Synopsis :\n\nA web browser on the remote host is prone to multiple flaws.\n\nThe<br />

installed version of SeaMonkey has various security issues, some of which may lead to<br />

execution of arbitrary code on the affected host subject to the user's privileges.<br />

Solution: Upgrade to version 1.0.5 or higher.<br />

CVE-2006-4566<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Thunderbird < 1.5.0.7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3745 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:22370<br />

Family Internet Services 967


Description: The remote Windows host contains a mail client that is affected by multiple vulnerabilities.<br />

The remote version of Mozilla Thunderbird has various security issues, at least one of<br />

which may lead to execution of arbitrary code on the affected host subject to the user's<br />

privileges.<br />

Solution: Upgrade to version 1.5.0.7 or higher.<br />

CVE-2006-4566<br />

RSSOwl < 1.2.3 Atom Feed XSS<br />

<strong>PVS</strong> ID: 3746 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML Injection attack.\n\nThe remote<br />

host is running RSSOwl, a free RSS reader. RSSOwl 1.2.2 (build 2006-08-27) and lower<br />

are reported vulnerable to flaws that would allow malicious RSS servers to execute<br />

malicious code via the RSSOwl application.<br />

Solution: Upgrade to version 1.2.3 or higher.<br />

CVE-2006-4760<br />

Netopia SNMP Password Disclosure<br />

<strong>PVS</strong> ID: 3747 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nThe remote host appears to be running a Netopia router with SNMP enabled.<br />

The Netopia router is using the default SNMP community strings. This version of the<br />

Netopia firmware is vulnerable to a flaw where a remote attacker can retrieve the<br />

administrative password by sending a specially formed SNMP query. An attacker<br />

exploiting this flaw would only need to be able to send SNMP queries to the router using<br />

the default community string of 'public'. Successful exploitation would result in the attacker<br />

gaining administrative credentials to the router.<br />

Solution: Upgrade or patch according to vendor recommendations. Change the default SNMP<br />

community string to one that is not easily guessed.<br />

CVE Not available<br />

SharpReader < 0.9.7.1 RSS Feed XSS<br />

<strong>PVS</strong> ID: 3748 FAMILY: Web Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML Injection attack.\n\nThe remote<br />

host is running SharpReader, a free RSS reader. SharpReader 0.9.7.0 and lower are<br />

reported to be vulnerable to flaws that would allow malicious RSS servers to execute<br />

malicious code via the SharpReader application.<br />

Family Internet Services 968


Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-4761<br />

SNMP 'cable-docsis' Community String<br />

<strong>PVS</strong> ID: 3749 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - 'cable-docsis'<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks, your community string<br />

is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP 'cable-docsis' Community String<br />

<strong>PVS</strong> ID: 3750 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - 'cable-docsis'<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks, your community string<br />

is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

OpenSSH < 4.4 Multiple GSSAPI Vulnerabilities<br />

<strong>PVS</strong> ID: 3751 FAMILY: SSH RISK: HIGH NESSUS ID:22466<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running a version of OpenSSH that is vulnerable to a flaw in the way that it<br />

handles GSSAPI authentication. If the SSH server is configured to utilize GSSAPI<br />

authentication then the host may be compromised by a remote attacker with access to the<br />

SSH port (typically 22). Successful exploitation would result in a Denial of Service (i.e.<br />

loss of availability). The version of SSH is: \n %L<br />

Solution: Upgrade to version 4.4 or higher.<br />

CVE-2006-5051<br />

SAP Internet Transaction Server (ITS) Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3752 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 969


Description: The remote host is running the SAP Internet Transaction Server (ITS). According to<br />

embedded HTML comments, the version and build information is: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

SAP Internet Transaction Server < 6.20 Patch 18 wgate urlmime Parameter XSS<br />

<strong>PVS</strong> ID: 3753 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:22465<br />

Description: The remote web server contains a CGI script that is vulnerable to a cross-site scripting<br />

attack. The remote web server fails to sanitize the contents of the 'urlmime' parameter to the<br />

'/scripts/wgate' script before using it to generate dynamic web content. An unauthenticated<br />

remote attacker may be able to leverage this issue to inject arbitrary HTML and script code<br />

into a user's browser to be evaluated within the security context of the affected web site.<br />

Solution: Upgrade to version 6.20 Patch 18 or higher.<br />

CVE-2006-5114<br />

OpenBSD Portable OpenSSH < 4.4.p1 GSSAPI Authentication Overflow<br />

<strong>PVS</strong> ID: 3754 FAMILY: SSH RISK: HIGH NESSUS ID:22466<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of OpenSSH that is vulnerable to a flaw in the way that it handles<br />

GSSAPI authentication. If the SSH server is configured to utilize GSSAPI authentication<br />

then the host may be compromised by a remote attacker with access to the SSH port<br />

(typically 22). Successful exploitation would result in remote code execution. The reported<br />

version number is: \n %L<br />

Solution: Upgrade to version 4.4.p1 or higher.<br />

CVE-2006-5052<br />

OpenSSL < 0.9.7l / 0.9.8d Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3755 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is using a version of OpenSSL that is older than 0.9.6m or 0.9.7d There are several bugs in<br />

this version of OpenSSL that may allow an attacker to either execute remote code or cause<br />

a Denial of Service (DoS).<br />

Solution: Upgrade to version 0.9.7l, 0.9.8d or higher.<br />

CVE-2006-3738<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 970


phpMyAdmin < 2.9.1 RC1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3756 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe vendor has released a fix for an undisclosed flaw in this version of the<br />

software.\n\nThe remote host is running phpMyAdmin, a web interface for administering<br />

MySQL database servers. This version of phpMyAdmin is vulnerable to an undisclosed<br />

vulnerability. The details of the flaws will be released by the vendor; however, they have<br />

released a patched version of phpMyAdmin.<br />

Solution: Upgrade to version 2.9.1 RC1 or higher.<br />

CVE-2006-5117<br />

Mac OS X < 10.4.8 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3757 FAMILY: Operating System Detection<br />

Description: Synopsis :\n\nThe remote host is missing a Mac OS X update that fixes a security<br />

contains several security fixes for the following programs :\n - CF<strong>Network</strong>\n - Fla<br />

Workgroup Manager<br />

Solution: Upgrade to Mac OS X 10.4.8 or<br />

higher:\nhttp://www.apple.com/support/downloads/macosx1048updateintel.html\nhttp://www.apple.com/su<br />

Mercury SiteScope Server Detection<br />

CVE-2006-4399<br />

<strong>PVS</strong> ID: 3758 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Mercury SiteScope Server. SiteScope is a system<br />

monitoring tool that large Enterprises use to track and monitor systems. The reported<br />

version is: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Sun Secure Global Desktop Detection<br />

<strong>PVS</strong> ID: 3759 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is running the Sun Secure Global Desktop, a web server application that<br />

allows access from multiple platforms. The reported version is: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 971


Sun Secure Global Desktop / Tarantella < 4.20.983 Multiple XSS<br />

<strong>PVS</strong> ID: 3760 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:22495<br />

Description: The remote web server contains CGI scripts that are vulnerable to cross-site scripting<br />

attacks. The remote web server contains a CGI script used by Sun Secure Global Desktop<br />

or Tarantella, a Java-based program for web-enabling applications running on a variety of<br />

platforms. According to the version reported in one of its scripts, the installation of the<br />

software on the remote host fails to sanitize user-supplied input to several unspecified<br />

parameters before using it to generate dynamic web content. An unauthenticated remote<br />

attacker may be able to leverage these issues to inject arbitrary HTML and script code into<br />

a user's browser to be evaluated within the security context of the affected web site.<br />

Solution: Upgrade to version 4.20.983 or higher.<br />

CVE-2006-4958<br />

SiVus VOIP Vulnerability Scanner Detection<br />

<strong>PVS</strong> ID: 3761 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is scanning the network with the SiVus VOIP vulnerability scanner. This<br />

tool scans networks and detects vulnerable VOIP SIP phones.<br />

Solution: Ensure that such scanning is in alignment with corporate policies and guidelines.<br />

SIP Client Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 3762 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the following SIP client: \n %L \nThis protocol is used to<br />

connect VoIP users via the Internet.<br />

Solution: N/A<br />

SIP Server Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 3763 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the following SIP server: \n %L \nThis protocol is used to<br />

connect VoIP users via the Internet.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 972


Cisco SIP TFTP Server Detection<br />

<strong>PVS</strong> ID: 3764 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nThe remote host is running a Cisco SIP VOIP server. The device is<br />

configured to allow TFTP access. An attacker can guess the name of the image files and<br />

download the device configuration. Such information would include passwords and IDs.<br />

Solution: Ensure that the TFTP server and associated ACLs are in alignment with corporate policies<br />

and guidelines.<br />

CVE Not available<br />

Sipsak VOIP Vulnerability Scanner Detection<br />

<strong>PVS</strong> ID: 3765 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is scanning the network with the Sipsak VOIP vulnerability scanner. This<br />

tool scans networks and detects vulnerable VOIP SIP phones. The version of Sipsak was: \n<br />

%L<br />

Solution: Ensure that such scanning is in alignment with corporate policies and guidelines.<br />

CVE Not available<br />

McAfee ePolicy Orchestrator HTTP Server Source Header Remote Overflow<br />

<strong>PVS</strong> ID: 3766 FAMILY: Web Servers RISK: HIGH NESSUS ID:22494<br />

Description: Arbitrary code can be executed on the remote host due to a flaw in the web service. The<br />

remote host is running McAfee ePolicy Orchestrator. The remote version of this software is<br />

vulnerable to a stack overflow vulnerability. An unauthenticated attacker can exploit this<br />

flaw by sending a specially crafted packet to the remote host. A successful exploitation of<br />

this vulnerability would result in remote code execution with the privileges of the<br />

SYSTEM.<br />

Solution: Upgrade to version 3.5.0 Patch 6 or higher.<br />

SIP Server Detection<br />

CVE-2006-5156<br />

<strong>PVS</strong> ID: 3767 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the following SIP server: \n %L \nThis protocol is used to<br />

connect VoIP users via the Internet.<br />

Solution: N/A<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 973


CVE Not available<br />

Asterisk VoIP Server Detection<br />

<strong>PVS</strong> ID: 3768 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Asterisk Voice Over IP (VoIP) Server. This service is used<br />

to manage phone calls between Internet hosts.<br />

Solution: N/A<br />

CVE Not available<br />

Asterisk VoIP Administrative Interface Detection<br />

<strong>PVS</strong> ID: 3769 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Asterisk administrative interface. This interface is used to<br />

manage the Voice Over IP (VoIP) services offered by the server.<br />

Solution: Ensure that the default settings for the web interface have been disabled or changed.<br />

Further, ensure that only trusted IP ranges can access the service.<br />

CVE Not available<br />

Cisco Call Manager (VoIP) Administrative Interface Detection<br />

<strong>PVS</strong> ID: 3770 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Cisco Call Manager administrative interface. This interface<br />

is used to manage the Voice Over IP (VoIP) services offered by the server.<br />

Solution: Ensure that the default settings for the Call Manager have been disabled or changed.<br />

Further, ensure that only trusted IP ranges can access the service.<br />

CVE Not available<br />

Cisco IP Phone Detection<br />

<strong>PVS</strong> ID: 3771 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running the Cisco IP Phone version/build " %L "\nFurther,<br />

the administrative page is available via an embedded web server. Unfortunately, the web<br />

server gives away critical information that an attacker can use to gain access to the VoIP<br />

device. This information includes, but is not limited to, user accounts, passwords, TFTP<br />

servers, network addresses, and phone line information. An attacker exploiting this flaw<br />

would be able to elevate access on the VoIP devices and possibly gain control of the<br />

devices.<br />

Family Internet Services 974


Solution: Use ACLs to ensure that only trusted administrators can access the administrative GUI.<br />

CVE Not available<br />

Skype Technologies < 1.5.0.80 NSRRunAlertPanel Function Format String (Mac OS X)<br />

<strong>PVS</strong> ID: 3772 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote format string flaw.\n\nThe remote<br />

host is using Skype, a peer to peer chat and VoIP software. The remote version of this<br />

software contains a format string flaw. An attacker exploiting this flaw would need to be<br />

able to convince a user to open a malicious URI that was handled by the Skype software.<br />

Successful exploitation would result in the attacker executing arbitrary code.<br />

Solution: Upgrade to version 1.5.0.80 or higher.<br />

CVE-2006-5084<br />

Mac OS X Generic Detection<br />

<strong>PVS</strong> ID: 3773 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Mac OS X.<br />

Solution: N/A<br />

CVE Not available<br />

Encryption Private Key Detection (Generic)<br />

<strong>PVS</strong> ID: 3774 FAMILY: Data Leakage RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nThe remote host has just passed an encryption private key via plaintext on the<br />

network. This is a risk in that private keys should only reside on a local system and if they<br />

must be passed, they should be encrypted in transit.<br />

Solution: Ensure that there are policies and guidelines in place that prohibit the passing of<br />

private encryption data in plaintext.<br />

CVE Not available<br />

Encryption Private Key Detection (Generic)<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3775 FAMILY: Data Leakage RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nThe remote host has just passed an encryption private key via plaintext on the<br />

network. This is a risk in that private keys should only reside on a local system and if they<br />

must be passed, they should be encrypted in transit.<br />

Family Internet Services 975


Solution: Ensure that there are policies and guidelines in place that prohibit the passing of<br />

private encryption data in plaintext.<br />

CVE Not available<br />

Encryption Private Key Detection (PuTTY)<br />

<strong>PVS</strong> ID: 3776 FAMILY: Data Leakage RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nThe remote host has just passed a PuTTY SSH client encryption private key via<br />

plaintext on the network. This is a risk in that private keys should only reside on a local<br />

system and if they must be passed, they should be encrypted in transit.<br />

Solution: Ensure that there are policies and guidelines in place that prohibit the passing of<br />

private encryption data in plaintext.<br />

CVE Not available<br />

Encryption Private Key Detection (PuTTY)<br />

<strong>PVS</strong> ID: 3777 FAMILY: Data Leakage RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nThe remote host has just passed a PuTTY SSH client encryption private key via<br />

plaintext on the network. This is a risk in that private keys should only reside on a local<br />

system and if they must be passed, they should be encrypted in transit.<br />

Solution: Ensure that there are policies and guidelines in place that prohibit the passing of<br />

private encryption data in plaintext.<br />

CVE Not available<br />

Encryption Private Key Detection (Generic)<br />

<strong>PVS</strong> ID: 3778 FAMILY: Data Leakage RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nThe remote host has just passed an encryption private key via plaintext on the<br />

network. This is a risk in that private keys should only reside on a local system and if they<br />

must be passed, they should be encrypted in transit.<br />

Solution: Ensure that there are policies and guidelines in place that prohibit the passing of<br />

private encryption data in plaintext.<br />

CVE Not available<br />

Encryption Private Key Detection (Generic)<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3779 FAMILY: Data Leakage RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 976


Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nThe remote host has just passed an encryption private key via plaintext on the<br />

network. This is a risk in that private keys should only reside on a local system and if they<br />

must be passed, they should be encrypted in transit.<br />

Solution: Ensure that there are policies and guidelines in place that prohibit the passing of<br />

private encryption data in plaintext.<br />

CVE Not available<br />

Encryption Private Key Detection (RSA)<br />

<strong>PVS</strong> ID: 3780 FAMILY: Data Leakage RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nThe remote host has just passed an encryption private key via plaintext on the<br />

network. This is a risk in that private keys should only reside on a local system and if they<br />

must be passed, they should be encrypted in transit.<br />

Solution: Ensure that there are policies and guidelines in place that prohibit the passing of<br />

private encryption data in plaintext.<br />

CVE Not available<br />

Encryption Private Key Detection (RSA)<br />

<strong>PVS</strong> ID: 3781 FAMILY: Data Leakage RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nThe remote host has just passed an encryption private key via plaintext on the<br />

network. This is a risk in that private keys should only reside on a local system and if they<br />

must be passed, they should be encrypted in transit.<br />

Solution: Ensure that there are policies and guidelines in place that prohibit the passing of<br />

private encryption data in plaintext.<br />

CVE Not available<br />

Encryption Private Key Detection (DSA)<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3782 FAMILY: Data Leakage RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nThe remote host has just passed a DSA encryption private key via plaintext on<br />

the network. This is a risk in that private keys should only reside on a local system and if<br />

they must be passed, they should be encrypted in transit.<br />

Solution: Ensure that there are policies and guidelines in place that prohibit the passing of<br />

private encryption data in plaintext.<br />

Family Internet Services 977


CVE Not available<br />

Encryption Private Key Detection (DSA)<br />

<strong>PVS</strong> ID: 3783 FAMILY: Data Leakage RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nThe remote host has just passed a DSA encryption private key via plaintext on<br />

the network. This is a risk in that private keys should only reside on a local system and if<br />

they must be passed, they should be encrypted in transit.<br />

Solution: Ensure that there are policies and guidelines in place that prohibit the passing of<br />

private encryption data in plaintext.<br />

CVE Not available<br />

Encryption Private Key Detection (PGP)<br />

<strong>PVS</strong> ID: 3784 FAMILY: Data Leakage RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nThe remote host has just passed a PGP encryption private key via plaintext on<br />

the network. This is a risk in that private keys should only reside on a local system and if<br />

they must be passed, they should be encrypted in transit.<br />

Solution: Ensure that there are policies and guidelines in place that prohibit the passing of<br />

private encryption data in plaintext.<br />

CVE Not available<br />

Encryption Private Key Detection (PGP)<br />

<strong>PVS</strong> ID: 3785 FAMILY: Data Leakage RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nThe remote host has just passed a PGP encryption private key via plaintext on<br />

the network. This is a risk in that private keys should only reside on a local system and if<br />

they must be passed, they should be encrypted in transit.<br />

Solution: Ensure that there are policies and guidelines in place that prohibit the passing of<br />

private encryption data in plaintext.<br />

HP Printer Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 3786 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running an HP printer.<br />

Solution: N/A<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 978


CVE Not available<br />

OpenSSH < 4.1.0p2 / 4.2 Timing Attack<br />

<strong>PVS</strong> ID: 3787 FAMILY: SSH RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host discloses information regarding the availability of user<br />

accounts.\n\nThe remote host is running a version of OpenSSH that is vulnerable to a flaw<br />

in the way that it handles authentication requests. Specifically, OpenSSH is alleged to vary<br />

response time based on the complexity (or availability) of the user password. An account<br />

that had no password would elicit a quicker SSH response than an account that had a<br />

defined password. An attacker exploiting this flaw would be able to determine local<br />

accounts that had passwords. This information would be useful in other more complex<br />

attacks. Tthe reported version of SSH is: \n %L<br />

Solution: Upgrade to version 4.2, 4.1.0p2 or higher.<br />

CVE-2006-5229<br />

ZABBIX Multiple Overflows<br />

<strong>PVS</strong> ID: 3788 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote<br />

server is running ZABBIX, an open-source tool that is used to manage network devices.<br />

This version of ZABBIX is vulnerable to a flaw in the way that it handles agent data. An<br />

attacker spoofing an agent would be able to exploit a number of flaws that would give the<br />

attacker the rights of the ZABBIX server.<br />

Solution: No solution is known at this time.<br />

CVE-2006-6693<br />

ZABBIX Client Detection<br />

<strong>PVS</strong> ID: 3789 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the ZABBIX client. ZABBIX is a client-server application that<br />

allows a central server to collect and manage results from multiple clients.<br />

Solution: N/A<br />

CVE Not available<br />

LogMeIn Listening Server Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3790 FAMILY: Policy RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 979


Description: The remote client is a LogMeIn server awaiting remote connection. LogMeIn is an<br />

application that allows users to access their computers (work or home) from anywhere in<br />

the world via a web browser. LogMeIn works by installing an agent on the computer that is<br />

to be accessed remotely. The application then establishes a client connection to an Internet<br />

server and allows the user to connect over the established HTTPS connection. As such,<br />

LogMeIn has the ability to bypass firewalls and proxies.<br />

Solution: Ensure that such usage is in alignment with corporate policies and guidelines regarding<br />

remote access.<br />

CVE Not available<br />

LogMeIn Listening Server Detection<br />

<strong>PVS</strong> ID: 3791 FAMILY: Policy RISK: LOW NESSUS ID:Not Available<br />

Description: The remote client is a LogMeIn server awaiting remote connection. LogMeIn is an<br />

application that allows users to access their computers (work or home) from anywhere in<br />

the world via a web browser. LogMeIn works by installing an agent on the computer that is<br />

to be accessed remotely. The application then establishes a client connection to an Internet<br />

server and allows the user to connect over the established HTTPS connection. As such,<br />

LogMeIn has the ability to bypass firewalls and proxies.<br />

Solution: Ensure that such usage is in alignment with corporate policies and guidelines regarding<br />

remote access.<br />

ColdFusion <<br />

CVE Not available<br />

<strong>PVS</strong> ID: 3792 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the<br />

bypassing of authentication.\n\nThe remote host is running Macromedia<br />

ColdFusion, a web application server. This version of Macromedia is<br />

vulnerable to a flaw where a user with local system access can bypass<br />

authentication and gain administrative access over the application. Successful<br />

exploitation impacts confidentiality, integrity, and availability.<br />

Solution: Upgrade to version 7,0,2,142559 or higher.<br />

CVE-2006-3978<br />

Blueshoes GoogleSearch.php APP[path][lib] Parameter Remote File Inclusion<br />

<strong>PVS</strong> ID: 3793 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 980


Description: Synopsis :\n\nThe remote host is vulnerable to a file-include injection flaw.\n\nThe remote<br />

host is running the Blueshoes framework, a PHP framework for creating web applications.<br />

This version of Blueshoes is vulnerable to a flaw in the GoogleSearch.php script. An<br />

attacker exploiting this flaw would be able to execute arbitrary PHP code on the target<br />

server. Successful exploitation would give the attacker the same rights as the web process.<br />

Solution: No solution is known at this time.<br />

CVE-2006-5250<br />

ClamAV < 0.88.5 PE Handler Content-Parsing Overflow<br />

<strong>PVS</strong> ID: 3794 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a heap overflow.\n\nThe remote host is<br />

running ClamAV, an antivirus application. The remote host is running version: \n %L<br />

\n\nThere is a remote content-parsing flaw in this version of ClamAV that could lead to a<br />

heap overflow. An attacker sending a malformed PE file would be able to exploit this flaw.<br />

Successful exploitation would result in the attacker executing arbitrary code.<br />

Solution: Upgrade to version 0.88.5 or higher.<br />

CVE-2006-5295<br />

Skinny Server Detection<br />

<strong>PVS</strong> ID: 3795 FAMILY: Generic RISK: INFO NESSUS ID:22877<br />

Description: The remote server is an H.323 proxy that understands the Skinny protocol, also known as<br />

SCCP, for 'Skinny Client Control Protocol'. Skinny is Cisco's proprietary lightweight<br />

terminal control protocol used by some VoIP phones to communicate with Cisco<br />

CallManager or Asterisk PBX systems.<br />

Solution: Limit incoming traffic to this port.<br />

CVE Not available<br />

Opera < 9.02 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3796 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:22875<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is susceptible to a heap buffer<br />

overflow attack.\n\nThe version of Opera installed on the remote host reportedly contains a<br />

heap buffer overflow vulnerability that can be triggered by a long link. Successful<br />

exploitation of this issue may result in a crash of the application or even allow for<br />

execution of arbitrary code subject to the user's privileges.<br />

Solution: Upgrade to version 9.02 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 981


CVE-2006-4819<br />

Cerberus Helpdesk rpc.php Information Disclosure<br />

<strong>PVS</strong> ID: 3797 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:22876<br />

Description: Synopsis :\n\nThe remote web server contains a PHP script that is affected by an<br />

information disclosure issue.\n\nThe remote host is running Cerberus Helpdesk, a<br />

web-based helpdesk suite written in PHP. The installed version of Cerberus Helpdesk on<br />

the remote host allows an unauthenticated attacker to retrieve information about ticket<br />

requesters through the 'rpc.php' script.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-5428<br />

PostgreSQL Multiple Local DoS Vulnerabilities<br />

<strong>PVS</strong> ID: 3798 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running PostgreSQL, an open source relational database. This version is<br />

vulnerable to multiple flaws where an attacker with local access can cause the service to<br />

stop. Successful exploitation would result in the system being unavailable to legitimate<br />

users.<br />

Solution: Upgrade to version 7.3.16, 7.4.14, 8.0.9, 8.15 or higher.<br />

CVE-2006-5542<br />

FtpXQ FTP Server < 3.0.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3799 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote<br />

FtpXQ FTP server vulnerable to multiple flaws. Versions 3.01 and lower are vulnerable to<br />

a buffer overflow that results in a Denial of Service (DoS) attack. In addition, versions 3.01<br />

and lower ship with two default accounts that are enabled. These accounts<br />

are:\nanonymous/NULL and\ntest/test\n\nAn attacker exploiting the 'test' default account<br />

would have read/write capability on the remote FTP server.<br />

Solution: Upgrade to version 3.0.2 or higher.<br />

CVE-2006-5569<br />

Winamp < 5.31 Multiple Heap Overflows<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3800 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 982


Description: Synopsis :\n\nThe remote host is vulnerable to a heap overflow.\n\nThe remote host is<br />

running Winamp, a multi-media software application. This version of Winamp is<br />

vulnerable to multiple heap overflows. Specifically, the application fails to handle buffers<br />

when handling 'ultravox-max' and 'Lyrics3' tags. An attacker exploiting this flaw would<br />

need to be able to convince a user into perusing a malicious media server. Successful<br />

exploitation would give the attacker the ability to execute code with the privileges of the<br />

user running Winamp.<br />

Solution: Upgrade to version 5.31 or higher.<br />

CVE-2006-5567<br />

Web Wiz Forums forum/search.asp KW Parameter SQL Injection<br />

<strong>PVS</strong> ID: 3801 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is vulnerable to a SQL injection flaw in its search.asp script. An attacker exploiting this<br />

flaw would be able to execute arbitrary commands on the remote database server.<br />

Successful exploitation would only require that the attacker be able to send malformed<br />

requests to the search.asp application. Successful exploitation would result in a loss of<br />

confidentiality, integrity, and availability.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-5635<br />

FreePBX VoIP Administrative Interface Detection<br />

<strong>PVS</strong> ID: 3802 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the FreePBX administrative interface. FreePBX is an Asterisk<br />

derivative that includes a Voice Over IP (VoIP) server and an administrative web interface.<br />

The web interface is used to manage the VoIP services. The version of FreePBX is\n%L<br />

Solution: Ensure that the default settings for the web interface have been disabled or changed. Also<br />

ensure that only trusted IP ranges can access the service.<br />

CVE Not available<br />

WordPress < 2.0.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3803 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running WordPress, a web blog manager written in PHP.\nThe remote version of this<br />

software is reported to be vulnerable to a number of flaws. At the time of this writing, the<br />

flaws have not been verified by the vendor. Allegedly, an attacker can exploit these flaws to<br />

gain information about the server that would be useful in future attacks. The WordPress<br />

application is hosted at the following location:\n%P<br />

Family Internet Services 983


Solution: Upgrade to version 2.0.5 or higher.<br />

CVE-2006-5705<br />

SQLYog MySQL HTTP Tunnel Detection<br />

<strong>PVS</strong> ID: 3804 FAMILY: Backdoors<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nThe remote host is running a MySQL database. In addition, a PHP script is<br />

installed that allows MySQL connections to be tunneled over HTTP. This sort of<br />

connection is typically utilized when the database administrator does not have access to<br />

connect to the database from remote locations. The tunnel does not use any sort of<br />

encryption and exposes credentials to passive sniffing. In addition, as the PHP script<br />

connects to the database from the localhost, database authentication does not look for the<br />

originating IP address within the GRANT tables but instead uses the server IP as the<br />

originating source. Not only does the script allow database admins to bypass firewall<br />

restrictions and log in insecurely, it also exposes the database to brute-force attacks from<br />

anonymous users. The database information contained within the client request was:\n%P\n<br />

Solution: For remote database administration, choose a method of connection that is restricted to only<br />

trusted sources and encrypts the authentication credentials.<br />

CVE Not available<br />

MetaSploit Server Detection<br />

<strong>PVS</strong> ID: 3805 FAMILY: Policy<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy\n\nThe remote server is running a MetaSploit Framework server.<br />

Metasploit allows users to automatically exploit and backdoor vulnerable applications via<br />

the network.<br />

Solution: Ensure that this application is authorized according to corporate policies and guidelines.<br />

CVE Not available<br />

MetaSploit Server Detection<br />

<strong>PVS</strong> ID: 3806 FAMILY: Policy<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote server was just observed making an SSL connection to<br />

metasploit.com. An SSL connection to metasploit.com usually indicates a Metasploit server<br />

that is downloading updates from the metasploit.com web site. Metasploit is an attack<br />

framework that allows users to automatically exploit and backdoor vulnerable applications<br />

Family Internet Services 984


via the network.<br />

Solution: Ensure that this application is authorized according to corporate policies and guidelines.<br />

CVE Not available<br />

Brutus Password Scanning Tool Detection<br />

<strong>PVS</strong> ID: 3807 FAMILY: Policy<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote client is running a Brutus scanner. Brutus is a brute-force<br />

scanner that scans servers, routers, applications and more for passwords.<br />

Solution: Ensure that this application is authorized according to corporate policies and guidelines.<br />

CVE Not available<br />

WarFTP Daemon < 1.82.00-RC13 Multiple Command Remote Format Strings<br />

<strong>PVS</strong> ID: 3808 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote 'format string' flaw.\n\nThe remote<br />

host is running WarFTPd, an FTP server for the Microsoft platform. The version of<br />

WarFTPd running on this host contains multiple 'format string' vulnerabilities. An attacker<br />

exploiting these flaws would need to be able to authenticate to the FTP server. After<br />

authentication, the attacker would send a malformed request. Successful exploitation would<br />

allow the attacker to crash the application and possibly execute arbitrary code on the<br />

remote server. The vulnerable commands are 'CWD', 'CDUP', 'DELE', 'NLST', 'LIST' and<br />

'SIZE'.<br />

Solution: Upgrade to version 1.82.00-RC13 or higher.<br />

CVE-2006-5789<br />

Sun-One Application Server Version Detection<br />

<strong>PVS</strong> ID: 3809 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Sun-One Application Server version %L<br />

Solution: N/A<br />

CVE Not available<br />

SeaMonkey < 1.0.6 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3810 FAMILY: Web Clients RISK: HIGH NESSUS ID:23634<br />

Family Internet Services 985


Description: Synopsis :\n\nA web browser on the remote host is prone to multiple<br />

vulnerabilities.\n\nThe installed version of SeaMonkey contains various security issues,<br />

some of which may lead to execution of arbitrary code on the affected host subject to the<br />

user's privileges.<br />

Solution: Upgrade to version 1.0.6 or higher.<br />

CVE-2006-5748<br />

Mozilla Thunderbird < 1.5.0.8 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3811 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:23635<br />

Description: Synopsis :\n\nThe remote Windows host contains a mail client that is affected by multiple<br />

vulnerabilities.\n\nThe remote version of Mozilla Thunderbird suffers from various security<br />

issues, at least one of which may lead to execution of arbitrary code on the affected host<br />

subject to the user's privileges.<br />

Solution: Upgrade to version 1.5.0.8 or higher.<br />

CVE-2006-5748<br />

Firefox < 1.5.0.8 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3812 FAMILY: Web Clients RISK: HIGH NESSUS ID:23633<br />

Description: Synopsis :\n\nThe remote Windows host contains a web browser that is affected by<br />

multiple vulnerabilities.\n\nThe installed version of Firefox is affected by various security<br />

issues, some of which may lead to execution of arbitrary code on the affected host subject<br />

to the user's privileges.<br />

Solution: Upgrade to version 1.5.0.8 or higher.<br />

CVE-2006-5748<br />

Tivoli <strong>Network</strong> Services Auditor (NSA) Scanner Detection<br />

<strong>PVS</strong> ID: 3813 FAMILY: Policy<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote host is running the Tivoli <strong>Network</strong> Services Auditor<br />

scanning software. This software is used to automate the scanning of network systems for<br />

known vulnerabilities. The presence of this scanner indicates that a group is scanning the<br />

network for vulnerabilities.<br />

Solution: Ensure that these scanners are authorized according to corporate policies and guidelines.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 986


WorldMail <<br />

<strong>PVS</strong> ID: 3814 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow and other<br />

flaws.\n\nThe remote host is running Eudora WorldMail, a commercial mail server<br />

for Windows. This version of Worldmail is vulnerable to a remote buffer overflow.<br />

An attacker exploiting this flaw would be able to execute arbitrary code on the<br />

target machine. In addition, the application is reported to be vulnerable to a Denial<br />

of Service (DoS) attack.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-6025<br />

ALT-N MDaemon < 9.0.7 / 9.54 Local Insecure Directory<br />

<strong>PVS</strong> ID: 3815 FAMILY: POP Server<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a local 'privilege escalation' flaw.\n\nThe<br />

remote host is running the Alt-N MDaemon mail server. This is a mail server for the<br />

Microsoft Windows platform. This version of MDaemon is vulnerable to a flaw where<br />

local attackers can overwrite critical MDaemon library files. Successful exploitation would<br />

give the local user the ability to escalate privileges to those of the MDaemon server. This<br />

would impact confidentiality, integrity, and availability.<br />

Solution: Upgrade to version 9.0.7 or 9.54 or higher.<br />

CVE Not available<br />

Apache mod_auth_kerb <<br />

<strong>PVS</strong> ID: 3816 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the Apache mod_auth_kerb Kerberos authentication module. This version of<br />

mod_auth_kerb is reported to be vulnerable to a remote buffer overflow. The details of the<br />

attack are not yet known, however, it is alleged that an attacker would be able to crash the<br />

system or execute arbitrary code. In order to exploit this flaw, an attacker would only need<br />

to send a malformed Kerberos authentication request.<br />

Solution: Upgrade to a version higher than 5.20.<br />

CVE-2006-5989<br />

Windows Media Player <<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3817 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 987


Description: Synopsis : \n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running Microsoft Media Player version: \n %L .\n\nThere is a flaw in this<br />

version of Media Player that would allow a remote attacker to crash the application. The<br />

flaw is in the way that Media Player parses long playlist files. An attacker exploiting this<br />

flaw would need to be able to convince a user to open a malicious playlist file.<br />

Solution: Upgrade to a version of Windows Media Player higher than 10.00.00.4036.<br />

CVE-2006-6134<br />

WinGate < 6.2.0 Compressed Name Pointer DoS<br />

<strong>PVS</strong> ID: 3818 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote proxy is affected by a denial of service vulnerability.\n\nThe<br />

remote host appears to be running WinGate, a Windows application for managing and<br />

securing Internet access. The version of WinGate installed on the remote host contains a<br />

flaw involving the processing of DNS requests with compressed name pointers. By sending<br />

a specially-crafted DNS request to a UDP port on which WinGate is listening, an<br />

unauthenticated remote attacker can cause the affected application to consume 100% of the<br />

available CPU, thereby denying service to legitimate users.<br />

Solution: Upgrade to version 6.2.0 or higher.<br />

iTunes Detection<br />

CVE-2006-4518<br />

<strong>PVS</strong> ID: 3819 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote host is running an iTunes music share version<br />

%L.\niTunes is a software package that is used to manage music media files. iTunes has a<br />

'music share' feature that allows user(s) to access their music via an iTunes web server.<br />

Solution: Ensure that such software is in alignment with Corporate policies and guidelines.<br />

iTunes Client Detection<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3820 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running iTunes, an application for managing and listening to music<br />

media files. The version of iTunes client is: \n %L .<br />

Solution: Ensure that such software is in alignment with corporate policies and guidelines.<br />

Family Internet Services 988


CVE Not available<br />

SSH Server Detection (Non-standard Port)<br />

<strong>PVS</strong> ID: 3821 FAMILY: SSH RISK: NONE NESSUS ID:Not Available<br />

Description: The remote host is running a SSH server: \n %L \nThe SSH server is not running on port<br />

22.<br />

Solution: Ensure that this service is authorized.<br />

CVE Not available<br />

Microsoft Office .xls File Detection<br />

<strong>PVS</strong> ID: 3822 FAMILY: Data Leakage RISK: INFO NESSUS ID:11419<br />

Description: The remote web server is hosting .xls files. As an example, consider the following file<br />

%P\nThe webmaster should make sure that these files contain no confidential data.<br />

Solution: N/A<br />

CVE Not available<br />

Microsoft Office .doc File Detection<br />

<strong>PVS</strong> ID: 3823 FAMILY: Data Leakage RISK: INFO NESSUS ID:11419<br />

Description: The remote web server is hosting .doc files. These are Microsoft Office document files. As<br />

an example, consider the following file %P\nThe webmaster should make sure that these<br />

files contain no confidential data.<br />

Solution: N/A<br />

CVE Not available<br />

Microsoft Office .ppt File Detection<br />

<strong>PVS</strong> ID: 3824 FAMILY: Data Leakage RISK: INFO NESSUS ID:11419<br />

Description: The remote web server is hosting .ppt files. These are Microsoft Office PowerPoint<br />

presentation files. As an example, consider the following file %P\nThe webmaster should<br />

make sure that these files contain no confidential data.<br />

Solution: N/A<br />

CVE Not available<br />

Microsoft Office .csv File Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3825 FAMILY: Data Leakage RISK: INFO NESSUS ID:11419<br />

Family Internet Services 989


Description: The remote web server is hosting .csv files. These are Microsoft Office spreadsheet files.<br />

As an example, consider the following file %P\nThe webmaster should make sure that<br />

these files contain no confidential data.<br />

Solution: N/A<br />

CVE Not available<br />

Microsoft Office .rtf File Detection<br />

<strong>PVS</strong> ID: 3826 FAMILY: Data Leakage RISK: INFO NESSUS ID:11419<br />

Description: The remote web server is hosting .rtf files. These are Microsoft Office rich text format (rtf)<br />

document files. As an example, consider the following file %P\nThe webmaster should<br />

make sure that these files contain no confidential data.<br />

Solution: N/A<br />

CVE Not available<br />

Policy - .mp3 / .mp4 File Detection<br />

<strong>PVS</strong> ID: 3827 FAMILY: CGI RISK: INFO NESSUS ID:11419<br />

Description: The remote web server is hosting .mp3 or .mp4 files. As an example, consider the<br />

following file %P\nThe webmaster should make sure that these files are in compliance with<br />

corporate policies and guidelines.<br />

Solution: N/A<br />

CVE Not available<br />

Policy - .wav File Detection<br />

<strong>PVS</strong> ID: 3828 FAMILY: CGI RISK: INFO NESSUS ID:11419<br />

Description: The remote web server is hosting .wav files. As an example, consider the following file<br />

%P\nThe webmaster should make sure that these files are in compliance with corporate<br />

policies and guidelines.<br />

Solution: N/A<br />

Web Server Type<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3829 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 990


Description: A web server is running on port: Version %L<br />

Solution: N/A<br />

CVE Not available<br />

Web Server Detection on Port Other Than TCP/80<br />

<strong>PVS</strong> ID: 3830 FAMILY: Web Servers RISK: NONE NESSUS ID:Not Available<br />

Description: <strong>PVS</strong> has discovered a web server running on a non-standard port. The reported version<br />

information for this web server is: \n %L<br />

Solution: Ensure that this web server is authorized according to existing policies and guidelines.<br />

CVE Not available<br />

FreePBX < 2.2.1 VoIP Input Validation Vulnerabilities<br />

<strong>PVS</strong> ID: 3831 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the FreePBX administrative interface. FreePBX is an Asterisk derivative that<br />

includes a Voice Over IP (VoIP) server and an administrative web interface. The web<br />

interface is used to manage the VoIP services. The version of FreePBX is\n%L\nThis<br />

version of FreePBX is vulnerable to flaws in the way that it handles 'CALLERID(name)'<br />

and 'CALLERID(num)'. While the details are unknown, it is alleged that an attacker will be<br />

able to possibly inject or execute code on the remote system.<br />

Solution: Upgrade to version 2.2.1 or higher.<br />

CVE-2006-6244<br />

Xerox WorkCentre Detection<br />

<strong>PVS</strong> ID: 3832 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Xerox WorkCentre, a web-based printer and copier.<br />

Solution: N/A<br />

CVE Not available<br />

Xerox WorkCentre Version Detection<br />

<strong>PVS</strong> ID: 3833 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Xerox WorkCentre version %L<br />

Solution: N/A<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 991


CVE Not available<br />

Xerox WorkCentre Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3834 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is a Xerox WorkCentre. The exact version of the installed software is %L\nThis version of<br />

WorkCentre is vulnerable to a number of flaws. Namely\n 1) There are multiple command<br />

injection flaws that would allow an anonymous user to execute commands with the<br />

privileges of the WorkCentre Administrator.\n 2) Administrative bypass within the<br />

TFTP/BOOTP auto configuration options. This flaw would allow an attacker to make<br />

configuration changes that would impact the availability of the remote printer\n 3) A flaw<br />

that would allow an attacker to hijack email messages and insert malicious code into the<br />

body of the message\n 4) A flaw within the 'scan-to-mailbox' function that would allow an<br />

attacker to retrieve sensitive files\n 5) A flaw that would allow an attacker to switch to the<br />

HTTP protocol instead of the HTTPS protocol<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-6432<br />

Serendipity serendipity[charset] Parameter Local File Inclusion<br />

<strong>PVS</strong> ID: 3835 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:23752<br />

Description: Synopsis :\n\nThe remote web server contains a PHP application that is affected by<br />

multiple local file inclusion issues.\n\nSeveral scripts included with the version of<br />

Serendipity installed on the remote host fail to sanitize input to the 'serendipity[charset]'<br />

parameter before using it to include PHP code. Provided PHP's 'register_globals' setting is<br />

enabled, an unauthenticated attacker may be able to exploit these issues to view arbitrary<br />

files or to execute arbitrary PHP code on the remote host, subject to the privileges of the<br />

web server user IS.<br />

Solution: No solution is known at this time.<br />

CVE-2006-6242<br />

TNFTPD < 20040811 Globbing Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3836 FAMILY: FTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running TNFTPD, a port of the NetBSD FTP daemon. This version of TNFTPD is<br />

vulnerable to a remote buffer overflow. The flaw is within the glob.c function. An attacker<br />

exploiting this flaw would need to authenticate to the server and then pass a malformed<br />

string that would be interpreted by the glob function. Successful exploitation results in the<br />

attacker executing arbitrary code on the remote system.<br />

Family Internet Services 992


Solution: Upgrade to version 20040811 or higher.<br />

CVE-2006-6652<br />

Python Urllib Version Detection<br />

<strong>PVS</strong> ID: 3837 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Python's urllib version %L<br />

Solution: N/A<br />

CVE Not available<br />

Kaspersky Antivirus Client Detection<br />

<strong>PVS</strong> ID: 3838 FAMILY: FTP Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Kaspersky antivirus client version %L<br />

Solution: N/A<br />

CVE Not available<br />

Policy - .ogg File Detection<br />

<strong>PVS</strong> ID: 3839 FAMILY: CGI RISK: INFO NESSUS ID:11419<br />

Description: The remote web server is hosting .ogg files. As an example, consider the following file<br />

%P\nThe webmaster should make sure that these files are in compliance with corporate<br />

policies and guidelines.<br />

Solution: N/A<br />

CVE Not available<br />

Policy - .wma File Detection<br />

<strong>PVS</strong> ID: 3840 FAMILY: CGI RISK: INFO NESSUS ID:11419<br />

Description: The remote web server is hosting .wma files. As an example, consider the following file<br />

%P\nThe webmaster should make sure that these files are in compliance with corporate<br />

policies and guidelines.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Kaspersky Antivirus Client MIME-encoded Scan Bypass<br />

<strong>PVS</strong> ID: 3841 FAMILY: FTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 993


Description: Synopsis :\n\nThe antivirus product can be tricked into not scanning potentially malicious<br />

files.\n\nThe remote host is running the Kaspersky antivirus client version %L\nThis<br />

version of Kaspersky is vulnerable to a flaw where file scanning can be bypassed by<br />

passing malformed MIME-encoded requests. An attacker exploiting this flaw would be<br />

able to send malicious files through the antivirus product without being detected.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-6409<br />

ClamAV < 0.88.7 MIME-encoded Scan Bypass<br />

<strong>PVS</strong> ID: 3842 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe antivirus product can be tricked into not scanning potentially malicious<br />

files.\n\nThe remote host is running the ClamAV antivirus client version %L\nThis version<br />

of ClamAV is vulnerable to a flaw where file scanning can be bypassed by passing<br />

malformed MIME-encoded requests. An attacker exploiting this flaw would be able to send<br />

malicious files through the antivirus product without detection.<br />

Solution: Upgrade to version 0.88.7 or higher.<br />

Novell Client Detection<br />

CVE-2006-5874<br />

<strong>PVS</strong> ID: 3843 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Novell client software.<br />

Solution: N/A<br />

CVE Not available<br />

Novell Service Agent Detection<br />

<strong>PVS</strong> ID: 3844 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Novell software. In addition, the software is announcing itself<br />

on the network as a service agent.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

ThinClientServer < 4.0.2248 Admin Account Creation<br />

<strong>PVS</strong> ID: 3845 FAMILY: CGI RISK: HIGH NESSUS ID:23780<br />

Family Internet Services 994


Description: The remote web server contains a PHP script that allows the creation of additional<br />

administrative accounts. The remote host is running ThinClientServer, an application to<br />

convert existing PCs into thin clients. The version of ThinClientServer installed on the<br />

remote host allows an unauthenticated remote attacker to create administrative accounts.<br />

Solution: Upgrade to version 4.0.2248 or higher.<br />

CVE-2006-6221<br />

Cell Phone Operating System Discovery<br />

<strong>PVS</strong> ID: 3846 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a cellular device with web browsing capabilities. The remote client OS<br />

is %L<br />

Solution: N/A<br />

CVE Not available<br />

Policy - .avi File Detection<br />

<strong>PVS</strong> ID: 3847 FAMILY: CGI RISK: INFO NESSUS ID:11419<br />

Description: The remote web server is hosting .avi files. These are audio/video files. As an example,<br />

consider the following file %P\nThe webmaster should make sure that these files are in<br />

compliance with corporate policies and guidelines.<br />

Solution: N/A<br />

CVE Not available<br />

Policy - .mpg File Detection<br />

<strong>PVS</strong> ID: 3848 FAMILY: CGI RISK: INFO NESSUS ID:11419<br />

Description: The remote web server is hosting .mpg files. These are audio/video files. As an example,<br />

consider the following file %P\nThe webmaster should make sure that these files are in<br />

compliance with corporate policies and guidelines.<br />

Solution: N/A<br />

CVE Not available<br />

MODBUS Server Diagnostic Mode (SCADA)<br />

<strong>PVS</strong> ID: 3849 FAMILY: SCADA<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 995


Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote server is running the MODBUS protocol. This protocol is common<br />

on SCADA or process control networks. In addition, the PLC is running with 'Diagnostics'<br />

enabled. This is very dangerous, as it can give attackers information that can be used to<br />

exploit the machine.<br />

Solution: Only allow diagnostic sessions from trusted clients.<br />

CVE Not available<br />

Modicon PLC Embedded HTTP Server Detection (SCADA)<br />

<strong>PVS</strong> ID: 3850 FAMILY: SCADA RISK: LOW NESSUS ID:Not Available<br />

Description: The Modicon Quantum, Premium and Micro models of PLC have an HTTP server<br />

interface. The Modicon PLC web server and content was identified on the host. The banner<br />

is reporting version %L<br />

Solution: Filter access to TCP port 80 to authorized management addresses.<br />

CVE Not available<br />

Modicon PLC Default FTP Password (SCADA)<br />

<strong>PVS</strong> ID: 3851 FAMILY: SCADA RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe ethernet modules on Modicon Quantum, Premium and Micro brand<br />

PLC's have an FTP server. The FTP server has one account that can be modified. The<br />

default account has the ability to load programs and change the configuration and<br />

programming of the PLC.<br />

Solution: Change the username and password for the FTP server.<br />

CVE Not available<br />

Modicon Modbus/TCP Programming Function Code Access (SCADA)<br />

<strong>PVS</strong> ID: 3852 FAMILY: SCADA RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nThe proprietary Modbus/TCP function code 126 is active on this Modbus<br />

slave. An attacker who is able to gain network access to this device may be able to<br />

reprogram PLC logic or otherwise impact the integrity of the physical process.<br />

Solution: Filter incoming traffic on this port to authorized Modbus TCP clients.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Modicon PLC HTTP Server Default Username/Password (SCADA)<br />

Family Internet Services 996


<strong>PVS</strong> ID: 3853 FAMILY: SCADA RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe ethernet module on Modicon's Quantum, Premium and Micro PLC's<br />

has an HTTP server with one account that can be modified. The default account has the<br />

ability to load programs and change the configuration and programming of the PLC.<br />

Solution: Change the username and password for the HTTP server.<br />

CVE Not available<br />

Modicon PLC Telnet Server Detection (SCADA)<br />

<strong>PVS</strong> ID: 3854 FAMILY: SCADA RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host is a Modicon PLC Telnet server.<br />

Solution: Restrict access to the affected port on the PLC or change the default credentials.<br />

CVE Not available<br />

Modicon PLC CPU Type Default Credentials (SCADA)<br />

<strong>PVS</strong> ID: 3855 FAMILY: SCADA<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe Modicon Quantum, Premium and Momentum brands of PLCs have a<br />

private SNMP MIB that is available on the Internet. The type of Modicon PLC may be<br />

obtained via an SNMP Get Request.<br />

Solution: Change default community strings to a value not easily guessed and filter access to the<br />

SNMP port.<br />

CVE Not available<br />

Modicon PLC IO Scan Status Disclosure<br />

<strong>PVS</strong> ID: 3856 FAMILY: Generic<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe Modicon Quantum, Premium and Momentum brands of PLCs have a<br />

private SNMP MIB that is available on the Internet. The scan status may be obtained via an<br />

SNMP Get Request. The scan status is either idle, operational or stopped. An attacker may<br />

use this information to determine the status of a PLC.<br />

Solution: Change default community strings to a value not easily guessed and filter access to the<br />

SNMP port.<br />

Family Internet Services 997


CVE Not available<br />

PHP < 4.4.5 / 5.2.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3857 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker<br />

exploiting these flaws would be able to impact confidentiality, integrity, and availability.<br />

The reported version of PHP is: \n %L<br />

Solution: Upgrade to version 4.4.5, 5.2.1 or higher.<br />

CVE-2006-6383<br />

Generic Botnet Client Detection<br />

<strong>PVS</strong> ID: 3858 FAMILY: IRC Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'Backdoor'<br />

program.\n\nThe remote host appears to be running a machine that has been compromised<br />

and is being controlled by a botnet. A botnet is a network of compromised computers<br />

which are remotely controlled by a malicious bot administrator. Botnets are commonly<br />

used for\nsending spam\nrunning Denial of Service (DoS) attacks against other<br />

networks\nscanning and compromising new systems\nInstalling sniffers\nInstalling<br />

keyloggers\nIdentify theft \nThe observed command was '%L'<br />

realtime<br />

Solution: You should manually inspect the machine for malicious processes. In addition, you may<br />

wish to consider installing security software that detects and blocks this sort of malicious<br />

software.<br />

CVE Not available<br />

Windows Media Format Series Remote Code Execution (923689)<br />

<strong>PVS</strong> ID: 3859 FAMILY: Web Clients RISK: HIGH NESSUS ID:23838<br />

Description: Synopsis :\n\nArbitrary code can be executed on the remote host through the Media Format<br />

Series.\n\nThe remote host is running Windows Media Player/Series. There is a<br />

vulnerability in the remote version of this software that may allow an attacker to execute<br />

arbitrary code on the remote host. To exploit this flaw, one attacker would need to set up a<br />

rogue ASF/ASX file and send it to a victim on the remote host.<br />

Solution: Microsoft has released a set of patches for Windows 2000, XP and 2003 at<br />

http://www.microsoft.com/technet/security/bulletin/ms06-078.mspx<br />

CVE-2006-6134<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Cumulative <strong>Security</strong> Update for Outlook Express (923694)<br />

Family Internet Services 998


<strong>PVS</strong> ID: 3860 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:23835<br />

Description: Synopsis :\n\nArbitrary code can be executed on the remote host through the email<br />

client.\n\nThe remote host is running a version of Microsoft Outlook Express that contains<br />

a security flaw that may allow an attacker to execute arbitrary code on the remote host. To<br />

exploit this flaw, an attacker would need to send a malformed HTML email to a victim on<br />

the remote host and have them open it.<br />

Solution: Microsoft has released a set of patches for Outlook Express at<br />

http://www.microsoft.com/technet/security/bulletin/ms06-076.mspx<br />

CVE-2006-2386<br />

FileZilla Server < 0.9.22 Multiple Remote DoS<br />

<strong>PVS</strong> ID: 3861 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:23831<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS)<br />

attack.\n\nAccording to its version, the FileZilla Server Interface installed on the remote<br />

host is affected by several denial of service flaws that could be leveraged by an<br />

authenticated attacker to crash the server and deny service to legitimate users.<br />

Solution: Upgrade to version 0.9.22 or higher.<br />

CVE Not available<br />

JBoss JMX Console DeploymentFileRepository Directory Traversal File Manipulation<br />

<strong>PVS</strong> ID: 3862 FAMILY: CGI RISK: HIGH NESSUS ID:23843<br />

Description: The remote web server contains a Java service that is affected by a directory traversal flaw.<br />

The remote web server appears to be a version of JBoss that fails to sanitize user-supplied<br />

input to the BaseDir parameter used by the 'DeploymentFileRepository' service of JMX<br />

Console before using it to store or delete files. An unauthenticated attacker may be able to<br />

exploit this to alter files on the remote host subject to the privileges of the JBoss user.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-5750<br />

CA Antivirus Client Detection<br />

<strong>PVS</strong> ID: 3863 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a CA antivirus client.<br />

Solution: N/A<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 999


CVE Not available<br />

LogMeIn Listening Server Detection<br />

<strong>PVS</strong> ID: 3864 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: The remote client is actually a LogMeIn server awaiting remote connection.<br />

LogMeIn is an application that allows users to access their computers (work or<br />

home) from anywhere in the world via a web browser. LogMeIn works by installing<br />

an agent on the computer that is to be accessed remotely. The application then<br />

establishes a client connection to an Internet server and awaits the user to connect<br />

over the established HTTPS connection. As such, LogMeIn has the ability to bypass<br />

firewalls and proxies.<br />

Solution: Ensure that such usage is in alignment with corporate policies regarding remote access.<br />

CVE Not available<br />

Policy - .divx File Detection<br />

<strong>PVS</strong> ID: 3865 FAMILY: CGI RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server is hosting .divx files. These are movie files. As an example,<br />

consider the following file %P\nThe webmaster should make sure that these files are in<br />

compliance with corporate policies and guidelines.<br />

Solution: N/A<br />

CVE Not available<br />

SeaMonkey < 1.0.7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3866 FAMILY: Web Clients RISK: HIGH NESSUS ID:23928<br />

Description: Synopsis :\n\nA web browser on the remote host is prone to multiple flaws.\n\nThe<br />

installed version of SeaMonkey contains various security issues, some of which may lead<br />

to execution of arbitrary code on the affected host subject to the user's privileges.<br />

Solution: Upgrade to version 1.0.7 or higher.<br />

CVE-2006-6505<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Thunderbird < 1.5.0.9 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3867 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:23929<br />

Description: Synopsis :\n\nThe remote Windows host contains a mail client that is affected by multiple<br />

vulnerabilities.\n\nThe remote version of Mozilla Thunderbird suffers from various security<br />

issues, at least one of which may lead to execution of arbitrary code on the affected host<br />

subject to the user's privileges.<br />

Family Internet Services 1000


Solution: Upgrade to version 1.5.0.9 or higher.<br />

CVE-2006-6505<br />

Firefox < 1.5.0.9 / 2.0.0.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3868 FAMILY: Web Clients RISK: HIGH NESSUS ID:23930<br />

Description: Synopsis :\n\nThe remote Windows host contains a web browser that is affected by<br />

multiple vulnerabilities.\n\nThe installed version of Firefox is affected by various security<br />

issues, some of which may lead to execution of arbitrary code on the affected host subject<br />

to the user's privileges.<br />

Solution: Upgrade to version 1.5.0.9 / 2.0.0.1 or higher.<br />

CVE-2006-6507<br />

vBulletin < 3.6.5 .swf ActionScript XSS<br />

<strong>PVS</strong> ID: 3869 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection attack.\n\nThe version of<br />

vBulletin installed on the remote host fails to properly sanitize user-supplied input. Given<br />

this, the application is prone to a file upload flaw. An attacker exploiting this flaw would<br />

create a post that includes a malicious .swf file attachment. The malicious .swf file would<br />

be uploaded to the target server. Users viewing the post and executing the .swf file would<br />

be vulnerable to a loss of confidential data.<br />

Solution: Upgrade to version 3.6.5 or higher.<br />

CVE-2006-6779<br />

Detection of .xls File Email Attachment<br />

<strong>PVS</strong> ID: 3870 FAMILY: Data Leakage RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host was just observed sending the following .xls file. %L\nThe file was<br />

observed as an email attachment. If the file is confidential, you should check your<br />

mail server logs for the sender and/or recipient.<br />

Solution: N/A<br />

CVE Not available<br />

Detection of .zip File Email Attachment<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3871 FAMILY: Data Leakage RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 1001


Description: The remote host was just observed sending the following .zip file. %L\nThe file was<br />

sent as an email attachment. If the file is considered confidential, you should consult<br />

your mail server logs for the sender and/or recipient.<br />

Solution: N/A<br />

CVE Not available<br />

Ultimate PHP Board chat/login.php username Parameter Script Injection<br />

<strong>PVS</strong> ID: 3872 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection attack.\n\nThe<br />

remote host is running Ultimate PHP Board, a message board written in PHP.<br />

Versions of Ultimate less than 2.0b2 are vulnerable to a flaw where remote<br />

attackers can inject and execute script code. Code would be executed with the<br />

privileges of the web server process. The root flaw is in the 'username' parameter of<br />

the 'chat/login.php' script. After uploading the code, the attacker can execute via the<br />

'chat/text.php' script. Successful exploitation results in the attacker impacting<br />

confidentiality, integrity, and availability.<br />

Solution: No solution is known at this time.<br />

CVE-2006-6790<br />

WordPress < 2.0.6 template.php file Parameter HTML Injection<br />

<strong>PVS</strong> ID: 3873 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running WordPress, a web blog manager written in PHP. The remote version of this<br />

software is reported to be vulnerable to a flaw where a remote attacker can inject malicious<br />

script code into the 'file' parameter of the 'template.php' script. Successful exploitation<br />

would result in script code being executed in the browsers of other WordPress clients. In<br />

addition, the application is reported to be vulnerable to a SQL injection attack. An attacker<br />

exploiting this attack vector would only need to send malformed requests to the WordPress<br />

application. Successful exploitation would result in the attacker executing arbitrary SQL<br />

statements on the database server utilized by WordPress. The path to the vulnerable<br />

WordPress application is:\n%P<br />

Solution: Upgrade to version 2.0.6 or higher.<br />

CVE-2007-0107<br />

phpBB < 2.0.22 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3874 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1002


Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack<br />

vectors.\n\nAccording to its banner, the remote host is running a version of<br />

phpBB that fails to sanitize user-supplied input. The details of several of these<br />

flaws is unknown; however, it is known that one of the vulnerabilities is an<br />

HTML injection flaw. This can enable an attacker to cause arbitrary HTML and<br />

script code to be executed in a user's browser within the context of the affected<br />

site.<br />

Solution: Upgrade to version 2.0.22 or higher.<br />

CVE-2006-6841<br />

Teredo IPv6 Client Detection<br />

<strong>PVS</strong> ID: 3875 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote client is a Teredo client. Teredo allows clients to tunnel<br />

IPv6 traffic over IPv4. The protocol operates over UDP port 3544 and the RFC draft is<br />

sponsored by Microsoft. Teredo client puts the IPv6 data inside of an IPv4 packet and<br />

sends it to a gateway machine. The gateway machine then strips away the IPv4 header and<br />

delivers the IPv6 packet. Given this, Teredo can be used to circumvent firewall rules.<br />

Solution: Ensure that this sort of functionality is authorized with respect to existing policies and<br />

guidelines.<br />

Teredo Server Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 3876 FAMILY: Generic RISK: INFO NESSUS ID:23972<br />

Description: Synopsis :\n\nA Teredo server is listening on the remote host.\n\nThe remote host is<br />

running a Teredo server. Teredo is a protocol for tunneling IPv6 over UDP and is used to<br />

enable nodes to obtain IPv6 connectivity even when they are located behind IPv4 NAT<br />

devices that have no support for IPv6. A Teredo server is a node that is connected to both<br />

IPv4 and IPv6 internets and supports a Teredo tunneling interface over which packets are<br />

received.<br />

Solution: Limit incoming traffic to this port if desired.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Wireless Access Point (WAP) Web Server Detection<br />

<strong>PVS</strong> ID: 3877 FAMILY: Web Servers RISK: INFO NESSUS ID:11026<br />

Family Internet Services 1003


Description: Synopsis :\n\nThe remote host is running a wireless access point (WAP) that should be<br />

authorized with respect to corporate policy.\n\nThe remote host is a wireless access point.<br />

Solution: Ensure that the proper physical and logical controls exist around the WAP.<br />

CVE Not available<br />

Opera < 9.10 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3878 FAMILY: Web Clients RISK: HIGH NESSUS ID:23977<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

Opera installed on the remote host reportedly contains a heap overflow vulnerability that<br />

can be triggered when processing the DHT marker in a specially-crafted JPEG image to<br />

crash the browser or possibly allow execution of arbitrary code on the affected host. In<br />

addition, another flaw in Opera's createSVGTransformFromMatrix object typecasting may<br />

lead to a browser crash or arbitrary code execution if support for Javascript is enabled.<br />

Solution: Upgrade to version 9.10 or higher.<br />

CVE-2006-4819<br />

OmniWeb Browser < 5.5.2 Javascript alert Function Format String<br />

<strong>PVS</strong> ID: 3879 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a 'format string' flaw.\n\nThe remote host is<br />

using Omniweb, an alternative web browser for the Mac OS platform. This version of<br />

OmniWeb is vulnerable to a format-string flaw. Specifically, the Javascript 'alert' function<br />

fails to correctly parse specially formatted strings. An attacker exploiting this flaw would<br />

need the ability to pass malformed strings to the browser. This typically involves being able<br />

to entice a user into browsing to a malicious site. Successful exploitation would result in<br />

the attacker executing arbitrary code within the browser.<br />

Solution: Upgrade to version 5.5.2 or higher.<br />

CVE-2007-0148<br />

phpMyFAQ < 1.6.8 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3880 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running phpMyFAQ, a web-based<br />

Frequently-Asked-Questions (FAQ) application. This version of phpMyFAQ is vulnerable<br />

to a remote SQL injection attack. An attacker exploiting this flaw would send a specially<br />

crafted HTTP request to the application. Upon parsing the request, the server would be<br />

manipulated into running commands embedded within the request. A successful attack<br />

would give the attacker the ability to view data, modify data and potentially execute<br />

systems commands with the permission of the web server. In addition, the host is<br />

Family Internet Services 1004


vulnerable to a flaw where users can bypass authentication and gain administrative access<br />

to the application. Successful exploitation would lead to the compromise of confidentiality,<br />

integrity, and availability on the remote machine.<br />

Solution: Upgrade to version 1.6.8 or higher.<br />

WordPress <<br />

CVE-2006-6913<br />

<strong>PVS</strong> ID: 3881 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running WordPress, a web blog manager written in PHP. The remote version of this<br />

software is reported to be vulnerable to a flaw where a remote attacker can inject malicious<br />

SQL statements into the 'tb_id' parameter of the 'wp-trackback.php' script. An attacker<br />

exploiting this flaw would only need to be able to send queries to the remote web server.<br />

Successful exploitation would result in the attacker executing arbitrary SQL statements on<br />

the database server utilized by WordPress. The path to the vulnerable application is:\n%P<br />

Solution: No solution is known at this time.<br />

CVE-2007-0233<br />

PHPMyAdmin < 2.9.2 rc2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3882 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running phpMyAdmin, a web interface for administering MySQL database servers. This<br />

version of phpMyAdmin is vulnerable to an HTML injection attack as well as several<br />

undisclosed vulnerabilities. The details of the flaws will be released by the vendor;<br />

however, they have released a patched version of phpMyAdmin.<br />

Solution: Upgrade to version 2.9.2 rc2 or higher.<br />

CVE-2007-0204<br />

Socks 4 Proxy Detection<br />

<strong>PVS</strong> ID: 3883 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is acting as a Socks version 4 proxy. This allows remote proxy clients to<br />

tunnel traffic through the host. This sort of behavior is somewhat commonplace on<br />

compromised hosts.<br />

Solution: Ensure that the proxy is authorized with respect to corporate policies and guidelines.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1005


Socks 5 Proxy Detection<br />

<strong>PVS</strong> ID: 3884 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is acting as a Socks version 5 proxy. This allows remote proxy clients to<br />

tunnel traffic through the host. This sort of behavior is somewhat commonplace on<br />

compromised hosts.<br />

Solution: Ensure that the proxy is authorized with respect to corporate policies and guidelines.<br />

CVE Not available<br />

Microsoft Remoting Client Detection<br />

<strong>PVS</strong> ID: 3885 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a 'remoting' client. .NET Remoting is an API developed by Microsoft<br />

and used for interprocess communications that take place over a channel.<br />

Solution: N/A<br />

CVE Not available<br />

Microsoft Remoting Client Detection<br />

<strong>PVS</strong> ID: 3886 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a 'remoting' server. .NET Remoting is an API developed by Microsoft<br />

and used for interprocess communications that take place over a channel.<br />

Solution: N/A<br />

CVE Not available<br />

Squid < 2.6 STABLE7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3887 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote<br />

Squid caching proxy, according to its version number, is vulnerable to multiple attack<br />

vectors. At the least, attackers would be able to crash the service.<br />

Solution: Upgrade to version 2.6 STABLE7 or higher.<br />

CVE-2007-0248<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Burning Board search.php boardids Parameter SQL Injection<br />

<strong>PVS</strong> ID: 3888 FAMILY: CGI RISK: HIGH NESSUS ID:24223<br />

Family Internet Services 1006


Description: Synopsis :\n\nThe remote web server contains a PHP script that is prone to a SQL injection<br />

attack.\n\nThe version of Burning Board / Burning Board Lite on the remote host fails to<br />

sanitize user input to the 'boardids' parameter of the 'search.php' script before using it in<br />

database queries. Regardless of PHP's 'register_globals' and 'magic_quotes_gpc' settings, an<br />

unauthenticated remote attacker can leverage this issue to launch SQL injection attacks<br />

against the affected application, including discovery of password hashes of users of the<br />

application.<br />

Solution: No solution is known at this time.<br />

BitDefender Detection<br />

CVE-2007-1518<br />

<strong>PVS</strong> ID: 3889 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has an antivirus software package installed on it.\n\nThe<br />

remote host is running BitDefender, a commercial antivirus software package for Windows.<br />

Solution: N/A<br />

CVE Not available<br />

WordPress < 2.1 Pingback Information Disclosure<br />

<strong>PVS</strong> ID: 3890 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:24237<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

WordPress installed on the remote host fails to sanitize the 'sourceURI' before passing it to<br />

the 'wp_remote_fopen()' function when processing pingbacks. An unauthenticated remote<br />

attacker can leverage this issue to determine the existence of local files and possibly even to<br />

view parts of those files, subject to the permissions of the web server user ID. In addition,<br />

the version is also reportedly susceptible to a denial of service attack because it allows an<br />

anonymous attacker to cause a server to fetch arbitrary URLs without limits. The path to<br />

the WordPress application is:\n%P<br />

Solution: Upgrade to version 2.1 or higher.<br />

CVE Not available<br />

Symantec Antivirus Version Number Detection<br />

<strong>PVS</strong> ID: 3891 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running Symantec Antivirus.<br />

Solution: Ensure that you are running the latest version of Symantec Antivirus.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1007


Trend Micro InterScan VirusWall Version Detection<br />

<strong>PVS</strong> ID: 3892 FAMILY: SMTP Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Trend Micro InterScan VirusWall version %L<br />

Solution: Ensure that you are running the most recent version of VirusWall.<br />

CVE Not available<br />

PGP Desktop < 9.5.1 PGPserv Arbitrary Code Execution<br />

<strong>PVS</strong> ID: 3893 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:24246<br />

Description: Synopsis :\n\nThe remote Windows host has an application that is affected by a privilege<br />

escalation issue.\n\nThe version of PGP Desktop installed on the remote host reportedly<br />

can allow an authenticated remote user to execute arbitrary code on the affected host with<br />

LOCAL SYSTEM privileges. The issue arises because the software operates a service<br />

named 'PGPServ' or 'PGPsdkServ' that exposes a named pipe that fails to validate the object<br />

data passed to it.<br />

Solution: Upgrade to version 9.5.1 or higher.<br />

CVE-2007-0603<br />

Movable Type' Blog < 3.34 XSS<br />

<strong>PVS</strong> ID: 3894 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running Movable Type, a blogging software for Unix and Windows<br />

platforms. This version of Movable Type is vulnerable to a persistent Cross-Site Scripting<br />

(XSS) flaw. An attacker exploiting this flaw would post malicious code into the blog.<br />

Successful exploitation would allow an attacker to execute malicious code within a user's<br />

browser or disclose confidential data.<br />

Solution: Upgrade to version 3.34 or higher.<br />

CVE Not available<br />

Stompy (the session stomper) Vulnerability Scanner Detection<br />

<strong>PVS</strong> ID: 3895 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is scanning with the Stompy HTTP session scanner. This tool scans web<br />

servers and detects applications that use predictable 'Session Identifier' algorithms.<br />

Solution: Ensure that such scanning is in alignment with corporate policies and guidelines.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1008


CVSTrac < 2.0.1 Text Output Formatter DoS<br />

<strong>PVS</strong> ID: 3896 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:24263<br />

Description: Synopsis :\n\nThe remote web server contains a CGI script or is itself subject to a denial of<br />

service attack.\n\nAccording to its version number, the version of CVSTrac installed on the<br />

remote host contains a flaw related to its Wiki-style text output formatter that may allow an<br />

attacker to cause a partial denial of service, depending on the pages requested.<br />

Solution: Upgrade to version 2.0.1 or higher.<br />

CVE-2007-0347<br />

WebGUI < 7.3.8 www_purgeList Method Asset Deletion<br />

<strong>PVS</strong> ID: 3897 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running WebGUI, a content management framework.<br />

The remote version of this software is vulnerable to a flaw where an attacker can bypass<br />

security restrictions and gain administrative access to the application. Specifically, the<br />

'www_purgeList()' function fails to validate user credentials and would allow an<br />

unauthenticated user to delete application assets.<br />

Solution: Upgrade to version 7.3.8 or higher.<br />

CVE-2007-0629<br />

Phorum < 5.1.19 register.php XSS<br />

<strong>PVS</strong> ID: 3898 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote version of Phorum contains a script called 'register.php' that is vulnerable to a<br />

cross-site scripting attack via the 'username' parameter. An attacker may exploit this<br />

problem to steal the authentication credentials of third party users.<br />

Solution: Upgrade to version 5.1.19 or higher.<br />

CVE-2007-0769<br />

Policy - Nintendo Wii Detection<br />

<strong>PVS</strong> ID: 3899 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is a Nintendo Wii gaming station.<br />

Solution: Ensure that the device is authorized.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1009


Geeklog <<br />

CVE Not available<br />

<strong>PVS</strong> ID: 3900 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a 'file upload' flaw.\n\nThe remote host is<br />

running Geeklog, an open-source weblog powered by PHP and MySQL. The version of<br />

Geeklog installed on the remote host includes a flaw in the way that it parses user-supplied<br />

data. Specifically, the 'glConf' parameter of the 'BaseView.php' script can be used by a<br />

remote attacker to upload and execute arbitrary script code. An attacker exploiting this flaw<br />

would be able to execute code with the permissions of the web server process.<br />

Solution: Upgrade to a version higher than 2.0.<br />

CVE-2007-0810<br />

PostgreSQL Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3901 FAMILY: Database RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running PostgreSQL, an open source relational database. This version is vulnerable to<br />

multiple flaws where an attacker with a valid user account can cause the service to stop or<br />

potentially disclose confidential information. Successful exploitation would result in the<br />

system being unavailable to legitimate users or the leakage of confidential data.<br />

Solution: Upgrade to version 7.3.16, 7.4.16, 8.0.11, 8.1.7, 8.2.2 or higher.<br />

CVE-2007-0556<br />

WinProxy < 6.1 R1c HTTP CONNECT Request Overflow<br />

<strong>PVS</strong> ID: 3902 FAMILY: FTP Servers RISK: HIGH NESSUS ID:24277<br />

Description: Synopsis :\n\nThe remote HTTP proxy is affected by a buffer overflow<br />

vulnerability.\n\nThe remote host is running WinProxy, a proxy server for Windows. The<br />

version of WinProxy installed on the remote host reportedly contains a design issue that<br />

may result in a buffer overflow vulnerability. Using a specially-crafted HTTP CONNECT<br />

request, a remote attacker may be able to leverage this issue to execute arbitrary code on<br />

the affected host subject to the privileges under which the service runs.<br />

Solution: Upgrade to version 6.1 R1c or higher.<br />

Firefox <<br />

CVE-2007-0796<br />

<strong>PVS</strong> ID: 3903 FAMILY: Web Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 1010


Description: Synopsis :\n\nThe remote browser may allow an attacker to read confidential<br />

data.\n\nThe installed version of Firefox is reported to be vulnerable to a number of<br />

flaws. The details of the flaws are not currently known; however, it is alleged that an<br />

attacker can bypass security mechanisms in order to obtain local file contents. In<br />

order for this attack to be a success, the attacker would need to be able to convince a<br />

user to browsea malicious URI and expect that the user would allow a popup<br />

window.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2007-0801<br />

Jetty Non-random Session ID Vulnerability<br />

<strong>PVS</strong> ID: 3904 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nThe remote host is running Jetty, a Java web server that can be downloaded<br />

from the Internet and is currently bundled with some IBM applications. This version of<br />

Jetty is vulnerable to a remote flaw within its random number generation. Jetty uses a<br />

predictable algorithm to generate session IDs. Given this, an attacker can gather and<br />

impersonate other accounts with generated session IDs. An attacker exploiting this flaw<br />

would only need to be able to access the Jetty application that utilized Session IDs.<br />

Solution: Upgrade to version 4.2.27, 5.1.12, 6.0.2, 6.1.0-pre3 or higher.<br />

CVE-2006-6969<br />

Samba < 3.0.24 nss_winbind.so.1 Multiple Function Overflow<br />

<strong>PVS</strong> ID: 3905 FAMILY: Samba<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote Samba<br />

server, according to its version number ('%L'), may be vulnerable to multiple remote buffer<br />

overflows. The flaw appears to be in the way that Samba handles very long responses to<br />

'gethostbyname' and 'getipnodebyname' name resolution. An attacker exploiting this flaw<br />

would only need to be able to send a very long name to the vulnerable application.<br />

Successful exploitation would result in the attacker executing arbitrary code on the Samba<br />

server.<br />

Solution: Upgrade to version 3.0.24 or higher.<br />

CVE-2007-0453<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

AXIGEN Mail Server IMAP Server Multiple Authentication Methods DoS<br />

<strong>PVS</strong> ID: 3906 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:24321<br />

Family Internet Services 1011


Description: Synopsis :\n\nThe remote IMAP server is prone to multiple vulnerabilities.\n\nThe remote<br />

host is running AXIGEN Mail Server, a messaging system for Linux and BSD. The IMAP<br />

server component of AXIGEN Mail Server is affected by two denial of service issues<br />

involving PLAIN and CRAM-MD5 authentication methods. An unauthenticated remote<br />

attacker can leverage these issues to crash the IMAP service and possibly even execute<br />

arbitrary code remotely.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

TiVo Detection<br />

CVE-2007-0887<br />

<strong>PVS</strong> ID: 3907 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is a TiVO device.\n\nThe remote host is a TiVo, a television<br />

recorder. The version, as advertised by port banner, is:\n\n%L<br />

Solution: Ensure that the use of such devices is authorized by corporate policy.<br />

TiVo Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 3908 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is a TiVO device.\n\nThe remote host is a TiVo, a television<br />

recorder. The version, as advertised by port banner, is:\n\n%L<br />

Solution: Ensure that the use of such devices is authorized by corporate policy.<br />

CVE Not available<br />

Sensepost Wikto Detection<br />

<strong>PVS</strong> ID: 3909 FAMILY: Policy<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote server is running the Wikto scanner. Wikto is a tool for<br />

scanning and testing the security of web sites.<br />

Solution: Ensure that this application is authorized with respect to corporate policies and guidelines.<br />

CVE Not available<br />

Firefox < 0.0.9 'Plain Old Webserver' (POW) Directory Traversal Arbitrary File Access<br />

<strong>PVS</strong> ID: 3910 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 1012


Description: Synopsis :\n\nThe remote host is vulnerable to a directory traversal flaw.\n\nThe remote<br />

host is running Plain Old Webserver (POW), a Firefox plugin that allows the user to run a<br />

web server via a browser plugin. This version of POW is vulnerable to a directory traversal<br />

flaw. An attacker exploiting this flaw would send a malformed request that contained '../'<br />

strings. Such a request would allow the attacker to obtain confidential files from outside the<br />

web root directory. Successful exploitation would lead to the loss of confidential data.<br />

Solution: Upgrade to version 0.0.9 or higher.<br />

CVE-2007-0872<br />

Mercury LoadRunner Detection<br />

<strong>PVS</strong> ID: 3911 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Mercury's LoadRunner. This tool is used to manage and test<br />

network applications. In the past, LoadRunner has been vulnerable to remote attacks. The<br />

following information was culled from the Agent:\n\n%L<br />

Solution: Ensure that you are running the latest version of LoadRunner and consider using ACLs to<br />

ensure that untrusted hosts cannot connect to the LoadRunner application.<br />

CVE Not available<br />

Cisco VPN Server Detection (PPTP)<br />

<strong>PVS</strong> ID: 3912 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Cisco server is acting as a PPTP VPN server.<br />

Solution: N/A<br />

CVE Not available<br />

Cisco VPN Concentrator Administrative Interface Detection<br />

<strong>PVS</strong> ID: 3913 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nThe remote Cisco server is acting as a PPTP VPN server. Further, the server<br />

has enabled web administration over unencrypted HTTP. The VPN Concentrator handles<br />

user accounts and other confidential data. An attacker with the ability to sniff the network<br />

would be able to gather confidential data that would be useful in future attacks. The<br />

reported machine name is:\n\n%L<br />

Solution: Use Access Control Lists (ACLs) to block access from untrusted machines. In addition,<br />

force the communication over an SSL connection.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1013


SQLiX SQL Injection Tool Detection<br />

<strong>PVS</strong> ID: 3914 FAMILY: Policy<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote host is running SQLix. SQLix is a tool that automates the<br />

detection and exploitation of web applications that are vulnerable to SQL injection attacks.<br />

Solution: Ensure that this application is authorized by corporate policies and guidelines.<br />

CVE Not available<br />

Microsoft FrontPage Version Detection<br />

<strong>PVS</strong> ID: 3915 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server appears to be running with FrontPage extensions. Double-check the<br />

configuration since many problems have been found with FrontPage when the<br />

configuration has not been secured. The reported version of FrontPage is: \n %L<br />

Solution: If it is not required, disable FrontPage access. Otherwise, disable anonymous access to the<br />

resource.<br />

CVE Not available<br />

LifeType < 1.1.6 rss.php profile Parameter Traversal Arbitrary File Access<br />

<strong>PVS</strong> ID: 3916 FAMILY: Web Servers RISK: NONE NESSUS ID:24356<br />

Description: Synopsis :\n\nThe remote host may allow remote disclosure of confidential files.\n\nThe<br />

remote host is running LifeType, an open-source blogging platform. The version of<br />

LifeType installed on the remote fails to sanitize input to the 'profile' parameter of the<br />

'rss.php' script of directory traversal sequences. An unauthenticated remote attacker can<br />

leverage this flaw to read files on the affected host and disclose sensitive information, such<br />

as configuration parameters used by the application.<br />

Solution: Upgrade to version 1.1.6, 1.2-beta2 or higher.<br />

CVE-2007-0979<br />

ClamAV < 0.90.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3917 FAMILY: Web Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe<br />

remote host is running the ClamAV antivirus client version %L\n\nThis version of<br />

ClamAV is vulnerable to a flaw where a CAB file with a reported length of zero<br />

can cause ClamAV to crash. In addition, the ClamAV application is vulnerable to a<br />

directory traversal flaw. An attacker, by specifying a file name which has '../' or '..\'<br />

Family Internet Services 1014


strings, can overwrite critical system files. In both instances, the attacker only<br />

needs to be able to send files that are processed by ClamAV.<br />

Solution: Upgrade to version 0.90.0 or higher.<br />

CVE-2007-0898<br />

SpamAssassin < 3.1.8 Malformed HTML Long URI DoS<br />

<strong>PVS</strong> ID: 3918 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running SpamAssassin, an anti-spam software application that detects and<br />

blocks spam emails. Due to a content-parsing error, SpamAssassin can be crashed when<br />

processing very long URIs within an email message. An attacker exploiting this flaw would<br />

only need to have the ability to craft and send an email. Successful exploitation leads to a<br />

loss of availability.<br />

Solution: Upgrade to version 3.1.8 or higher.<br />

CVE-2007-0451<br />

Catbird Appliance Detection<br />

<strong>PVS</strong> ID: 3919 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Catbird security appliance.<br />

Solution: N/A<br />

CVE Not available<br />

BitTorrent Client Detection<br />

<strong>PVS</strong> ID: 3920 FAMILY: Peer-To-Peer File Sharing<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote host is running the Bittorrent client.\nBitTorrent is a client<br />

application that allows users to quickly download files from multiple locations.<br />

Solution: Ensure that BitTorrent is allowed with respect to corporate policies and guidelines.<br />

CVE Not available<br />

IBM DB2 Multiple Local Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3921 FAMILY: Database RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1015


Description: Synopsis :\n\nThe remote host is vulnerable to multiple local flaws.\n\nThe remote<br />

host is running IBM DB2 database version %L.\nThis version is reported to be<br />

vulnerable to a number of local flaws. The most serious of these flaws involves a<br />

local buffer overflow. An attacker exploiting these flaws would need local access to<br />

the DB2 server. Successful exploitation would result in the attacker executing<br />

arbitrary code.<br />

Solution: IBM has released Fixpak 2 for version 9.1 installs. Upgrade or patch older installations<br />

according to vendor recommendations.<br />

CVE-2007-1228<br />

Firefox < 1.5.0.10 / 2.0.0.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3922 FAMILY: Web Clients RISK: HIGH NESSUS ID:24701<br />

Description: Synopsis :\n\nThe remote Windows host contains a web browser that is affected by<br />

multiple vulnerabilities.\n\nThe installed version of Firefox is affected by various security<br />

issues, some of which may lead to execution of arbitrary code on the affected host subject<br />

to the user's privileges.<br />

Solution: Upgrade to version 1.5.0.10, 2.0.0.2 or higher.<br />

CVE-2007-0996<br />

WebAPP < 0.9.9.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3923 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running WebAPP, an open-source web portal application written in Perl. There is a flaw<br />

in the remote version of this software that may allow an attacker to gain remote control of<br />

the application. The exact nature of the flaws is currently unknown. However, given the<br />

vendor's statement regarding the patches, the flaws are thought to be of a serious nature.<br />

Solution: Upgrade to version 0.9.9.6 or higher.<br />

CVE Not available<br />

Google Desktop Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3924 FAMILY: Web Clients RISK: INFO NESSUS ID:24709<br />

Description: Synopsis :\n\nThe remote host has Google Desktop installed.\n\nGoogle Desktop, a search<br />

application for Windows that allows users to easily search for files on the computer, is<br />

installed on the remote host. If the 'Advanced Features' or 'Search Across Computers'<br />

options of Google Desktop are enabled, some data may be sent to Google's servers,<br />

potentially breaching confidentiality and your corporate security policy.<br />

Solution: Ensure that installing Google Desktop is authorized by your corporate policy.<br />

Family Internet Services 1016


CVE Not available<br />

SQLiteManager include/config.inc.php SQLiteManager_currentTheme Cookie Local File Inclusion<br />

<strong>PVS</strong> ID: 3925 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:24726<br />

Description: Synopsis :\n\nThe remote web server contains a PHP script that is susceptible to a local file<br />

inclusion attack. \n\nThe remote host is running SQLiteManager, a web-based application<br />

for managing SQLite databases. The version of SQLiteManager installed on the remote<br />

host fails to sanitize user input to the 'SQLiteManager_currentTheme' cookie before using it<br />

to include PHP code in 'include/config.inc.php'. An unauthenticated remote attacker may be<br />

able to exploit this issue to view arbitrary files or to execute arbitrary PHP code on the<br />

remote host, subject to the privileges of the web server user ID.<br />

Solution: No solution is known at this time.<br />

CVE-2007-1232<br />

Xbox Console Detection<br />

<strong>PVS</strong> ID: 3926 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: <strong>PVS</strong> detected an Xbox gaming console on the local network. The version of software<br />

is: \n %L<br />

Solution: Ensure that such systems are authorized with respect to corporate policies.<br />

CVE Not available<br />

SeaMonkey < 1.0.8 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3927 FAMILY: Web Clients RISK: HIGH NESSUS ID:24735<br />

Description: Synopsis :\n\nA web browser on the remote host is prone to multiple flaws.\n\nThe<br />

installed version of SeaMonkey contains various security issues, some of which may lead<br />

to execution of arbitrary code on the affected host subject to the user's privileges.<br />

Solution: Upgrade to version 1.0.8 or higher.<br />

CVE-2007-0994<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

OrangeHRM < 2.1 alpha 5 login.php txtUserName Parameter SQL Injection<br />

<strong>PVS</strong> ID: 3928 FAMILY: Web Servers RISK: HIGH NESSUS ID:24743<br />

Description: Synopsis :\n\nThe remote web server contains a PHP script that is affected by a SQL<br />

injection vulnerability.\n\n The remote host is running OrangeHRM, a human resource<br />

management system written in PHP. The version of OrangeHRM installed on the remote<br />

host fails to sanitize input to the 'txtUserName' parameter of the 'login.php' script before<br />

Family Internet Services 1017


using it in a database query. An unauthenticated remote attacker may be able to leverage<br />

this flaw to manipulate SQL queries and bypass authentication, uncover sensitive<br />

information, modify data, or launch attacks against the underlying database.\n\n Note that<br />

successful exploitation of this issue requires that PHP's 'magic_quotes_gpc' be disabled.<br />

Solution: Upgrade to version 2.1 alpha 5 or higher.<br />

CVE-2007-1193<br />

Dropbear < 0.49 Hostkey Host Spoofing Vulnerability<br />

<strong>PVS</strong> ID: 3929 FAMILY: SSH RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that would allow remote attackers to<br />

spoof trusted hosts.\n\nThe remote host is running Dropbear, a small, open-source SSH<br />

server. The version of Dropbear installed on the remote host by default has a flaw where<br />

the application fails to warn if the hostkey file has changed. An attacker exploiting this flaw<br />

would be able to execute a man-in-the-middle attack against the Dropbear server.<br />

Solution: Upgrade to version 0.49 or higher.<br />

CVE-2007-1099<br />

Qualys Scanner Detection<br />

<strong>PVS</strong> ID: 3930 FAMILY: Policy RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote host is running the Qualys network scanner. The presence<br />

of this software indicates that a group is scanning the network for vulnerabilities.<br />

Solution: Ensure that this software is authorized for your network.<br />

CVE Not available<br />

Mozilla Thunderbird < 1.5.0.10 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3931 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:24748<br />

Description: Synopsis :\n\nThe remote Windows host contains a mail client that is affected by multiple<br />

vulnerabilities.\n\n The remote version of Mozilla Thunderbird suffers from various<br />

security issues, at least one of which may lead to execution of arbitrary code on the affected<br />

host subject to the user's privileges.<br />

Solution: Upgrade to version 1.5.0.10 or higher.<br />

CVE-2007-0777<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Apache TomCat mod_jk < 1.2.21 Worker Map Remote Overflow<br />

<strong>PVS</strong> ID: 3932 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1018


Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the Apache Tomcat web server with mod_jk. mod_jk is reported to be vulnerable<br />

to a remote buffer overflow. It is alleged that an attacker sending a URI of greater than<br />

4095 bytes can corrupt the application memory. Successful exploitation would result in the<br />

attacker executing arbitrary code on the remote web server.<br />

Solution: Upgrade to version 1.2.21 or higher.<br />

CVE-2007-0774<br />

WordPress < 2.1.2 Backdoor Vulnerability<br />

<strong>PVS</strong> ID: 3933 FAMILY: CGI RISK: HIGH NESSUS ID:24759<br />

Description: Synopsis :\n\nThe remote web server contains a PHP application that is affected by a<br />

remote command execution vulnerability.\n\nThe version of WordPress installed on the<br />

remote host may include a backdoor that allows an unauthenticated remote attacker to<br />

execute arbitrary code on the remote host, subject to the permissions of the web server user<br />

ID.<br />

Solution: Upgrade to WordPress version 2.1.2 or higher and overwrite all the old files, especially<br />

those in wp-includes.<br />

CVE-2007-1277<br />

Anomalous FTP Server Detection<br />

<strong>PVS</strong> ID: 3934 FAMILY: FTP Servers RISK: NONE NESSUS ID:Not Available<br />

Description: An FTP server is running on this port. The server is running on a non-standard port. The<br />

last observed user ID was\n%P<br />

Solution: N/A<br />

CVE Not available<br />

QuickTime < 7.1.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3935 FAMILY: Web Clients RISK: HIGH NESSUS ID:24761<br />

Description: Synopsis :\n\nThe remote Windows host contains an application that is prone to multiple<br />

attacks.\n\nAccording to its version, the installation of QuickTime on the remote Windows<br />

host is affected by multiple buffer overflows. An attacker may be able to leverage these<br />

issues to crash the affected application or to execute arbitrary code on the remote host by<br />

sending a specially-crafted file to a victim and having him open it using QuickTime.<br />

Solution: Upgrade to version 7.1.5 or higher.<br />

CVE-2007-0717<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1019


Ipswitch IMail Server < 2006.2 Multiple Overflows<br />

<strong>PVS</strong> ID: 3936 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:24782<br />

Description: Synopsis :\n\nThe remote mail server is affected by multiple buffer overflow<br />

vulnerabilities.\n\nThe remote host is running Ipswitch Collaboration Suite / IMail,<br />

commercial messaging and collaboration suites for Windows. According to its banner, the<br />

version of Ipswitch Collaboration Suite / IMail installed on the remote host has several<br />

unspecified buffer overflows in various service components as well as one in an ActiveX<br />

control. An attacker may be able to leverage these issues to crash the affected service or<br />

execute arbitrary code remotely by default with LOCAL SYSTEM privileges.<br />

Solution: Upgrade to version 2006.2 or higher.<br />

CVE Not available<br />

Ipswitch IMail Server < 2006.2 Multiple Overflows<br />

<strong>PVS</strong> ID: 3937 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:24782<br />

Description: Synopsis :\n\nThe remote mail server is affected by multiple buffer overflow<br />

vulnerabilities.\n\nThe remote host is running Ipswitch Collaboration Suite / IMail,<br />

commercial messaging and collaboration suites for Windows. According to its banner, the<br />

version of Ipswitch Collaboration Suite / IMail installed on the remote host has several<br />

unspecified buffer overflows in various service components as well as one in an ActiveX<br />

control. An attacker may be able to leverage these issues to crash the affected service or<br />

execute arbitrary code remotely by default with LOCAL SYSTEM privileges.<br />

Solution: Upgrade to version 2006.2 or higher.<br />

CVE Not available<br />

Ipswitch IMail Server < 2006.2 Multiple Overflows<br />

<strong>PVS</strong> ID: 3938 FAMILY: POP Server RISK: HIGH NESSUS ID:24782<br />

Description: Synopsis :\n\nThe remote mail server is affected by multiple buffer overflow<br />

vulnerabilities.\n\nThe remote host is running Ipswitch Collaboration Suite / IMail,<br />

commercial messaging and collaboration suites for Windows. According to its banner, the<br />

version of Ipswitch Collaboration Suite / IMail installed on the remote host has several<br />

unspecified buffer overflows in various service components as well as one in an ActiveX<br />

control. An attacker may be able to leverage these issues to crash the affected service or<br />

execute arbitrary code remotely by default with LOCAL SYSTEM privileges.<br />

Solution: Upgrade to version 2006.2 or higher.<br />

CVE Not available<br />

MySpaceIM Chat Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3939 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1020


Description: The remote host is running MySpaceIM, an application that allows MySpace users to chat<br />

with one another.<br />

Solution: Ensure that such chat clients are authorized according to corporate policies and guidelines.<br />

CVE Not available<br />

.pst File Email Attachment Detection<br />

<strong>PVS</strong> ID: 3940 FAMILY: Data Leakage RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host was just observed sending the following .pst file.%L\nThe file was<br />

observed as an email attachment. If the file is confidential, check your mail server logs to<br />

see who the sender and/or recipient was.<br />

Solution: N/A<br />

CVE Not available<br />

.pst Office File Detection<br />

<strong>PVS</strong> ID: 3941 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server is hosting .pst files. As an example, consider the following<br />

file %P\nThe webmaster should ensure that they do not contain confidential data.<br />

Solution: N/A<br />

CVE Not available<br />

LedgerSMB / SQL-Ledger Authentication Bypass<br />

<strong>PVS</strong> ID: 3942 FAMILY: Web Servers RISK: HIGH NESSUS ID:24748<br />

Description: Synopsis :\n\nThe remote web server contains a Perl application that is prone to an<br />

authentication bypass issue.\n\nThe remote host is running LedgerSMB or SQL-Ledger, a<br />

web-based double-entry accounting system. The version of LedgerSMB or SQL-Ledger on<br />

the remote host contains a design flaw that can be leveraged by a remote attacker to bypass<br />

authentication and can gain administrative access of the application.<br />

Solution: If using LedgerSMB, upgrade to 1.1.9 or higher. There is no known solution for<br />

SQL-Ledger at this time.<br />

CVE-2007-0777<br />

.ost File Email Attachment Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3943 FAMILY: Data Leakage RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 1021


Description: The remote host was just observed sending the following .ost file.%L\n.ost files are<br />

offline storage tables of personal information. The file was observed being sent as an<br />

email attachment. If the file is confidential, check your mail server logs to see who<br />

the sender and/or recipient was.<br />

Solution: N/A<br />

.ost Offie File Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 3944 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server is hosting .ost files. '.ost' files are offline storage tables used to store<br />

personal information. As an example, consider the following file %P\nThe webmaster<br />

should make sure that they do not contain confidential data.<br />

Solution: N/A<br />

CVE Not available<br />

.uni Email Attachment Detection<br />

<strong>PVS</strong> ID: 3945 FAMILY: Data Leakage RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host was just observed sending the following .uni file.%L\n.uni files are<br />

personal folder files for Outlook XP. The file was observed being sent as an email<br />

attachment. If the file is confidential, check your mail server logs to see who the sender<br />

and/or recipient was.<br />

Solution: N/A<br />

CVE Not available<br />

.uni Office Files Detection<br />

<strong>PVS</strong> ID: 3946 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server is hosting .uni files. '.uni' files are personal folder files for Outlook<br />

XP that can store Unicode data. As an example, consider the following file %P\nThe<br />

webmaster should make sure that they do not contain confidential data.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mac OS X < 10.4.9 Multiple Vulnerabilities (<strong>Security</strong> Update 2007-003)<br />

<strong>PVS</strong> ID: 3947 FAMILY: Operating System Detection RISK: HIGH NESSUS ID:24811<br />

Family Internet Services 1022


Description: Synopsis :\n\nThe remote host is missing a Mac OS X update that fixes a security<br />

issue.\n\nThe remote host is running a version of Mac OS X 10.4 that is older than version<br />

10.4.9 or a version of Mac OS X 10.3 that does not have <strong>Security</strong> Update 2007-003<br />

applied. This update contains several security fixes for the following programs :\n\n -<br />

ColorSync\n - CoreGraphics\n - Crash Reporter\n - CUPS\n - Disk Images\n - DS Plugins\n<br />

- Flash Player\n - GNU Tar\n - HFS\n - HID Family\n - ImageIO\n - Kernel\n - MySQL<br />

server\n - <strong>Network</strong>ing\n - OpenSSH\n - Printing\n - QuickDraw Manager\n - servermgrd\n<br />

- SMB File Server\n - Software Update\n - sudo \n - WebLog<br />

Solution: Upgrade to version 10.4.9 or higher.<br />

CVE-2006-4829<br />

GnuPG < 1.4.7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3948 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running GnuPG. The version of GnuPG is: \n %L \nThis version is vulnerable to a<br />

number of security and privacy flaws.<br />

Solution: Upgrade to version 1.4.7 or higher.<br />

CVE-2007-1263<br />

Apache Tomcat < 5.5.23 / 6.0.10 Directory Traversal Arbitrary File Access<br />

<strong>PVS</strong> ID: 3949 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a directory traversal flaw.\n\nThe remote<br />

host is running the Apache Tomcat server. This version of Tomcat is vulnerable to a<br />

directory traversal flaw. An attacker exploiting this flaw would only need to be able to send<br />

a malformed request to the server. Successful exploitation would result in the attacker<br />

being able to read arbitrary files with the permission of the web server process. This can<br />

lead to disclosure of source code or confidential data. The reported version of Tomcat is: \n<br />

%L<br />

Solution: Upgrade to version 5.5.23, 6.0.10 or higher.<br />

CVE-2007-0450<br />

Horde < 3.1.4 NLS.php new_lang Parameter XSS<br />

<strong>PVS</strong> ID: 3950 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:24817<br />

Family Internet Services 1023


Description: The remote web server contains a PHP application that is vulnerable to a cross-site<br />

scripting attack.\n\n The version of Horde installed on the remote host fails to sanitize input<br />

to the 'new_lang' parameter before using it in the 'framework/NLS/NLS.php' script to<br />

generate dynamic content. An unauthenticated remote attacker may be able to leverage this<br />

issue to inject arbitrary HTML or script code into a user's browser to be executed within the<br />

security context of the affected site.<br />

Solution: Upgrade to version 3.1.4 or higher.<br />

CVE-2007-1473<br />

Firefox < 1.5.0.11 / 2.0.0.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3951 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:24875<br />

Description: Synopsis :\n\nThe remote Windows host contains a web browser that can be manipulated<br />

remotely for network abuse.\n\nThe FTP client support in the installed version of Firefox<br />

has a flaw that could allow a remote attacker with control of an FTP server to perform a<br />

rudimentary port scan of the user's internal network.<br />

Solution: Upgrade to version 1.5.0.11, 2.0.0.3 or higher.<br />

CVE-2007-1562<br />

Squid < 2.6 STABLE12 TRACE Request DoS<br />

<strong>PVS</strong> ID: 3952 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:24873<br />

Description: Synopsis :\n\nThe remote proxy server is vulnerable to a denial of service<br />

vulnerability.\n\nA vulnerability in TRACE request processing has been reported in Squid<br />

that can be exploited by malicious people to cause a denial of service.<br />

Solution: Upgrade to version 2.6 STABLE12 or higher.<br />

CVE-2007-1560<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Helix Server < 11.1.3.1887 DESCRIBE Request LoadTestPassword Field Overflow<br />

<strong>PVS</strong> ID: 3953 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a heap overflow.\n\nThe remote host is<br />

running the Helix RealServer streaming media server. This version of Helix is vulnerable to<br />

a flaw in the way that it processes the 'LoadTestPassword' field of a 'DESCRIBE' request.<br />

An attacker exploiting this flaw would only need to be able to send malformed requests to<br />

the Helix Server. Successful exploitation would result in the attacker executing arbitrary<br />

code<br />

Solution: Upgrade to version 11.1.3.1887 or higher.<br />

Family Internet Services 1024


CVE-2006-6026<br />

IDA Pro Disassembler Software Detection<br />

<strong>PVS</strong> ID: 3954 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: The remote client is running the IDA Pro Disassembler Program. This program is used to<br />

analyze binary files. The reported user and version is\n%L<br />

Solution: Ensure that this software is authorized for your network and that the version of IDA Pro is<br />

properly licensed.<br />

CVE Not available<br />

IDA Pro Remote Debugger Server Authentication Bypass<br />

<strong>PVS</strong> ID: 3955 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the<br />

bypassing of authentication.\n\nThe remote host is running DataRescue IDA<br />

Pro, a commercial disassembler. This version of IDA Pro is vulnerable to a flaw<br />

in the way that it handles remote data passed to the processor_request()<br />

function, an authentication function. An attacker exploiting this flaw can bypass<br />

authentication and execute commands anonymously. Successful exploitation<br />

gives the attacker the ability to execute arbitrary commands on the remote<br />

system.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2007-1666<br />

SIPScan VOIP Vulnerability Scanner Detection<br />

<strong>PVS</strong> ID: 3956 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is scanning the network with the SIPScan VOIP vulnerability scanner.<br />

This tool scans networks and detects vulnerable VOIP SIP phones.<br />

Solution: Ensure that such scanning is in alignment with corporate policies and guidelines.<br />

CVE Not available<br />

SIPScan VOIP Vulnerability Scanner Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3957 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is scanning the network with the SIPScan VOIP vulnerability scanner.<br />

This tool scans networks and detects vulnerable VOIP SIP phones. The version of SIPScan<br />

is\n%L<br />

Family Internet Services 1025


Solution: Ensure that such scanning is in alignment with corporate policies and guidelines.<br />

CVE Not available<br />

Lotus Domino IMAP Server < 6.5.6 / 7.0.2 FP1 CRAM-MD5 Authentication Overflow<br />

<strong>PVS</strong> ID: 3958 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:24903<br />

Description: Synopsis : \n\nThe remote IMAP server is affected by a buffer overflow<br />

vulnerability.\n\nThe IMAP server component of IBM Lotus Domino Server installed on<br />

the remote host fails to check the length of the supplied username in its CRAM-MD5<br />

authentication mechanism before processing it. By supplying a username over 256 bytes,<br />

an unauthenticated remote attacker can leverage this issue to crash the affected service and<br />

possibly execute arbitrary code remotely. The reported version (via banner) of the affected<br />

application is: \n %L<br />

Solution: Upgrade to version 6.5.6, 7.0.2 FP1 or higher.<br />

CVE-2007-1675<br />

WordPress < 2.1.3 xmlrpc.php mt.setPostCategories Method SQL Injection<br />

<strong>PVS</strong> ID: 3959 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe version of<br />

WordPress installed on the remote host is vulnerable to a SQL injection attack. The<br />

reported version is: \n %L \n\nAn attacker exploiting this flaw would need to have the<br />

ability to authenticate to WordPress. Upon authentication, the attacker would send a<br />

malformed query that, when processed, would execute arbitrary SQL commands on the<br />

WordPress database. The path to the affected application is: \n%P<br />

Solution: Upgrade to version 2.1.3 or higher and overwrite all the old files, especially those in<br />

wp-includes.<br />

CVE-2007-1897<br />

F-Secure Product Detection<br />

<strong>PVS</strong> ID: 3960 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running F-Secure, a firewall and antivirus software package.<br />

Solution: N/A<br />

CVE Not available<br />

F-Secure Product Server Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3961 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1026


Description: The remote host is running an F-Secure Server. These servers are responsible for managing<br />

an Enterprise network of F-Secure clients. Such a server typically holds critical and<br />

confidential information. The reported server version number was: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

F-Secure Policy Manager fsmsh.dll Path Disclosure<br />

<strong>PVS</strong> ID: 3962 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:15931<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running F-Secure Policy Manager, a distributed<br />

administration software that allows a system administrator to control applications from a<br />

single web console. There is a flaw in the file '/fsms/fsmsh.dll' that discloses the physical<br />

path to this application. An attacker may use the knowledge gained through this problem to<br />

set up more elaborate attacks against the remote host.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-1223<br />

.pdf Document File Detection<br />

<strong>PVS</strong> ID: 3963 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server is hosting .pdf files. As an example, consider the following<br />

file %P\nThe webmaster should make sure that these files do not contain confidential<br />

data.<br />

Solution: N/A<br />

FTP Server Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 3964 FAMILY: FTP Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a FTP server.<br />

Solution: N/A<br />

CVE Not available<br />

Bakbone NetVault < 7.4.0 Unspecified Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3965 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1027


Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Bakbone NetVault, an enterprise backup/restore application. This version of<br />

NetVault is reported to be vulnerable to a remote buffer overflow. The details of the flaw<br />

are not currently known. It is believed that a successful attack would lead to arbitrary code<br />

being executed.<br />

Solution: Upgrade to version 7.4.0 or higher.<br />

CVE Not available<br />

ClamAV < 0.90.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3966 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the ClamAV antivirus client version %L\n\nThis version of ClamAV is vulnerable<br />

to multiple attack vectors. The more serious of the flaws is a buffer overflow. An attacker<br />

exploiting this flaw would need to be able to manipulate ClamAV to scan a malicious file<br />

(via email, web, etc.). Successful exploitation would result in the attacker executing<br />

arbitrary code on the remote ClamAV scanner.<br />

Solution: Upgrade to version 0.90.2 or higher.<br />

CVE-2007-1997<br />

XAMPP adodb.php mssql_connect Function Overflow<br />

<strong>PVS</strong> ID: 3967 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the XAMPP web server, a version of Apache which comes pre-bundled with Perl,<br />

MySQL, and PHP. This version of XAMPP is reported prone to a remote buffer overflow<br />

via the mssql_connect() function. An attacker exploiting this flaw would send a malformed<br />

argument to a script that passed the data to mssql_connect(). Successful exploitation would<br />

result in the attacker executing arbitrary code on the server.<br />

Solution: Upgrade to XAMPP greater than 1.6.0a.<br />

CVE-2007-2079<br />

ZoneAlarm Pro < 7.0.302.000 vsdatant Driver Local DoS<br />

<strong>PVS</strong> ID: 3968 FAMILY: Generic<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running ZoneAlarm, a firewall for Windows. The vendor has released<br />

version 7.0.302.000 of ZoneAlarm. This version corrects a flaw where a local user can<br />

disable the firewall.<br />

Family Internet Services 1028


Solution: Upgrade to version 7.0.302.000 or higher.<br />

CVE-2007-2467<br />

Lighttpd < 1.4.14 Multiple DoS<br />

<strong>PVS</strong> ID: 3969 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running Lighttpd, a small web server. This version of Lighttpd is vulnerable<br />

to multiple Denial of Service (DoS) flaws. An attacker exploiting these flaws would only<br />

need to be able to send data to the web server. Successful exploitation would result in the<br />

attacker crashing the web server.<br />

Solution: Upgrade to version 1.4.14 or higher.<br />

CVE-2007-1869<br />

ProFTPD < 1.3.0rc4 Multiple Modules Authentication Bypass<br />

<strong>PVS</strong> ID: 3970 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is using ProFTPD, a free FTP server for Unix and<br />

Linux. According to its banner, the version of ProFTPD installed on the remote host suffers<br />

from a flaw where a user can bypass access controls. An attacker exploiting this flaw would<br />

need the ability to authenticate to the server. Successful exploitation would result in the<br />

attacker elevating privileges or accessing confidential data. The observed banner was: \n<br />

%L<br />

Solution: Upgrade to version 1.3.0rc4 or higher.<br />

CVE-2007-2165<br />

GroupWise < 7.0.0 SP2 WebAccess GWINTER.exe Base64 Decoding Overflow<br />

<strong>PVS</strong> ID: 3971 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of GroupWise WebAccess from Novell that fails to sanitize HTTP<br />

authentication requests. An overly long request will generate an overflow on the remote<br />

WebAccess server. An attacker exploiting this flaw would only need to be able to connect<br />

to the service and send an HTTP basic authentication request. Successful exploitation<br />

would result in the attacker executing arbitrary code.<br />

Solution: Upgrade to version 7.0.0 SP2 or higher.<br />

CVE-2007-2171<br />

Tivoli Provisioning Manager Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1029


<strong>PVS</strong> ID: 3972 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the IBM 'Tivoli Provisioning Manager for OS Deployment'<br />

version %L<br />

Solution: Ensure that you are running the latest version of TPMfOSd.<br />

CVE Not available<br />

PostgreSQL SECURITY DEFINER Functions Local Privilege Escalation<br />

<strong>PVS</strong> ID: 3973 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a local 'privilege escalation' flaw.\n\nThe<br />

remote host is running PostgreSQL, an open source relational database. This version is<br />

vulnerable to a local 'privilege escalation' flaw. By accessing temporary objects, a local<br />

user can escalate privileges. Successful exploitation would allow the local user to gain<br />

access elevated access to PostgreSQL data.<br />

Solution: Upgrade to version 7.3.19, 7.4.17, 8.0.13, 8.1.9, 8.2.4 or higher.<br />

CVE-2007-2138<br />

Winamp < 5.34 Malformed 'PLS' File Handling DoS<br />

<strong>PVS</strong> ID: 3974 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running Winamp, a multimedia software application. This version of<br />

Winamp is vulnerable to a content-parsing flaw. Specifically, when handling malformed<br />

PLS files, Winamp can be crashed. An attacker exploiting this flaw would need to be able<br />

to convince a local user to open a malicious file with Winamp. Successful exploitation<br />

would result in the application crashing.<br />

Solution: Upgrade to version 5.34 or higher.<br />

CVE Not available<br />

QuickTime < 7.1.6 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3975 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple buffer overflows.\n\nAccording to<br />

its version, the installation of QuickTime on the remote Windows host is affected by a flaw<br />

in the way that it handles malformed Java byte code. An attacker exploiting this flaw would<br />

need to be able to convince a user to browse to a malicious site. Further, the browser must<br />

be Java-enabled and have a vulnerable version of QuickTime installed. Successful<br />

exploitation would result in the attacker executing arbitrary code on the client system. In<br />

addition, this version of QuickTime is vulnerable to an integer overflow and a heap<br />

Family Internet Services 1030


overflow. An attacker exploiting either of these flaws will be able to execute code on the<br />

remote machine.<br />

Solution: Upgrade to version 7.1.6 or higher.<br />

CVE-2007-2296<br />

Winamp < 5.34a MP4 File Handling Overflow<br />

<strong>PVS</strong> ID: 3976 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Winamp, a multimedia software application. This version of Winamp is vulnerable<br />

to a content-parsing flaw when handling malformed MP4 files. An attacker exploiting this<br />

flaw would need to be able to convince a local user to open a malicious MP4 file with<br />

Winamp. Successful exploitation would result in the attacker executing arbitrary code on<br />

the remote host.<br />

Solution: Upgrade to version 5.34a or higher.<br />

CVE-2007-2498<br />

Trillian < 3.1.5.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3977 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:25120<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is susceptible to multiple<br />

issues.\n\nThe version of Trillian installed on the remote host reportedly contains several<br />

buffer overflow issues involving its handling of UTF-8 characters. A remote attacker may<br />

be able to leverage these issues to execute arbitrary code as the current user.<br />

Solution: Upgrade to version 3.1.5.0 or higher.<br />

CVE-2007-2418<br />

ISC BIND query.c query_addsoa Function Unspecified Recursive Query DoS<br />

<strong>PVS</strong> ID: 3978 FAMILY: DNS Servers RISK: HIGH NESSUS ID:25121<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote BIND DNS server is vulnerable to a flaw in the way that it handles malformed<br />

recursive query requests. An attacker exploiting this flaw would need to have the ability to<br />

send malformed requests to the vulnerable DNS Server. Further, the remote server must be<br />

configured to handle recursive queries from the attacker. Successful exploitation would<br />

lead to the BIND server crashing.<br />

Solution: Either disable recursion or upgrade to version 9.4.1, 9.5.0a4 or higher.<br />

CVE-2007-2241<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1031


Tivoli Client Detection<br />

<strong>PVS</strong> ID: 3979 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Tivoli client. The reported version was: \n %L<br />

Solution: N/A<br />

Tivoli Server Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 3980 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Tivoli Server. The reported version was: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Mambo < 4.6.2 includes/pdf.php dofreePDF Function Authentication Bypass<br />

<strong>PVS</strong> ID: 3981 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the<br />

bypassing of authentication.\n\nThe remote host is running the Mambo Content<br />

Server, an application for generating dynamic content for web servers. The<br />

remote application is vulnerable to a flaw where remote attackers can gain<br />

access to the data hosted on the Mambo database. The root of the flaw stems<br />

from a lack of authentication and authorization by the 'pdf.php' application. In<br />

order to exploit this flaw, an attacker would only need to be able to send data to<br />

the 'pdf.php' application. Successful exploitation would result in a potential loss<br />

of confidentiality, integrity, and availability on the remote database server.<br />

Solution: Upgrade to version 4.6.2 or higher.<br />

CVE-2006-7202<br />

PHP < 4.4.7 / 5.2.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3982 FAMILY: Web Servers RISK: HIGH NESSUS ID:25159<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of PHP lower than 4.4.7 or 5.2.2. This version is vulnerable to a<br />

number of remote issues. At least one of these issues is related to a buffer overflow attack.<br />

An attacker exploiting these flaws would be able to impact confidentiality, integrity, and<br />

availability. The reported version of PHP is: \n %L<br />

Solution: Upgrade to version 4.4.7, 5.2.2 or higher.<br />

CVE-2007-1001<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1032


RunCMS < 1.5.2 Build 20070504 SQL Injection<br />

<strong>PVS</strong> ID: 3983 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running RunCMS, a web-based content management and messaging system. This version<br />

of RunCMS is vulnerable to a remote SQL injection flaw. Flaws within the SQL-handling<br />

routines of the 'debug_show.php' script are the root cause of this vulnerability. An attacker<br />

exploiting this flaw would only need to be able to send specially crafted queries to the<br />

'debug_show.php' script. Successful exploitation would result in the attacker being able to<br />

execute arbitrary SQL commands on the remote database server.<br />

Solution: Upgrade to version 1.5.2 Build 20070504 or higher.<br />

CVE-2007-2539<br />

Cubecart < 3.0.16 HTTP Response Splitting<br />

<strong>PVS</strong> ID: 3984 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTTP 'response splitting' attack.\n\nThe<br />

version of CubeCart installed on the remote host fails to properly sanitize user-supplied<br />

input to the 'ccUser' parameter before using it in cart.php and index.php. An<br />

unauthenticated remote attacker may be able to exploit this issue to insert false HTTP<br />

header data into the client request.<br />

Solution: Upgrade to version 3.0.16 or higher.<br />

CVE-2007-2550<br />

MySQL < 5.0.40 IF Query NULL Dereference DoS<br />

<strong>PVS</strong> ID: 3985 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:25198<br />

Description: Synopsis :\n\nThe remote database server is prone to a denial of service attack.\n\nThe<br />

version of MySQL installed on the remote host is reportedly affected by a denial of service<br />

vulnerability that may be triggered with a specially crafted IF query. An attacker who can<br />

execute arbitrary SELECT statements may be able to leverage this issue to crash the<br />

affected service.<br />

Solution: Upgrade to version 5.0.40 or higher.<br />

CVE-2007-2583<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

SNORT Intrusion Detection System (IDS) Detection<br />

<strong>PVS</strong> ID: 3986 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1033


Description: The remote host is running either the Sourcefire SNORT Intrusion Detection System or<br />

passing SNORT logs to a remote syslog server.<br />

Solution: N/A<br />

CVE Not available<br />

Bro Intrusion Detection System (IDS) Detection<br />

<strong>PVS</strong> ID: 3987 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running either the Bro Intrusion Detection System or passing Bro logs to<br />

a remote syslog server.<br />

Solution: N/A<br />

CVE Not available<br />

Samba < 3.0.25 NDR MS-RPC Request Heap-Based Overflow<br />

<strong>PVS</strong> ID: 3988 FAMILY: Samba RISK: HIGH NESSUS ID:25216<br />

Description: Synopsis :\n\nIt is possible to execute code on the remote host through Samba.\n\nThe<br />

version of the Samba server installed on the remote host ('%L') is affected by multiple heap<br />

overflow vulnerabilities that can be exploited remotely to execute code with the privileges<br />

of the samba daemon.<br />

Solution: Upgrade to version 3.0.25 or higher.<br />

CVE-2007-2446<br />

Darwin RTSP Server < 5.5.5 Multiple Overflows<br />

<strong>PVS</strong> ID: 3989 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple buffer overflows.\n\nThe remote<br />

host is running the Darwin RTSP media server. This version of Darwin is vulnerable to<br />

multiple flaws in the way that it processes user-supplied data. An attacker exploiting these<br />

flaws would only need to be able to send RTSP requests to the Darwin server. Successful<br />

exploitation would result in the attacker executing arbitrary code with the privileges of the<br />

Darwin server process. The reported version number is: \n %L<br />

Solution: Upgrade to version 5.5.5 or higher.<br />

CVE-2007-0748<br />

Samba < 3.0.25 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3990 FAMILY: Samba RISK: HIGH NESSUS ID:25217<br />

Family Internet Services 1034


Description: Synopsis :\n\nThe remote Samba server is affected by multiple<br />

vulnerabilities.\n\nAccording to its banner, the version of the Samba server installed on the<br />

remote host ('%L') is affected by multiple buffer overflow and remote command injection<br />

vulnerabilities that can be exploited remotely, as well as a local privilege escalation bug.<br />

The reported version number of Samba is\n%L<br />

Solution: Upgrade to version 3.0.25 or higher.<br />

CVE-2007-2447<br />

BitTorrent Server Detection<br />

<strong>PVS</strong> ID: 3991 FAMILY: Peer-To-Peer File Sharing<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote host is running a BitTorrent server.\nBitTorrent is a P2P<br />

application that allows users to quickly download files from multiple locations.<br />

Solution: Ensure that BitTorrent is allowed with respect to corporate policies and guidelines.<br />

CVE Not available<br />

Resin < 3.1.1 Directory Traversal Vulnerability (2)<br />

<strong>PVS</strong> ID: 3992 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:25241<br />

Description: Synopsis :\n\nThe remote web server is prone to a directory traversal attack. \n\nThe<br />

remote host is running Resin, an application server. The installation of Resin on the remote<br />

host allows an unauthenticated remote attacker to gain access to the web-inf directories, or<br />

any known subdirectories, on the affected Windows host, which may lead to a loss of<br />

confidentiality.<br />

Solution: Upgrade to version 3.1.1 or higher.<br />

CVE-2007-2440<br />

MySQL < 5.1.18 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3993 FAMILY: Database<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:25242<br />

Description: Synopsis :\n\nThe remote database server is affected by multiple vulnerabilities.\n\nThe<br />

version of MySQL installed on the remote host reportedly is affected by three issues :\n\n-<br />

A user can rename a table without having DROP privileges.\n\n-If a stored routine is<br />

declared as 'SQL SECURITY INVOKER', a user may be able to gain privileges by<br />

invoking that routine.\n\n-A user with only ALTER privileges on a partitioned table can<br />

discover information about the table that should require SELECT privileges.<br />

Family Internet Services 1035


Solution: Upgrade to version 5.1.18 or higher.<br />

CVE-2007-2693<br />

vBulletin < 3.6.7 calendar.php title Parameter Persistent HTML Injection<br />

<strong>PVS</strong> ID: 3994 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML injection attack.\n\nThe version<br />

of vBulletin installed on the remote host fails to properly sanitize user-supplied input.<br />

Specifically, the 'title' parameter of the calendar.php script can be used by an attacker to<br />

inject script code into a public section of the bulletin board. An attacker exploiting this flaw<br />

would only need the ability to post data to the calendar.php script. When an unsuspecting<br />

user browses the site, the script code would be executed within the client browser.<br />

Solution: Upgrade to version 3.6.7 or higher.<br />

CVE-2007-2908<br />

WordPress < 2.1.4 wp-admin/admin-ajax.php cookie Parameter SQL Injection<br />

<strong>PVS</strong> ID: 3995 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a SQL injection attack.\n\nThe version of<br />

WordPress installed on the remote host is vulnerable to a SQL injection attack. The<br />

reported version is: \n %L \n\nAn attacker exploiting this flaw would only need to be able<br />

to send data to the 'wp-admin/admin-ajax.php' script. Successful exploitation would result<br />

in the attacker executing SQL commands on the remote database server<br />

Solution: Upgrade to version 2.1.4 or higher.<br />

CVE-2007-2821<br />

Opera < 9.21 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3996 FAMILY: Web Clients RISK: HIGH NESSUS ID:25290<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is prone to a buffer overflow<br />

attack.\n\nThe version of Opera installed on the remote host reportedly contains a buffer<br />

overflow vulnerability that can be triggered by a malicious Torrent file. Successful<br />

exploitation requires that a user on the affected host right-click on the torrent entry in the<br />

transfer manager rather than simply click on a torrent link and may allow a remote attacker<br />

to execute arbitrary code subject to the privileges of the user.<br />

Solution: Upgrade to version 9.21 or higher.<br />

CVE-2007-2274<br />

Symantec Discovery Client Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1036


<strong>PVS</strong> ID: 3997 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Symantec Discovery client.<br />

Solution: N/A<br />

CVE Not available<br />

Symantec Discovery Server Detection<br />

<strong>PVS</strong> ID: 3998 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Symantec Discovery server.<br />

Solution: N/A<br />

CVE Not available<br />

IMAP SSL/TLS Server Detection<br />

<strong>PVS</strong> ID: 3999 FAMILY: IMAP Servers RISK: INFO NESSUS ID:Not Available<br />

Description: An IMAP server is running on this port. The IMAP server is utilizing the SSL/TLS<br />

encryption protocol.<br />

Solution: N/A<br />

CVE Not available<br />

POP SSL/TLS Server Detection<br />

<strong>PVS</strong> ID: 4000 FAMILY: POP Server RISK: INFO NESSUS ID:Not Available<br />

Description: A POP server is running on this port. The POP server is utilizing the SSL/TLS<br />

encryption protocol.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

NOD32 < 2.70.37 Directory Name Handling Multiple Overflows<br />

<strong>PVS</strong> ID: 4001 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the NOD32 antivirus software. This version of NOD32 is vulnerable to multiple<br />

stack overflows. An attacker exploiting this flaw would only need to send a malformed file<br />

to a system running the NOD32 antivirus software. Successful exploitation would result in<br />

the attacker exploiting code on the remote system. The reported version of NOD32 is: \n<br />

%L<br />

Family Internet Services 1037


Solution: Upgrade to version 2.70.37 or higher.<br />

CVE-2007-2852<br />

Cubecart < 3.0.17 cart.inc.php Multiple Parameter SQL Injection<br />

<strong>PVS</strong> ID: 4002 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe version of<br />

CubeCart installed on the remote host fails to properly sanitize user-supplied input to the<br />

'options' parameter before using it in /include/path/cart.inc.php. An unauthenticated remote<br />

attacker may be able to exploit this issue to execute arbitrary SQL commands on the remote<br />

database server. An attacker exploiting this flaw would only need to be able to send HTTP<br />

requests to the Cubecart application.<br />

Solution: Upgrade to version 3.0.17 or higher.<br />

CVE-2007-2862<br />

FTP Server .xls Office Files Detection<br />

<strong>PVS</strong> ID: 4003 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP server is hosting .xls files. As an example, consider the following file that<br />

was detected on the remote FTP server\n%P\n\nDistributing files over FTP is a common<br />

way of distributing information; however, efforts should be taken to ensure that the hosted<br />

files do not contain confidential data. risk<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server .doc Office Files Detection<br />

<strong>PVS</strong> ID: 4004 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP server is hosting .doc files. As an example, consider the following file that<br />

was detected on the remote FTP server\n%P\n\nDistributing files over FTP is a common<br />

way of distributing information; however, efforts should be taken to ensure that the hosted<br />

files do not contain confidential data.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server .ppt Office Files Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4005 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1038


Description: The remote FTP server is hosting .ppt files. As an example, consider the following file that<br />

was detected on the remote FTP server\n%P\n\nDistributing files over FTP is a common<br />

way of distributing information; however, efforts should be taken to ensure that the hosted<br />

files do not contain confidential data.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server .csv Office Files Detection<br />

<strong>PVS</strong> ID: 4006 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP server is hosting .csv files. As an example, consider the following file that<br />

was detected on the remote FTP server\n%P\n\nDistributing files over FTP is a common<br />

way of distributing information; however, efforts should be taken to ensure that the hosted<br />

files do not contain confidential data.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server .rtf Office Files Detection<br />

<strong>PVS</strong> ID: 4007 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP server is hosting .rtf files. As an example, consider the following file that<br />

was detected on the remote FTP server\n%P\n\nDistributing files over FTP is a common<br />

way of distributing information; however, efforts should be taken to ensure that the hosted<br />

files do not contain confidential data.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server .mp3 / .mp4 Files Detection<br />

<strong>PVS</strong> ID: 4008 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP server is hosting .mp3 or .mp4 files. As an example, consider the<br />

following file that was detected on the remote FTP server\n%P\n\nDistributing files over<br />

FTP is a common way of distributing information; however, efforts should be taken to<br />

ensure that the hosted files do not contain confidential data.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server .wav Files Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4009 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1039


Description: The remote FTP server is hosting .wav files. As an example, consider the following file that<br />

was detected on the remote FTP server\n%P\n\nDistributing files over FTP is a common<br />

way of distributing information; however, efforts should be taken to ensure that the hosted<br />

files do not contain confidential data.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server .ogg Files Detection<br />

<strong>PVS</strong> ID: 4010 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP server is hosting .ogg files. As an example, consider the following file that<br />

was detected on the remote FTP server\n%P\n\nDistributing files over FTP is a common<br />

way of distributing information; however, efforts should be taken to ensure that the hosted<br />

files do not contain confidential data.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server .wma Files Detection<br />

<strong>PVS</strong> ID: 4011 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP server is hosting .wma files. As an example, consider the following file<br />

that was detected on the remote FTP server\n%P\n\nDistributing files over FTP is a<br />

common way of distributing information; however, efforts should be taken to ensure that<br />

the hosted files do not contain confidential data.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server .avi Files Detection<br />

<strong>PVS</strong> ID: 4012 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP server is hosting .avi files. As an example, consider the following file that<br />

was detected on the remote FTP server\n%P\n\nDistributing files over FTP is a common<br />

way of distributing information; however, efforts should be taken to ensure that the hosted<br />

files do not contain confidential data.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server .mpg Files Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4013 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1040


Description: The remote FTP server is hosting .mpg files. As an example, consider the following file<br />

that was detected on the remote FTP server\n%P\n\nDistributing files over FTP is a<br />

common way of distributing information; however, efforts should be taken to ensure that<br />

the hosted files do not contain confidential data.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server .divx Files Detection<br />

<strong>PVS</strong> ID: 4014 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP server is hosting .divx files. As an example, consider the following file<br />

that was detected on the remote FTP server\n%P\n\nDistributing files over FTP is a<br />

common way of distributing information; however, efforts should be taken to ensure that<br />

the hosted files do not contain confidential data.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server .pst Office Files Detection<br />

<strong>PVS</strong> ID: 4015 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP server is hosting .pst files. As an example, consider the following file that<br />

was detected on the remote FTP server\n%P\n\nDistributing files over FTP is a common<br />

way of distributing information; however, efforts should be taken to ensure that the hosted<br />

files do not contain confidential data.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server .ost Office Files Detection<br />

<strong>PVS</strong> ID: 4016 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP server is hosting .ost files. As an example, consider the following file that<br />

was detected on the remote FTP server\n%P\n\nDistributing files over FTP is a common<br />

way of distributing information; however, efforts should be taken to ensure that the hosted<br />

files do not contain confidential data.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server .uni Files Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4017 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1041


Description: The remote FTP server is hosting .uni files. As an example, consider the following file that<br />

was detected on the remote FTP server\n%P\n\nDistributing files over FTP is a common<br />

way of distributing information; however, efforts should be taken to ensure that the hosted<br />

files do not contain confidential data.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server .pdf Files Detection<br />

<strong>PVS</strong> ID: 4018 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP server is hosting .pdf files. As an example, consider the following file that<br />

was detected on the remote FTP server\n%P\n\nDistributing files over FTP is a common<br />

way of distributing information; however, efforts should be taken to ensure that the hosted<br />

files do not contain confidential data.<br />

Solution: N/A<br />

CVE Not available<br />

.xls File Upload Detection<br />

<strong>PVS</strong> ID: 4019 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is utilizing the FTP protocol to upload files to an FTP server. As an<br />

example, consider the following file that was just uploaded by the client to a remote FTP<br />

server\n%L\n\nDistributing files over FTP is a common way of distributing information;<br />

however, efforts should be taken to ensure that the hosted files do not contain confidential<br />

information.<br />

Solution: N/A<br />

CVE Not available<br />

.doc File Upload Detection<br />

<strong>PVS</strong> ID: 4020 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is utilizing the FTP protocol to upload files to an FTP server. As an<br />

example, consider the following file that was just uploaded by the client to a remote FTP<br />

server\n%L\n\nDistributing files over FTP is a common way of distributing information;<br />

however, efforts should be taken to ensure that the hosted files do not contain confidential<br />

information.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1042


.ppt File Upload Detection<br />

<strong>PVS</strong> ID: 4021 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is utilizing the FTP protocol to upload files to an FTP server. As an<br />

example, consider the following file that was just uploaded by the client to a remote FTP<br />

server\n%L\n\nDistributing files over FTP is a common way of distributing information;<br />

however, efforts should be taken to ensure that the hosted files do not contain confidential<br />

information.<br />

Solution: N/A<br />

CVE Not available<br />

.csv File Upload Detection<br />

<strong>PVS</strong> ID: 4022 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is utilizing the FTP protocol to upload files to an FTP server. As an<br />

example, consider the following file that was just uploaded by the client to a remote FTP<br />

server\n%L\n\nDistributing files over FTP is a common way of distributing information;<br />

however, efforts should be taken to ensure that the hosted files do not contain confidential<br />

information.<br />

Solution: N/A<br />

CVE Not available<br />

.rtf File Upload Detection<br />

<strong>PVS</strong> ID: 4023 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is utilizing the FTP protocol to upload files to an FTP server. As an<br />

example, consider the following file that was just uploaded by the client to a remote FTP<br />

server\n%L\n\nDistributing files over FTP is a common way of distributing information;<br />

however, efforts should be taken to ensure that the hosted files do not contain confidential<br />

information.<br />

Solution: N/A<br />

CVE Not available<br />

.mp3 File Upload Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4024 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is utilizing the FTP protocol to upload files to an FTP server. As an<br />

example, consider the following file that was just uploaded by the client to a remote FTP<br />

server\n%L\n\nDistributing files over FTP is a common way of distributing information;<br />

however, efforts should be taken to ensure that the hosted files do not contain confidential<br />

information.<br />

Family Internet Services 1043


Solution: N/A<br />

CVE Not available<br />

.wav File Upload Detection<br />

<strong>PVS</strong> ID: 4025 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is utilizing the FTP protocol to upload files to an FTP server. As an<br />

example, consider the following file that was just uploaded by the client to a remote FTP<br />

server\n%L\n\nDistributing files over FTP is a common way of distributing information;<br />

however, efforts should be taken to ensure that the hosted files do not contain confidential<br />

information.<br />

Solution: N/A<br />

CVE Not available<br />

.ogg File Upload Detection<br />

<strong>PVS</strong> ID: 4026 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is utilizing the FTP protocol to upload files to an FTP server. As an<br />

example, consider the following file that was just uploaded by the client to a remote FTP<br />

server\n%L\n\nDistributing files over FTP is a common way of distributing information;<br />

however, efforts should be taken to ensure that the hosted files do not contain confidential<br />

information.<br />

Solution: N/A<br />

CVE Not available<br />

.wma File Upload Detection<br />

<strong>PVS</strong> ID: 4027 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is utilizing the FTP protocol to upload files to an FTP server. As an<br />

example, consider the following file that was just uploaded by the client to a remote FTP<br />

server\n%L\n\nDistributing files over FTP is a common way of distributing information;<br />

however, efforts should be taken to ensure that the hosted files do not contain confidential<br />

information.<br />

Solution: N/A<br />

CVE Not available<br />

.avi File Upload Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4028 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1044


Description: The remote client is utilizing the FTP protocol to upload files to an FTP server. As an<br />

example, consider the following file that was just uploaded by the client to a remote FTP<br />

server\n%L\n\nDistributing files over FTP is a common way of distributing information;<br />

however, efforts should be taken to ensure that the hosted files do not contain confidential<br />

information.<br />

Solution: N/A<br />

CVE Not available<br />

.mpg File Upload Detection<br />

<strong>PVS</strong> ID: 4029 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is utilizing the FTP protocol to upload files to an FTP server. As an<br />

example, consider the following file that was just uploaded by the client to a remote FTP<br />

server\n%L\n\nDistributing files over FTP is a common way of distributing information;<br />

however, efforts should be taken to ensure that the hosted files do not contain confidential<br />

information.<br />

Solution: N/A<br />

CVE Not available<br />

.divx File Upload Detection<br />

<strong>PVS</strong> ID: 4030 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is utilizing the FTP protocol to upload files to an FTP server. As an<br />

example, consider the following file that was just uploaded by the client to a remote FTP<br />

server\n%L\n\nDistributing files over FTP is a common way of distributing information;<br />

however, efforts should be taken to ensure that the hosted files do not contain confidential<br />

information.<br />

Solution: N/A<br />

CVE Not available<br />

.pst File Upload Detection<br />

<strong>PVS</strong> ID: 4031 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is utilizing the FTP protocol to upload files to an FTP server. As an<br />

example, consider the following file that was just uploaded by the client to a remote FTP<br />

server\n%L\n\nDistributing files over FTP is a common way of distributing information;<br />

however, efforts should be taken to ensure that the hosted files do not contain confidential<br />

information.<br />

Solution: N/A<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1045


CVE Not available<br />

.ost File Upload Detection<br />

<strong>PVS</strong> ID: 4032 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is utilizing the FTP protocol to upload files to an FTP server. As an<br />

example, consider the following file that was just uploaded by the client to a remote FTP<br />

server\n%L\n\nDistributing files over FTP is a common way of distributing information;<br />

however, efforts should be taken to ensure that the hosted files do not contain confidential<br />

information.<br />

Solution: N/A<br />

CVE Not available<br />

.uni File Upload Detection<br />

<strong>PVS</strong> ID: 4033 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is utilizing the FTP protocol to upload files to an FTP server. As an<br />

example, consider the following file that was just uploaded by the client to a remote FTP<br />

server\n%L\n\nDistributing files over FTP is a common way of distributing information;<br />

however, efforts should be taken to ensure that the hosted files do not contain confidential<br />

information.<br />

Solution: N/A<br />

CVE Not available<br />

.pdf File Upload Detection<br />

<strong>PVS</strong> ID: 4034 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is utilizing the FTP protocol to upload files to an FTP server. As an<br />

example, consider the following file that was just uploaded by the client to a remote FTP<br />

server\n%L\n\nDistributing files over FTP is a common way of distributing information;<br />

however, efforts should be taken to ensure that the hosted files do not contain confidential<br />

information.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

WebGUI < 7.3.14 viewList() Function Authentication Bypass<br />

<strong>PVS</strong> ID: 4035 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running WebGUI, a content management framework.<br />

The remote version of this software is vulnerable to a flaw where an attacker can bypass<br />

Family Internet Services 1046


security restrictions and gain administrative access to the application. Specifically, the<br />

'viewList()' function of the 'lib/WebGUI/Asset/Wobject/DataForm.pm' script fails to<br />

validate user credentials and would allow an unauthenticated user access to confidential<br />

data.<br />

Solution: Upgrade to version 7.3.14 or higher.<br />

eScan Agent Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 4036 FAMILY: Generic RISK: NONE NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running antivirus.\n\nThe remote host is running<br />

MicroWorld Agent server, an embedded service used by Microsoft antivirus software.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server Zipped .xls File Detection<br />

<strong>PVS</strong> ID: 4037 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP server is hosting compressed (zipped) archives that contain .xls files. As<br />

an example, consider the following file that is a part of a .zip archive and was just<br />

downloaded by a remote FTP client\n%L\n\nDistributing files over FTP is a common way<br />

of distributing information; however, efforts should be taken to ensure that the hosted files<br />

do not contain confidential information.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server Zipped .doc File Detection<br />

<strong>PVS</strong> ID: 4038 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP server is hosting compressed (zipped) archives that contain .doc files. As<br />

an example, consider the following file that is a part of a .zip archive and was just<br />

downloaded by a remote FTP client\n%L\n\nDistributing files over FTP is a common way<br />

of distributing information; however, efforts should be taken to ensure that the hosted files<br />

do not contain confidential information.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server Zipped .ppt File Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4039 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1047


Description: The remote FTP server is hosting compressed (zipped) archives that contain .ppt files. As<br />

an example, consider the following file that is a part of a .zip archive and was just<br />

downloaded by a remote FTP client\n%L\n\nDistributing files over FTP is a common way<br />

of distributing information; however, efforts should be taken to ensure that the hosted files<br />

do not contain confidential information.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server Zipped .csv File Detection<br />

<strong>PVS</strong> ID: 4040 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP server is hosting compressed (zipped) archives that contain .csv files. As<br />

an example, consider the following file that is a part of a .zip archive and was just<br />

downloaded by a remote FTP client\n%L\n\nDistributing files over FTP is a common way<br />

of distributing information; however, efforts should be taken to ensure that the hosted files<br />

do not contain confidential information.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server Zipped .rtf File Detection<br />

<strong>PVS</strong> ID: 4041 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP server is hosting compressed (zipped) archives that contain .rtf files. As an<br />

example, consider the following file that is a part of a .zip archive and was just downloaded<br />

by a remote FTP client\n%L\n\nDistributing files over FTP is a common way of<br />

distributing information; however, efforts should be taken to ensure that the hosted files do<br />

not contain confidential information.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server Zipped .mp3 / .mp4 File Detection<br />

<strong>PVS</strong> ID: 4042 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP server is hosting compressed (zipped) archives that contain .mp3 or .mp4<br />

files. As an example, consider the following file that is a part of a .zip archive and was just<br />

downloaded by a remote FTP client\n%L\n\nDistributing files over FTP is a common way<br />

of distributing information; however, efforts should be taken to ensure that the hosted files<br />

do not contain confidential information.<br />

Solution: N/A<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1048


CVE Not available<br />

FTP Server Zipped .wav File Detection<br />

<strong>PVS</strong> ID: 4043 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP server is hosting compressed (zipped) archives that contain .wav files. As<br />

an example, consider the following file that is a part of a .zip archive and was just<br />

downloaded by a remote FTP client\n%L\n\nDistributing files over FTP is a common way<br />

of distributing information; however, efforts should be taken to ensure that the hosted files<br />

do not contain confidential information.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server Zipped .ogg File Detection<br />

<strong>PVS</strong> ID: 4044 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP server is hosting compressed (zipped) archives that contain .ogg files. As<br />

an example, consider the following file that is a part of a .zip archive and was just<br />

downloaded by a remote FTP client\n%L\n\nDistributing files over FTP is a common way<br />

of distributing information; however, efforts should be taken to ensure that the hosted files<br />

do not contain confidential information.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server Zipped .wma File Detection<br />

<strong>PVS</strong> ID: 4045 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP server is hosting compressed (zipped) archives that contain .wma files. As<br />

an example, consider the following file that is a part of a .zip archive and was just<br />

downloaded by a remote FTP client\n%L\n\nDistributing files over FTP is a common way<br />

of distributing information; however, efforts should be taken to ensure that the hosted files<br />

do not contain confidential information.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server Zipped .avi File Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4046 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP server is hosting compressed (zipped) archives that contain .avi files. As<br />

an example, consider the following file that is a part of a .zip archive and was just<br />

downloaded by a remote FTP client\n%L\n\nDistributing files over FTP is a common way<br />

Family Internet Services 1049


Solution: N/A<br />

of distributing information; however, efforts should be taken to ensure that the hosted files<br />

do not contain confidential information.<br />

CVE Not available<br />

FTP Server Zipped .mpg File Detection<br />

<strong>PVS</strong> ID: 4047 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP server is hosting compressed (zipped) archives that contain .mpg files. As<br />

an example, consider the following file that is a part of a .zip archive and was just<br />

downloaded by a remote FTP client\n%L\n\nDistributing files over FTP is a common way<br />

of distributing information; however, efforts should be taken to ensure that the hosted files<br />

do not contain confidential information.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server Zipped .divx File Detection<br />

<strong>PVS</strong> ID: 4048 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP server is hosting compressed (zipped) archives that contain .divx files. As<br />

an example, consider the following file that is a part of a .zip archive and was just<br />

downloaded by a remote FTP client\n%L\n\nDistributing files over FTP is a common way<br />

of distributing information; however, efforts should be taken to ensure that the hosted files<br />

do not contain confidential information.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server Zipped .pst File Detection<br />

<strong>PVS</strong> ID: 4049 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP server is hosting compressed (zipped) archives that contain .pst files. As<br />

an example, consider the following file that is a part of a .zip archive and was just<br />

downloaded by a remote FTP client\n%L\n\nDistributing files over FTP is a common way<br />

of distributing information; however, efforts should be taken to ensure that the hosted files<br />

do not contain confidential information.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server Zipped .ost File Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1050


<strong>PVS</strong> ID: 4050 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP server is hosting compressed (zipped) archives that contain .ost files. As<br />

an example, consider the following file that is a part of a .zip archive and was just<br />

downloaded by a remote FTP client\n%L\n\nDistributing files over FTP is a common way<br />

of distributing information; however, efforts should be taken to ensure that the hosted files<br />

do not contain confidential information.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server Zipped .uni File Detection<br />

<strong>PVS</strong> ID: 4051 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP server is hosting compressed (zipped) archives that contain .uni files. As<br />

an example, consider the following file that is a part of a .zip archive and was just<br />

downloaded by a remote FTP client\n%L\n\nDistributing files over FTP is a common way<br />

of distributing information. However, efforts should be taken to ensure that the hosted files<br />

do not contain confidential information.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server Zipped .pdf File Detection<br />

<strong>PVS</strong> ID: 4052 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP server is hosting compressed (zipped) archives that contain .pdf files. As<br />

an example, consider the following file that is a part of a .zip archive and was just<br />

downloaded by a remote FTP client\n%L\n\nDistributing files over FTP is a common way<br />

of distributing information. However, efforts should be taken to ensure that the hosted files<br />

do not contain confidential information.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server Zipped xls File Uploaded<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4053 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP client was observed uploading an archive (zipped) file that contained a .xls<br />

file. As an example, consider the following file that is a part of a .zip archive and was just<br />

uploaded to a remote FTP server\n%L\n\nDistributing files over FTP is a common way of<br />

distributing information. However, efforts should be taken to ensure that confidential files<br />

are not uploaded via FTP.<br />

Family Internet Services 1051


Solution: N/A<br />

CVE Not available<br />

FTP Server Zipped .doc File Uploaded<br />

<strong>PVS</strong> ID: 4054 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP client was observed uploading an archive (zipped) file that contained a<br />

.doc file. As an example, consider the following file that is a part of a .zip archive and was<br />

just uploaded to a remote FTP server\n%L\n\nDistributing files over FTP is a common way<br />

of distributing information. However, efforts should be taken to ensure that confidential<br />

files are not uploaded via FTP.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server Zipped .ppt File Uploaded<br />

<strong>PVS</strong> ID: 4055 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP client was observed uploading an archive (zipped) file that contained a<br />

.ppt file. As an example, consider the following file that is a part of a .zip archive and was<br />

just uploaded to a remote FTP server\n%L\n\nDistributing files over FTP is a common way<br />

of distributing information. However, efforts should be taken to ensure that confidential<br />

files are not uploaded via FTP.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server Zipped .csv File Uploaded<br />

<strong>PVS</strong> ID: 4056 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP client was observed uploading an archive (zipped) file that contained a<br />

.csv file. As an example, consider the following file that is a part of a .zip archive and was<br />

just uploaded to a remote FTP server\n%L\n\nDistributing files over FTP is a common way<br />

of distributing information. However, efforts should be taken to ensure that confidential<br />

files are not uploaded via FTP.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server Zipped .rtf File Uploaded<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4057 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1052


Description: The remote FTP client was observed uploading an archive (zipped) file that contained a .rtf<br />

file. As an example, consider the following file that is a part of a .zip archive and was just<br />

uploaded to a remote FTP server\n%L\n\nDistributing files over FTP is a common way of<br />

distributing information. However, efforts should be taken to ensure that confidential files<br />

are not uploaded via FTP.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server Zipped .mp3 / .mp4 File Uploaded<br />

<strong>PVS</strong> ID: 4058 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP client was observed uploading an archive (zipped) file that contained a<br />

.mp3 or .mp4 file. As an example, consider the following file that is a part of a .zip archive<br />

and was just uploaded to a remote FTP server\n%L\n\nDistributing files over FTP is a<br />

common way of distributing information. However, efforts should be taken to ensure that<br />

confidential files are not uploaded via FTP.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server Zipped .wav File Uploaded<br />

<strong>PVS</strong> ID: 4059 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP client was observed uploading an archive (zipped) file that contained a<br />

.wav file. As an example, consider the following file that is a part of a .zip archive and was<br />

just uploaded to a remote FTP server\n%L\n\nDistributing files over FTP is a common way<br />

of distributing information. However, efforts should be taken to ensure that confidential<br />

files are not uploaded via FTP.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server Zipped .ogg File Uploaded<br />

<strong>PVS</strong> ID: 4060 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP client was observed uploading an archive (zipped) file that contained a<br />

.ogg file. As an example, consider the following file that is a part of a .zip archive and was<br />

just uploaded to a remote FTP server\n%L\n\nDistributing files over FTP is a common way<br />

of distributing information. However, efforts should be taken to ensure that confidential<br />

files are not uploaded via FTP.<br />

Solution: N/A<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1053


CVE Not available<br />

FTP Server Zipped .wma File Uploaded<br />

<strong>PVS</strong> ID: 4061 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP client was observed uploading an archive (zipped) file that contained a<br />

.wma file. As an example, consider the following file that is a part of a .zip archive and was<br />

just uploaded to a remote FTP server\n%L\n\nDistributing files over FTP is a common way<br />

of distributing information. However, efforts should be taken to ensure that confidential<br />

files are not uploaded via FTP.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server Zipped .avi File Uploaded<br />

<strong>PVS</strong> ID: 4062 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP client was observed uploading an archive (zipped) file that contained a .avi<br />

file. As an example, consider the following file that is a part of a .zip archive and was just<br />

uploaded to a remote FTP server\n%L\n\nDistributing files over FTP is a common way of<br />

distributing information. However, efforts should be taken to ensure that confidential files<br />

are not uploaded via FTP.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server Zipped .mpg File Uploaded<br />

<strong>PVS</strong> ID: 4063 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP client was observed uploading an archive (zipped) file that contained a<br />

.mpg file. As an example, consider the following file that is a part of a .zip archive and was<br />

just uploaded to a remote FTP server\n%L\n\nDistributing files over FTP is a common way<br />

of distributing information. However, efforts should be taken to ensure that confidential<br />

files are not uploaded via FTP.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server Zipped .divx File Uploaded<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4064 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP client was observed uploading an archive (zipped) file that contained a<br />

.divx file. As an example, consider the following file that is a part of a .zip archive and was<br />

just uploaded to a remote FTP server\n%L\n\nDistributing files over FTP is a common way<br />

Family Internet Services 1054


Solution: N/A<br />

of distributing information. However, efforts should be taken to ensure that confidential<br />

files are not uploaded via FTP.<br />

CVE Not available<br />

FTP Server Zipped .pst File Uploaded<br />

<strong>PVS</strong> ID: 4065 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP client was observed uploading an archive (zipped) file that contained a .pst<br />

file. As an example, consider the following file that is a part of a .zip archive and was just<br />

uploaded to a remote FTP server\n%L\n\nDistributing files over FTP is a common way of<br />

distributing information. However, efforts should be taken to ensure that confidential files<br />

are not uploaded via FTP.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server Zipped .ost File Uploaded<br />

<strong>PVS</strong> ID: 4066 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP client was observed uploading an archive (zipped) file that contained a .ost<br />

file. As an example, consider the following file that is a part of a .zip archive and was just<br />

uploaded to a remote FTP server\n%L\n\nDistributing files over FTP is a common way of<br />

distributing information. However, efforts should be taken to ensure that confidential files<br />

are not uploaded via FTP.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server Zipped .uni File Uploaded<br />

<strong>PVS</strong> ID: 4067 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP client was observed uploading an archive (zipped) file that contained a<br />

.uni file. As an example, consider the following file that is a part of a .zip archive and was<br />

just uploaded to a remote FTP server\n%L\n\nDistributing files over FTP is a common way<br />

of distributing information. However, efforts should be taken to ensure that confidential<br />

files are not uploaded via FTP.<br />

Solution: N/A<br />

CVE Not available<br />

FTP Server Zipped .pdf File Uploaded<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1055


<strong>PVS</strong> ID: 4068 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP client was observed uploading an archive (zipped) file that contained a<br />

.pdf file. As an example, consider the following file that is a part of a .zip archive and was<br />

just uploaded to a remote FTP server\n%L\n\nDistributing files over FTP is a common way<br />

of distributing information. However, efforts should be taken to ensure that confidential<br />

files are not uploaded via FTP.<br />

Solution: N/A<br />

CVE Not available<br />

OpenOffice Version Information<br />

<strong>PVS</strong> ID: 4069 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the OpenOffice suite of business tools. The exact version is<br />

\n%L<br />

Solution: N/A<br />

CVE Not available<br />

Openfire < 3.3.1 Admin Console Privilege Escalation<br />

<strong>PVS</strong> ID: 4070 FAMILY: Web Servers RISK: HIGH NESSUS ID:25343<br />

Description: Synopsis :\n\nThe remote web server allows unauthenticated access to its administrative<br />

console.\n\nThe remote host is running Openfire / Wildfire, an instant messaging server<br />

supporting the XMPP protocol.\n\nThe version of Openfire or Wildfire installed on the<br />

remote host allows unauthenticated access to a servlet, which could allow a malicious user<br />

to upload code to Openfire via its admin console.<br />

Solution: Either firewall access to the admin console on this port or upgrade to Openfire version 3.3.1<br />

or higher.<br />

CVE-2007-2975<br />

Mozilla Firefox < 1.5.0.12 / 2.0.0.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4071 FAMILY: Web Clients RISK: HIGH NESSUS ID:25349<br />

Description: Synopsis :\n\nThe remote Windows host contains a web browser that is affected by<br />

multiple vulnerabilities.\n\nThe installed version of Firefox is affected by various security<br />

issues, one of which may lead to execution of arbitrary code on the affected host subject to<br />

the user's privileges.<br />

Solution: Upgrade to version 1.5.0.12 / 2.0.0.4 or higher.<br />

CVE-2007-1362<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1056


Mozilla Thunderbird < 1.5.0.12 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4072 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:25350<br />

Description: Synopsis :\n\nThe remote Windows host contains a mail client that is affected by multiple<br />

vulnerabilities.\n\nThe remote version of Mozilla Thunderbird suffers from various security<br />

issues, at least one of which may lead to execution of arbitrary code on the affected host<br />

subject to the user's privileges.<br />

Solution: Upgrade to version 1.5.0.12 or higher.<br />

CVE-2007-1558<br />

Mozilla SeaMonkey < 1.0.9 / 1.1.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4073 FAMILY: Web Clients RISK: HIGH NESSUS ID:25351<br />

Description: Synopsis :\n\nA web browser on the remote host is prone to multiple flaws.\n\nThe<br />

installed version of SeaMonkey contains various security issues, one of which may lead to<br />

execution of arbitrary code on the affected host subject to the user's privileges.<br />

Solution: Upgrade to version 1.0.9 / 1.1.2 or higher.<br />

CVE-2007-1558<br />

PHP < 5.2.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4074 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:25368<br />

Description: Synopsis : \n\nThe remote web server uses a version of PHP that is affected by multiple<br />

flaws.\n\nAccording to its banner, the version of PHP installed on the remote host is older<br />

than 5.2.3. Such versions may be affected by several issues including an integer overflow,<br />

'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. The reported<br />

version of PHP is: \n %L<br />

Solution: Upgrade to version 5.2.3 or higher.<br />

CVE-2007-2756<br />

ClamAV < 0.90.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4075 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running the ClamAV anti-virus client version %L\n\nThis version of<br />

ClamAV is vulnerable to a denial of service (DoS) attack when handling malformed RAR<br />

archive files. An attacker exploiting this flaw would only need the ability to send an email<br />

to the vulnerable system. Successful exploitation would result in the application crashing.<br />

Solution: Upgrade to version 0.90.3 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1057


CVE-2007-2650<br />

BASE < 1.3.8 Redirect Authentication Bypass<br />

<strong>PVS</strong> ID: 4076 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the<br />

bypassing of authentication.\n\nThe remote host is running BASE, a web-based<br />

tool for analyzing alerts from one or more SNORT sensors. The version of<br />

BASE installed on the remote host fails to sanitize user-supplied input to the<br />

'base_main.php'. An attacker exploiting this flaw would be able to access<br />

confidential data without authorization.<br />

Solution: Upgrade to version 1.3.8 or higher.<br />

CVE-2007-5578<br />

Lotus Domino Web Server Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4077 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of Lotus Domino Server that is prone to multiple attacks against the<br />

web server component. If this Lotus Domino install includes the web server component,<br />

there is a risk that remote users may crash the application (DoS) or that local users may<br />

escalate privileges on the local machine.<br />

Solution: Upgrade to version 6.5.5F3, 6.5.6, 7.0.2F2, 7.0.3 or higher.<br />

PBLang <<br />

CVE-2007-0068<br />

<strong>PVS</strong> ID: 4078 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:25444<br />

Description: Synopsis :\n\nThe remote web server contains a PHP script that is susceptible to a local file<br />

inclusion attack.\n\nThe remote host is running PBLang, a bulletin board system that uses<br />

flat files and is written in PHP. The version of PBLang installed on the remote host fails to<br />

sanitize user input to the 'lang' parameter before using it to include PHP code in 'login.php'.<br />

Regardless of PHP's 'register_globals' setting, an unauthenticated remote attacker may be<br />

able to exploit this issue to view arbitrary files or to execute arbitrary PHP code on the<br />

remote host, subject to the privileges of the web server user ID.<br />

Solution: No solution is known at this time.<br />

CVE-2007-3096<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Yahoo! Messenger Webcam ActiveX Multiple Overflows<br />

Family Internet Services 1058


<strong>PVS</strong> ID: 4079 FAMILY: Web Clients RISK: HIGH NESSUS ID:25459<br />

Description: Synopsis :\n\nThe remote Windows host has a least one ActiveX control that is affected by<br />

a buffer overflow vulnerability.\n\nThe remote host contains the 'Webcam' ActiveX<br />

controls included with Yahoo! Messenger. The version of at least one of these controls on<br />

the remote host has a buffer overflow. If an attacker can trick a user on the affected host<br />

into visiting a specially-crafted web page, he may be able to leverage these issues to<br />

execute arbitrary code on the host subject to the user's privileges.<br />

Solution: Upgrade or patch according to vendor recommendations and ensure that the version of both<br />

affected controls is 2.0.1.6 or higher.<br />

CVE-2007-3148<br />

Windows CE < 5.1 Detection<br />

<strong>PVS</strong> ID: 4080 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is a Windows CE device. The remote client OS is \n%L\n\nThis version of<br />

Windows CE has been reported prone to a number of Denial of Service (DoS) attacks.<br />

Solution: Upgrade to version 5.1 or higher.<br />

CVE Not available<br />

Yahoo! Messenger User Enumeration<br />

<strong>PVS</strong> ID: 4081 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Yahoo! Instant Messenger. The user ID associated with this<br />

session is\n%L<br />

realtime<br />

Solution: N/A<br />

CVE Not available<br />

AOL Instant Messenger User Enumeration<br />

<strong>PVS</strong> ID: 4082 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running AOL Instant Messenger. The user ID associated with this<br />

session is\n%L<br />

realtime<br />

Solution: N/A<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1059


CVE Not available<br />

GHOST UDP <strong>Network</strong> Client Version Detection<br />

<strong>PVS</strong> ID: 4083 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a GHOST client that looks for a GHOST server and, if found,<br />

downloads a bootable image at system startup. The version of the remote GHOST client<br />

is\n%L<br />

Solution: Ensure that this protocol is secure and within corporate and security policies and<br />

guidelines. This traffic should never be seen on an external (DMZ or extranet) segment.<br />

CVE Not available<br />

Windows Live Messenger Version Detection<br />

<strong>PVS</strong> ID: 4084 FAMILY: Internet Messengers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is running Windows Live Messenger, an application that allows users to<br />

chat and share information on multiple chat networks simultaneously. The version of<br />

Windows Live Messenger is\n%L<br />

Solution: Ensure that you are running the latest version of this software.<br />

CVE Not available<br />

BearShare P2P Client Version Detection<br />

<strong>PVS</strong> ID: 4085 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the BearShare client. BearShare is a Gnutella Peer to Peer (P2P)<br />

client that is used to connect to file-sharing networks. The reported version is \n%L<br />

Solution: Ensure that such behavior is in alignment with policies and guidelines regarding<br />

appropriate network usage.<br />

CVE Not available<br />

gtk-gnutella P2P Client Version Detection<br />

<strong>PVS</strong> ID: 4086 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the gtk-gnutella client. gtk-gnutella is a Gnutella Peer to Peer<br />

(P2P) client that is used to connect to file-sharing networks. The reported version is \n%L<br />

Solution: Ensure that such behavior is in alignment with policies and guidelines regarding<br />

appropriate network usage.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1060


Invision Power Board <<br />

<strong>PVS</strong> ID: 4087 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running Invision Board, a CGI suite designed to set<br />

up a bulletin board system on the remote web server. This version of Invision Board is<br />

vulnerable to a flaw in the way that the 'sources/action_public/xmlout.php' script handles<br />

user-supplied data. An attacker exploiting this flaw would be able to change the instant<br />

messenger profile of another user. This could lead to a loss of confidential data.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2007-3219<br />

Cumulative <strong>Security</strong> Update for Microsoft Outlook Express and Windows Mail (929123)<br />

<strong>PVS</strong> ID: 4088 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:25487<br />

Description: Arbitrary code can be executed on the remote host through the email client. The remote<br />

host is running a version of Microsoft Outlook Express that contains several security flaws<br />

that may allow an attacker to execute arbitrary code on the remote host. To exploit this<br />

flaw, an attacker would need to send a malformed email to a victim on the remote host and<br />

have him open it.\nIAVB Reference : 2007-B-0011\nSTIG Finding Severity : Category II<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2007-2227<br />

Windows 2003 SP2 Server Detection<br />

<strong>PVS</strong> ID: 4089 FAMILY: Operating System Detection RISK: NONE NESSUS ID:Not Available<br />

Description: The remote host is running Windows 2003 Server SP2.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Cumulative <strong>Security</strong> Update for Microsoft Outlook Express and Windows Mail (929123)<br />

<strong>PVS</strong> ID: 4090 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:25487<br />

Description: Arbitrary code can be executed on the remote host through the email client. The remote<br />

host is running a version of Microsoft Outlook Express that contains several security flaws<br />

that may allow an attacker to execute arbitrary code on the remote host. To exploit this<br />

flaw, an attacker would need to send a malformed email to a victim on the remote host and<br />

have him open it.\nIAVB Reference : 2007-B-0011\nSTIG Finding Severity : Category II<br />

Solution: Upgrade or patch according to vendor recommendaitons.<br />

Family Internet Services 1061


CVE-2007-2227<br />

Windows Vista Operating System Detection<br />

<strong>PVS</strong> ID: 4091 FAMILY: Operating System Detection RISK: NONE NESSUS ID:Not Available<br />

Description: The remote host is running Windows Vista.<br />

Solution: N/A<br />

CVE Not available<br />

Cumulative <strong>Security</strong> Update for Microsoft Outlook Express and Windows Mail (929123)<br />

<strong>PVS</strong> ID: 4092 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:25487<br />

Description: Arbitrary code can be executed on the remote host through the email client. The remote<br />

host is running a version of Microsoft Outlook Express that contains several security flaws<br />

that may allow an attacker to execute arbitrary code on the remote host. To exploit this<br />

flaw, an attacker would need to send a malformed email to a victim on the remote host and<br />

have him open it.\nIAVB Reference : 2007-B-0011\nSTIG Finding Severity : Category II<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2007-2227<br />

Cumulative <strong>Security</strong> Update for Microsoft Outlook Express and Windows Mail (929123)<br />

<strong>PVS</strong> ID: 4093 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:25487<br />

Description: Arbitrary code can be executed on the remote host through the email client. The remote<br />

host is running a version of Microsoft Outlook Express that contains several security flaws<br />

that may allow an attacker to execute arbitrary code on the remote host. To exploit this<br />

flaw, an attacker would need to send a malformed email to a victim on the remote host and<br />

have him open it.\nIAVB Reference : 2007-B-0011\nSTIG Finding Severity : Category II<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2007-2227<br />

Microsoft Windows Office Version Detection<br />

<strong>PVS</strong> ID: 4094 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Microsoft Office version %L<br />

Solution: N/A<br />

CVE Not available<br />

Windows CE < 5.1 Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1062


<strong>PVS</strong> ID: 4095 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is a Windows CE device. The remote client OS is \n%L\n\nThis version of Windows CE<br />

has been reported prone to a number of Denial of Service (DoS) attacks. In addition, the<br />

client is reported vulnerable to a buffer overflow. An attacker exploiting these flaws would<br />

be able to either crash the client or execute arbitrary code.<br />

Solution: Upgrade to version 5.1 or higher.<br />

CVE Not available<br />

Windows CE < 5.0 / 6.0 Buffer Overflow<br />

<strong>PVS</strong> ID: 4096 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is a<br />

Windows CE device. The remote client OS is \n%L\n\nThis version of Windows CE has<br />

been reported prone to a buffer overflow. An attacker exploiting this flaw would be able to<br />

execute arbitrary code on the remote device.<br />

Solution: Upgrade to version 5.0, 6.0 or higher.<br />

YaBB SE <<br />

CVE Not available<br />

<strong>PVS</strong> ID: 4097 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the<br />

bypassing of authentication.\n\nThe remote host is running the YaBB SE forum<br />

management system. There is a flaw in this version of YaBB SE that allows<br />

authenticated users to escalate privileges and gain administrative access. The<br />

'Profile.pl' and 'Register.pl' scripts fails to sanitize CRLF sequences. An attacker<br />

can use this flaw to write data into their profile which gives them elevated<br />

access.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2007-3295<br />

IMAP User ID Enumeration<br />

<strong>PVS</strong> ID: 4098 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is an IMAP client. The observed IMAP User ID was\n%L"<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1063


Windows Safari Detection<br />

<strong>PVS</strong> ID: 4099 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Safari browser for Microsoft Windows. The version number<br />

was\n%L<br />

Solution: N/A<br />

CVE Not available<br />

SpamAssassin < 3.2.1 spamd Symlink Local DoS<br />

<strong>PVS</strong> ID: 4100 FAMILY: SMTP Clients RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running SpamAssassin, an anti-spam software application that detects and<br />

blocks spam emails. This version of SpamAssassin is vulnerable to a flaw in that by<br />

creating a symbolic link, local attackers can cause the application to process a malformed<br />

file. Successful exploitation results in the application crashing and denying valid services to<br />

users.<br />

Solution: Upgrade to version 3.2.1 or higher.<br />

CVE-2007-2873<br />

Simple Machines Forum < 1.1.3 PHPSESSIONID Cookie Session Hijacking<br />

<strong>PVS</strong> ID: 4101 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a predictable ID flaw that allows hijacking<br />

of user accounts.\n\nThe remote host is running the Simple Machines Forum (SMF), a web<br />

forum. This version of SMF is vulnerable to a flaw in the way that it handles<br />

'PHPSESSIONID' cookie data. Specifically, if an attacker can convince a user to browse a<br />

malicious URI with a predefined 'PHPSESSIONID', the attacker can impersonate the user<br />

and hijack their account. Successful exploitation would lead to the attacker gaining full<br />

access to the targeted account.<br />

Solution: Upgrade to version 1.1.3 or higher.<br />

CVE-2007-2546<br />

Trillian < 3.1.6.0 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4102 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:25547<br />

Description: Synopsis :\n\nThe remote host contains an instant messenging application that is affected<br />

by a buffer overflow vulnerability.\n\nThe version of Trillian installed on the remote host<br />

reportedly is affected by a heap buffer overflow issue involving improper handling of<br />

UTF-8 sequences when word-wrapping UTF-8 text. A remote attacker may be able to<br />

Family Internet Services 1064


leverage these issues to execute arbitrary code as the current user.<br />

Solution: Upgrade to version 3.1.6.0 or higher.<br />

CVE-2007-3305<br />

AOL Instant Messenger <<br />

<strong>PVS</strong> ID: 4103 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running AOL Instant Messenger (AIM). Versions 6.1.32.1 and lower are<br />

reported vulnerable to a remote Denial of Service (DoS) attack. An attacker exploiting this<br />

flaw would only need to be able to initiate a SIP session to the AIM client. Successful<br />

exploitation would result in the Instant Messenger client crashing.<br />

Solution: Upgrade to a version higher than 6.1.32.1.<br />

CVE-2007-3350<br />

AOL Instant Messenger 6 Version Detection<br />

<strong>PVS</strong> ID: 4104 FAMILY: Internet Messengers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is running AOL Instant Messenger version: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

SJPhone SIP Client INVITE Transaction Remote DoS<br />

<strong>PVS</strong> ID: 4105 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running the SJPhone VoIP SIP client: \n %L \nThis protocol is used to<br />

connect VoIP users via the Internet. Further, it is alleged that certain versions of SJPhone<br />

(prior to 1.65.377a) are prone to a Denial of Service flaw.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

SIP Client Detection<br />

CVE-2007-3351<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4106 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the following SIP client: \n %L \nThis protocol is used to<br />

connect VoIP users via the Internet.<br />

Family Internet Services 1065


Solution: N/A<br />

CVE Not available<br />

cPanel Remote Backup Information Disclosure<br />

<strong>PVS</strong> ID: 4107 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of cPanel that is either 10.9.1 or 11.4.19.\nThe remote version of this<br />

software is vulnerable to a cross-site scripting (XSS) flaw in the 'scgiwrap' script. An<br />

attacker exploiting this flaw would need to be able to convince a user to browse a malicious<br />

URI. In addition, this version of cPanel is vulnerable to a path disclosure flaw. Successful<br />

exploitation would result in the attacker gaining knowledge of the physical location of the<br />

different web files.<br />

Solution: Upgrade or patch according to vendor recommednations.<br />

CVE-2007-3367<br />

Ubuntu Server Detection<br />

<strong>PVS</strong> ID: 4108 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Ubuntu operating system. This information was gathered via<br />

the web server banner that looked like: \n %L<br />

Solution: Upgrade to the latest version of Ubuntu.<br />

CVE Not available<br />

CF<strong>Network</strong> < 129.20 DoS<br />

<strong>PVS</strong> ID: 4109 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running CF<strong>Network</strong> prior to 129.20. CF<strong>Network</strong> is an API for Mac OS X<br />

users that allows an abstraction of common network protocols. This version of CF<strong>Network</strong><br />

is prone to a Denial of Service (DoS) flaw. An attacker exploiting this flaw would be able<br />

to crash the application utilizing CF<strong>Network</strong>. The reported version of CF<strong>Network</strong> is: \n %L<br />

Solution: Upgrade to version 129.20 or higher.<br />

CVE-2007-0464<br />

Limewire Server Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4110 FAMILY: Peer-To-Peer File Sharing<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 1066


Description: Synopsis :\n\nThe remote host is running client software that may be considered<br />

questionable.\n\nThe remote host is running the Limewire server.\nLimewire is a P2P<br />

application that allows users to quickly download files from multiple locations.<br />

Solution: Ensure that Limewire is allowed with respect to corporate policies and guidelines.<br />

CVE Not available<br />

FuseTalk Multiple XSS Vulnerabilities<br />

<strong>PVS</strong> ID: 4111 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:25553<br />

Description: Synopsis :\n\nThe remote web server contains a ColdFusion script that is susceptible to<br />

multiple cross-site scripting attacks.\n\nThe remote host is running FuseTalk, a discussion<br />

forum implemented in ColdFusion. The version of FuseTalk installed on the remote host<br />

fails to properly sanitize user-supplied input to several parameters and scripts before using<br />

it to generate dynamic content. An unauthenticated remote attacker may be able to leverage<br />

this issue to inject arbitrary HTML or script code into a user's browser to be executed<br />

within the security context of the affected site.<br />

Solution: No solution is known at this time.<br />

CVE-2007-3339<br />

FuseTalk txForumID Parameter SQL Injection<br />

<strong>PVS</strong> ID: 4112 FAMILY: CGI RISK: HIGH NESSUS ID:25548<br />

Description: Synopsis :\n\nThe remote web server contains a ColdFusion script that is prone to a SQL<br />

injection attack.\n\nThe remote host is running FuseTalk, a discussion forum implemented<br />

in ColdFusion. The version of FuseTalk installed on the remote host fails to properly<br />

sanitize user-supplied input to the 'txForumID' parameter before using it in the<br />

'forum/include/error/forumerror.cfm' script in database queries. An unauthenticated remote<br />

attacker can leverage this issue to launch SQL injection attacks against the affected<br />

application.<br />

Solution: No solution is known at this time.<br />

Calendarix <<br />

CVE-2007-3273<br />

<strong>PVS</strong> ID: 4113 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:25567<br />

Description: Synopsis :\n\nThe remote web server contains a PHP script that is prone to SQL injection<br />

attacks.\n\nThe remote host is running Calendarix, a free web-based calendar application<br />

written in PHP. The version of Calendarix installed on the remote host fails to sanitize<br />

input to the 'month' and 'year' parameters of the 'calendar.php' script before using it in<br />

database queries. Provided PHP's 'magic_quotes_gpc' setting is disabled, an<br />

Family Internet Services 1067


unauthenticated attacker can exploit these flaws to manipulate database queries, which may<br />

lead to disclosure of sensitive information, modification of data or attacks against the<br />

underlying database.<br />

Solution: Upgrade to a version of higher than 0.7.20070307.<br />

CVE-2007-3183<br />

WordPress < 2.2.1 _wp_attached_file Metadata Unrestricted File Upload<br />

<strong>PVS</strong> ID: 4114 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a script injection attack.\n\nThe version of<br />

WordPress installed on the remote host is vulnerable to a file upload attack. An attacker<br />

exploiting this flaw would only need to be able to send custom queries to the 'wp-app.php'<br />

or 'app.php' script. Successful exploitation would result in the attacker uploading arbitrary<br />

code that could then be executed with the privileges of the web server. The path to the<br />

vulnerable version of WordPress is:\n%P<br />

Solution: Upgrade to version 2.2.1 or higher.<br />

CVE-2007-3543<br />

Ingres Communications Server Detection<br />

<strong>PVS</strong> ID: 4115 FAMILY: Database RISK: INFO NESSUS ID:25572<br />

Description: Synopsis :\n\nA database service is listening on the remote host.\n\n The remote service is<br />

an Ingres Communications Server, also known as a Net Server. This is the main process<br />

component of Ingres Net and monitors communications between applications and DBMS<br />

servers.<br />

Solution: Limit incoming traffic to this port if desired.<br />

CVE Not available<br />

TrendMicro OfficeScan < 8.0.0.1042 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4116 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a TrendMicro OfficeScan server. This version is reported to be vulnerable to<br />

multiple flaws. The more serious of these flaws involves a buffer overflow. An attacker<br />

exploiting these flaws would be able to execute arbitrary code on the remote OfficeScan<br />

server.<br />

Solution: Upgrade to version 8.0.0.1042 or higher.<br />

CVE-2007-3454<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1068


Kaspersky Anti-Spam < 3.0.0 [0274] Authentication Bypass<br />

<strong>PVS</strong> ID: 4117 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a flaw that allows for the<br />

bypassing of authentication.\n\nThe remote host is running the Kaspersky<br />

Anti-Spam server. This version of Anti-spam is vulnerable to a flaw where<br />

unauthenticated users can gain access to confidential data. The details of the<br />

flaw are currently unknown; however, it is believed that a successful attack<br />

would give an attacker access to confidential data. The version of the remote<br />

server is: \n %L<br />

Solution: Upgrade to version 3.0.0 [0274] or higher.<br />

CVE-2007-3502<br />

ALT-N MDaemon < 9.6.1 DomainPOP Malformed Message DoS<br />

<strong>PVS</strong> ID: 4118 FAMILY: POP Server RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS)<br />

attack.\n\nThe remote host is running the Alt-N MDaemon mail server. This is a<br />

mail server for the Microsoft Windows platform. This version of MDaemon is<br />

vulnerable to a flaw where a remote attacker can cause the mail service to crash. An<br />

attacker exploiting this flaw would only need to be able to connect to the POP3 port<br />

of the server (typically 110). Successful exploitation would result in services being<br />

denied to valid users.<br />

Solution: Upgrade to version 9.6.1 or higher.<br />

CVE-2007-3622<br />

Vulnerabilities in .NET Framework Could Allow Remote Code Execution (931212)<br />

<strong>PVS</strong> ID: 4119 FAMILY: CGI RISK: HIGH NESSUS ID:25691<br />

Description: Synopsis :\n\nThe remote .NET Framework is vulnerable to code execution attack.\n\nThe<br />

remote host is running a version of the ASP.NET framework that contains multiple<br />

vulnerabilities :\n\n- PE Loader Vulnerability: could allow an attacker to execute arbitrary<br />

code with the privilege of the logged-on user;\n\n- ASP.NET NULL Byte Termination<br />

Vulnerability: could allow an attacker to retrieve the content of the web server;\n\n- JIT<br />

Compiler Vulnerability: could allow an attacker to execute arbitrary code with the privilege<br />

of the logged-on user.\nIAVA Reference : 2007-A-0037\nSTIG Finding Severity :<br />

Category II<br />

Solution: Microsoft has released a set of patches for .NET Framework 1.0, 1.1 and 2.0.<br />

CVE-2007-0043<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Vulnerabilities in .NET Framework Could Allow Remote Code Execution (931212)<br />

Family Internet Services 1069


<strong>PVS</strong> ID: 4120 FAMILY: CGI RISK: HIGH NESSUS ID:25691<br />

Description: Synopsis :\n\nThe remote .NET Framework is vulnerable to code execution attack.\n\nThe<br />

remote host is running a version of the ASP.NET framework that contains multiple<br />

vulnerabilities :\n\n- PE Loader Vulnerability: could allow an attacker to execute arbitrary<br />

code with the privilege of the logged-on user;\n\n- ASP.NET NULL Byte Termination<br />

Vulnerability: could allow an attacker to retrieve the content of the web server;\n\n- JIT<br />

Compiler Vulnerability: could allow an attacker to execute arbitrary code with the privilege<br />

of the logged-on user.\nIAVA Reference : 2007-A-0037\nSTIG Finding Severity :<br />

Category II<br />

Solution: Microsoft has released a set of patches for .NET Framework 1.0, 1.1 and 2.0.<br />

CVE-2007-0043<br />

Vulnerabilities in .NET Framework Could Allow Remote Code Execution (931212)<br />

<strong>PVS</strong> ID: 4121 FAMILY: CGI RISK: HIGH NESSUS ID:25691<br />

Description: Synopsis :\n\nThe remote .NET Framework is vulnerable to code execution attack.\n\nThe<br />

remote host is running a version of the ASP.NET framework that contains multiple<br />

vulnerabilities :\n\n- PE Loader Vulnerability: could allow an attacker to execute arbitrary<br />

code with the privilege of the logged-on user;\n\n- ASP.NET NULL Byte Termination<br />

Vulnerability: could allow an attacker to retrieve the content of the web server;\n\n- JIT<br />

Compiler Vulnerability: could allow an attacker to execute arbitrary code with the privilege<br />

of the logged-on user.\nIAVA Reference : 2007-A-0037\nSTIG Finding Severity :<br />

Category II<br />

Solution: Microsoft has released a set of patches for .NET Framework 1.0, 1.1 and 2.0.<br />

CVE-2007-0043<br />

Potential SPAM Server Detection<br />

<strong>PVS</strong> ID: 4122 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote server is forwarding email in a manner consistent with many SPAM/UCE<br />

servers. The SMTP header that <strong>PVS</strong> flagged on was: \n %L<br />

realtimeonly<br />

Solution: Ensure that this email server is authorized send SPAM/UCE emails.<br />

CVE Not available<br />

Potential SPAM Server Detection<br />

<strong>PVS</strong> ID: 4123 FAMILY: SMTP Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 1070


Description: The remote server is forwarding email in a manner consistent with many SPAM/UCE<br />

servers. The logged 'From' email address of the email was: \n %L<br />

Solution: Ensure that this email server is authorized to send SPAM/UCE emails.<br />

CVE Not available<br />

Potential SPAM Server Detection<br />

<strong>PVS</strong> ID: 4124 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote server is forwarding email in a manner consistent with many SPAM/UCE<br />

servers. The SMTP header which <strong>PVS</strong> flagged on was: \n %L<br />

Solution: Ensure that this email server is authorized to send SPAM/UCE emails.<br />

CVE Not available<br />

Potential SPAM Server Detection<br />

<strong>PVS</strong> ID: 4125 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote server is forwarding email in a manner consistent with many SPAM/UCE<br />

servers. The SMTP header that <strong>PVS</strong> flagged on was: \n %L<br />

Solution: Ensure that this email server is authorized to send SPAM/UCE emails.<br />

CVE Not available<br />

Potential SPAM Server Detection<br />

<strong>PVS</strong> ID: 4126 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote server is forwarding email in a manner consistent with many SPAM/UCE<br />

servers. A portion of the sent email includes: \n %L<br />

Solution: Ensure that this email server is authorized to send SPAM/UCE emails.<br />

CVE Not available<br />

Potential SPAM Server Detection<br />

<strong>PVS</strong> ID: 4127 FAMILY: SMTP Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 1071


Description: The remote server is forwarding email in a manner consistent with many SPAM/UCE<br />

servers. A portion of the sent email includes: \n %L<br />

Solution: Ensure that this email server is authorized to send SPAM/UCE emails.<br />

CVE Not available<br />

Microsoft .NET Framework Version Detection<br />

<strong>PVS</strong> ID: 4128 FAMILY: CGI RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Microsoft .NET Framework version %L<br />

Solution: Ensure that you are running the latest version of .NET Framework.<br />

CVE Not available<br />

Microsoft ASP.NET Version Detection<br />

<strong>PVS</strong> ID: 4129 FAMILY: CGI RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Microsoft ASP.NET version %L<br />

Solution: Ensure that you are running the latest version of ASP.NET.<br />

CVE Not available<br />

ClamAV < 0.91.0 Multiple RAR Content Parsing Vulnerabilities<br />

<strong>PVS</strong> ID: 4130 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the ClamAV antivirus client version %L\n\nThis version of ClamAV is<br />

vulnerable to a denial of service (DoS) attack when handling malformed RAR archive files.<br />

An attacker exploiting this flaw would only need the ability to send an email to the<br />

vulnerable system. Successful exploitation would result in the application crashing. Further,<br />

it has been alleged that it may be possible to execute arbitrary code on the remote machine.<br />

Solution: Upgrade to version 0.91.0 or higher.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

AVG AntiVirus < 7.5.476 avg7core.sys Local Privilege Escalation<br />

<strong>PVS</strong> ID: 4131 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a local privilege escalation flaw.\n\nThe<br />

remote host is running AVG Antivirus. This version of AVG is reported to be prone to a<br />

flaw where a local attacker can escalate privileges and gain administrative access to the<br />

application or system. An attacker exploiting this flaw would need to be locally<br />

authenticated. Successful exploitation would result in the attacker gaining SYSTEM access.<br />

Family Internet Services 1072


Solution: Upgrade to version 7.5.476 or higher.<br />

CVE-2007-3777<br />

QuickTime < 7.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4132 FAMILY: Web Clients RISK: HIGH NESSUS ID:25703<br />

Description: Synopsis : \n\nThe remote Windows host contains an application that is affected by<br />

multiple issues.\n\nThe version of QuickTime installed on the remote Windows host is<br />

older than 7.2. Such versions contain several vulnerabilities that may allow an attacker to<br />

execute arbitrary code on the remote host if he can trick the user to open a specially-crafted<br />

file with QuickTime. The reported version of QuickTime is: \n %L<br />

Solution: Either use QuickTime's Software Update preference to upgrade to the latest version or<br />

manually upgrade to version 7.2 or later.<br />

CVE-2007-2389<br />

SquirrelMail G/PGP Encryption Plugin <<br />

<strong>PVS</strong> ID: 4133 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an arbitrary 'command insertion'<br />

flaw.\n\nThe remote host is running the SquirrelMail web-based email software with GPG<br />

Encryption enabled. This version of the GPG Plugin is vulnerable to a flaw in the way that<br />

it parses user-supplied data. An attacker exploiting this flaw would be able to execute shell<br />

commands on the remote server with the permissions of the SquirrelMail server process.<br />

Solution: Upgrade to a version of GPG Plugin higher than 2.1.<br />

CVE-2006-4169<br />

Apple iPhone/iPad Detection<br />

<strong>PVS</strong> ID: 4134 FAMILY: Mobile Devices RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is an Apple iPhone, iPod, or iPad. For your information, the version of iOS<br />

installed on the remote mobile device is \n%L\n\n<br />

Solution: N/A<br />

CVE Not available<br />

Apple iPhone Mail Program Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4135 FAMILY: SMTP Clients RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1073


Description: The remote host is running the Apple iPhone Mail program version %L<br />

Solution: N/A<br />

CVE Not available<br />

paFileDB includes/search.php categories Parameter SQL Injection<br />

<strong>PVS</strong> ID: 4136 FAMILY: CGI RISK: HIGH NESSUS ID:25708<br />

Description: Synopsis :\n\nThe remote web server contains a PHP script that is prone to SQL a injection<br />

attack.\n\nThe version of paFileDB installed on the remote host fails to sanitize<br />

user-supplied input to the 'categories' parameter before using it in the 'includes/search.php'<br />

script to make database queries. An unauthenticated attacker can exploit this issue to<br />

manipulate database queries, which may lead to disclosure of sensitive information,<br />

modification of data or attacks against the underlying database.<br />

Solution: No solution is known at this time.<br />

CVE-2007-3808<br />

Curl < 7.16.4 Expired Certificate Access Restriction Bypass<br />

<strong>PVS</strong> ID: 4137 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may allow access to unauthorized websites via an expired<br />

certificate.\n\nThe remote host is running Curl, a download client for various protocols.<br />

This version of Curl is vulnerable to an authentication flaw in the GnuTLS certificate<br />

verification routine. An attacker exploiting this flaw would be able to use an expired<br />

certificate.<br />

Solution: Upgrade to version 7.16.4 or higher.<br />

CVE-2007-3564<br />

IBM AppScan Detection<br />

<strong>PVS</strong> ID: 4138 FAMILY: Policy<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote server is running an IBM AppScan web scanner. AppScan<br />

is a security tool that allows security staff and administrators to automate web-based attacks<br />

and exploits against web servers. The reported version is: '%L'<br />

Solution: Ensure that this application is authorized according to corporate policies and guidelines.<br />

CVE Not available<br />

Tivoli Provisioning Manager <<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1074


<strong>PVS</strong> ID: 4139 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running the IBM 'Tivoli Provisioning Manager for OS Deployment' version<br />

%L\nThis version of the software is vulnerable to a flaw in the way that it handles<br />

malformed TFTP requests. An attacker exploiting this flaw can cause a crash that would<br />

affect all of the Tivoli services on the server. An attacker exploiting this flaw would need to<br />

be able to send malformed TFTP requests to the server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2007-3268<br />

Firefox < 2.0.0.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4140 FAMILY: Web Clients RISK: HIGH NESSUS ID:25735<br />

Description: Synopsis :\n\nThe remote Windows host contains a web browser that is affected by<br />

multiple vulnerabilities.\n\nThe installed version of Firefox is affected by various security<br />

issues, one of which may lead to execution of arbitrary code on the affected host subject to<br />

the user's privileges.<br />

Solution: Upgrade to version 1.5.0.12 / 2.0.0.4 or higher.<br />

CVE-2007-3734<br />

Ipswitch IMail Server < 2006.21 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4141 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:25737<br />

Description: Synopsis :\n\nThe remote mail server is affected by multiple vulnerabilities.\n\nThe remote<br />

host is running Ipswitch IMail, a commercial messaging and collaboration suite for<br />

Windows. According to its banner, the version of Ipswitch IMail installed on the remote<br />

host has several buffer overflows in its IMAP service component, one of which can be<br />

exploited to execute arbitrary code with SYSTEM privileges prior to authentication. In<br />

addition, there is also an denial of service issue that can cause the IM server to crash<br />

without authentication.<br />

Solution: Upgrade to version 2006.21 or higher.<br />

CVE-2007-3927<br />

Opera < 9.22 Torrent File Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4142 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is prone to a buffer overflow<br />

attack.\n\nThe version of Opera installed on the remote host reportedly contains a buffer<br />

overflow vulnerability that can be triggered by a malicious Torrent file. Successful<br />

exploitation requires that a user browse to a malicious URI and is enticed into opening a<br />

Family Internet Services 1075


malformed torrent file. Successful exploitation may allow a remote attacker to execute<br />

arbitrary code subject to the privileges of the user.<br />

Solution: Upgrade to version 9.22 or higher.<br />

CVE-2007-3929<br />

MD-Pro < 1.0.82 index.php topicid Parameter SQL Injection<br />

<strong>PVS</strong> ID: 4143 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running MD-Pro, an open-source blogging software. This version of MD-Pro is<br />

vulnerable to a flaw in the way that it parses user-supplied data. Specifically, failure to<br />

parse reserved SQL characters allows an attacker to inject SQL queries to the database. An<br />

attacker exploiting this flaw would only need the ability to post data to the affected web<br />

application. Successful exploitation would result in the attacker executing arbitrary SQL<br />

commands on the database server.<br />

Solution: Upgrade to version 1.0.82 or higher.<br />

CVE-2007-3938<br />

Trillian < 3.1.7.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4144 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host contains an instant messenging application that is affected<br />

by a buffer overflow vulnerability.\n\nThe version of Trillian installed on the remote host<br />

reportedly is affected by a buffer overflow issue involving improper handling of 'aim:' URI<br />

strings. A remote attacker may be able to leverage these issues to execute arbitrary code as<br />

the current user.<br />

Solution: Upgrade to version 3.1.7.0 or higher.<br />

CVE-2007-3833<br />

Panda Antivirus Agent Detection<br />

<strong>PVS</strong> ID: 4145 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Panda Antivirus version %L<br />

Solution: N/A<br />

CVE Not available<br />

MySQL < 5.0.45 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4146 FAMILY: Database<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:25759<br />

Family Internet Services 1076


Description: Synopsis :\n\nThe remote database server is susceptible to multiple attacks.\n\nThe version<br />

of MySQL installed on the remote host is reportedly affected by a denial of service<br />

vulnerability that can lead to a server crash with a specially-crafted password packet. It is<br />

also affected by a privilege escalation vulnerability because 'CREATE TABLE LIKE' does<br />

not require any privileges on the source table, which allows an attacker to create arbitrary<br />

tables using the affected application.<br />

Solution: Upgrade to version 5.0.45 or higher.<br />

CVE-2007-3782<br />

ISC BIND < 9.5.0a6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4147 FAMILY: DNS Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of BIND DNS Server prior to 9.4.1-P1. This version of BIND is<br />

vulnerable to a number of flaws that would allow cache poisoning and Denial of Service<br />

(DoS) attacks. An attacker exploiting these flaws would need to be able to manipulate the<br />

vulnerable DNS server to contact a malicious DNS server. Successful exploitation would<br />

lead to cache-poisoning attacks or a loss of availability.<br />

Solution: Upgrade to version 9.5.0a6 or higher.<br />

CVE-2007-2926<br />

Kerio MailServer < 6.4.1 Attachment Filter Unspecified Issue<br />

<strong>PVS</strong> ID: 4148 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an unspecified vulnerability in its filtering<br />

mechanism.\n\nThe remote host is running Kerio MailServer version 6.4.0 or lower. There<br />

is a flaw in the remote version of this server. The details of the flaw are currently unknown;<br />

however, it is alleged that the flaw would lead to remote compromise.<br />

Solution: Upgrade to version 6.4.1 or higher.<br />

Bandersnatch <<br />

CVE-2007-3993<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4149 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote<br />

server is running Bandersnatch, an open-source PHP application that generates Jabber<br />

usage statistics. This version of Bandersnatch is vulnerable to a flaw in the way that it<br />

parses multiple user-supplied variables. An attacker exploiting these flaws can inject script<br />

and SQL code that would be executed on the server with the permissions of the web server.<br />

Family Internet Services 1077


Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2007-3910<br />

LinPHA include/img_view.class.php < 1.3.2 order Parameter SQL Injection<br />

<strong>PVS</strong> ID: 4150 FAMILY: CGI RISK: HIGH NESSUS ID:25811<br />

Description: Synopsis :\n\nThe remote web server contains a PHP script that is prone to a SQL injection<br />

attack.\n\n The remote host is running LinPHA, a web photo gallery application written in<br />

PHP. The version of LinPHA installed on the remote host fails to sanitize input to the<br />

'order' parameter of the 'new_images.php' script before using it in the 'setSql' function in<br />

'include/img_view.class.php' in a database query. Regardless of PHP's 'magic_quotes_gpc'<br />

setting, an unauthenticated attacker may be able to exploit this issue to manipulate such<br />

queries, leading to disclosure of sensitive information, modification of data or attacks<br />

against the underlying database.<br />

Solution: Upgrade to version 1.3.2 or higher.<br />

CVE-2007-4053<br />

Firefox < 2.0.0.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4151 FAMILY: Web Clients RISK: HIGH NESSUS ID:25820<br />

Description: Synopsis :\n\nThe remote Windows host contains a web browser that is affected by<br />

multiple vulnerabilities.\n\nThe installed version of Firefox allows unescaped URIs to be<br />

passed to external programs, may lead to execution of arbitrary code on the affected host<br />

subject to the user's privileges, and could also allow privilege escalation attacks against<br />

addons that create 'about:blank' windows and populate them in certain ways.<br />

Solution: Upgrade to version 2.0.0.6 or higher.<br />

CVE-2007-3844<br />

Mozilla Thunderbird < 1.5.0.13 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4152 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a script injection attack.\n\nThe remote<br />

version of Mozilla Thunderbird suffers from a flaw in the way that it handles 'about:blank'<br />

Javascript code. An attacker exploiting this flaw would need to be able to convince a<br />

Thunderbird user to open an email that populated 'about:blank' with malicious Javascript<br />

code. Successful exploitation would result in the attacker executing arbitrary Javascript on<br />

the local machine.<br />

Solution: Upgrade to version 1.5.0.13 or higher.<br />

CVE-2007-3844<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1078


Mozilla SeaMonkey < 1.1.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4153 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote Windows host contains a web browser that is affected by<br />

multiple vulnerabilities.\n\nThe installed version of SeaMonkey allows unescaped URIs to<br />

be passed to external programs, may lead to execution of arbitrary code on the affected host<br />

subject to the user's privileges, and could also allow privilege escalation attacks against<br />

addons that create 'about:blank' windows and populate them in certain ways.<br />

Solution: Upgrade to version 1.1.4 or higher.<br />

CVE-2007-3844<br />

Kaspersky Ani-Spam < 3.0.0 [0278] File Permission Weakness Local Privilege Escalation<br />

<strong>PVS</strong> ID: 4154 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a local flaw due to the way that it creates<br />

local file permissions.\n\nThe remote host is running the Kaspersky Anti-spam server. This<br />

version of Kaspersky is vulnerable to a local flaw. Specifically, it is alleged that the<br />

application creates local files with permissions that would allow a local attacker the ability<br />

to either gain access to confidential data or subvert the integrity of the application. The<br />

details of the flaw are currently unknown; however, the vendor has acknowledged the flaw.<br />

An attacker exploiting these flaws would need local access to the machine. Successful<br />

exploitation would result in the attacker gaining access to confidential data or processes.<br />

Solution: Upgrade to version 3.0.0 [0278] or higher.<br />

CVE-2007-4206<br />

Microsoft Office Version Information<br />

<strong>PVS</strong> ID: 4155 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Microsoft Office suite of business tools. The exact version<br />

is \n%L<br />

Solution: N/A<br />

CVE Not available<br />

YouSendIt Client Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4156 FAMILY: Internet Services RISK: LOW NESSUS ID:Not Available<br />

Description: The remote client is utilizing the 'YouSendIt' service. YouSendIt allows users to send<br />

large attachments via email. YouSendIt is a web-based service. Given this, internal<br />

corporate users can use this service to bypass outbound email security.<br />

Family Internet Services 1079


Solution: Ensure that such usage is in alignment with corporate policies regarding remote access.<br />

CVE Not available<br />

SendThisFile Client Detection<br />

<strong>PVS</strong> ID: 4157 FAMILY: Internet Services RISK: LOW NESSUS ID:Not Available<br />

Description: The remote client is utilizing the 'SendThisFile' service. SendThisFile allows users to send<br />

large attachments via email. SendThisFile is a web-based service. Given this, internal<br />

corporate users can use this service to bypass outbound email security.<br />

Solution: Ensure that such usage is in alignment with corporate policies regarding remote access.<br />

CVE Not available<br />

DropSend Client Detection<br />

<strong>PVS</strong> ID: 4158 FAMILY: Internet Services RISK: LOW NESSUS ID:Not Available<br />

Description: The remote client is utilizing the 'DropSend' service. DropSend allows users to send<br />

large attachments via email. DropSend is a web-based service. Given this, internal<br />

corporate users can use this service to bypass outbound email security.<br />

Solution: Ensure that such usage is in alignment with corporate policies regarding remote access.<br />

CVE Not available<br />

AIMExpress Client Detection<br />

<strong>PVS</strong> ID: 4159 FAMILY: Policy RISK: LOW NESSUS ID:Not Available<br />

Description: The remote client is utilizing the 'AIMExpress' service. AIMExpress allows users to utilize<br />

a chat client (AOL Instant Messenger) via a web browser.<br />

Solution: Ensure that such usage is in alignment with corporate policies regarding remote access.<br />

CVE Not available<br />

proxy.org Client Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4160 FAMILY: Policy RISK: LOW NESSUS ID:Not Available<br />

Description: The remote client is utilizing the 'proxy.org' service. proxy.org allows users to bypass<br />

corporate measures that restrict or monitor web usage. The site which is being 'anonymized<br />

is': \n %L<br />

Solution: Ensure that such usage is in alignment with corporate policies regarding remote access.<br />

Family Internet Services 1080


CVE Not available<br />

Box.net File Sharing Detection<br />

<strong>PVS</strong> ID: 4161 FAMILY: Internet Services RISK: LOW NESSUS ID:Not Available<br />

Description: The remote client is utilizing the 'Box.net' service. Box.net allows users to upload files to<br />

an external web server that can then be accessed from the Internet. Box.net allows internal<br />

users to store resources on an Internet server and then share or access the documents from<br />

any location.<br />

Solution: Ensure that such usage is in alignment with corporate policies regarding remote access.<br />

CVE Not available<br />

Help Center Live < 2.1.5 Admin Authentication Bypass<br />

<strong>PVS</strong> ID: 4162 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote web server is running Help Center Live, a help desk<br />

application written in PHP. The remote version of this software is vulnerable to a flaw in<br />

the way that it handles access to certain administrative pages. Specifically,<br />

'admin/departments.php' and 'admin/operators.php' fails to block access to unauthenticated<br />

users. An attacker exploiting this flaw would be able to gain administrative access to the<br />

application.<br />

Solution: Upgrade to a version 2.1.5 or higher.<br />

Serendipity <<br />

CVE-2007-4240<br />

<strong>PVS</strong> ID: 4163 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication\n\nThe remote host is running Serendipity, a web log application. This<br />

version of Serendipity is vulnerable to a flaw where authenticated users can access<br />

restricted 'administrative' functions. An attacker exploiting this flaw would require a user<br />

ID and password to some portion of the web application. Successful exploitation would<br />

allow the user to gain limited administrative access.<br />

Solution: Upgrade to a version higher than 1.1.3 or 1.2-beta4.<br />

CVE-2007-4282<br />

MediaMax File Sharing Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4164 FAMILY: Internet Services RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 1081


Description: The remote client is utilizing the 'MediaMax' service. MediaMax allows users to upload<br />

files to an external web server that can then be accessed from the Internet. MediaMax<br />

allows internal users to store resources on an Internet server and then share or access the<br />

documents from any location. The user account associated with this session of MediaMax<br />

is: \n %L<br />

Solution: Ensure that such usage is in alignment with corporate policies regarding remote access.<br />

CVE Not available<br />

Sun ONE Web Server Version Detection<br />

<strong>PVS</strong> ID: 4165 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Sun ONE web server version %L<br />

Solution: N/A<br />

CVE Not available<br />

WinGate < 6.2.2 Invalid SMTP State Remote DoS<br />

<strong>PVS</strong> ID: 4166 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:25879<br />

Description: Synopsis :\n\nThe remote proxy is affected by a denial of service vulnerability.\n\nThe<br />

remote host appears to be running WinGate, a Windows application for managing and<br />

securing Internet access. The version of WinGate installed on the remote host fails to<br />

sanitize user-supplied input to its SMTP server component of format strings before using it<br />

to log a problem. By connecting to the service and issuing commands the server was not<br />

expecting, a remote attacker may be able to force the service to an invalid state and crash<br />

the WinGate service itself, thereby denying service to legitimate users.<br />

Solution: Upgrade to version 6.2.2 or higher.<br />

Apache Tomcat <<br />

CVE-2007-4335<br />

<strong>PVS</strong> ID: 4167 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the Apache Tomcat server. This version of Tomcat is vulnerable to two distinct<br />

classes of flaws. First, the application is vulnerable to a Cross-Site Scripting flaw in the<br />

'aliases' parameter of the '/host-manager/html/add' script. Second, the application is<br />

vulnerable to a number of flaws that would reveal sensitive information. An attacker<br />

exploiting these flaws would be able to either execute code within client browsers or gain<br />

information that would be useful for further attacks against Tomcat. The reported version<br />

of Tomcat is: \n %L<br />

Family Internet Services 1082


Solution: Upgrade to version 5.5.25, 6.0.14 or higher.<br />

CVE-2007-3386<br />

Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (940965)<br />

<strong>PVS</strong> ID: 4168 FAMILY: Generic RISK: HIGH NESSUS ID:25882<br />

Description: Synopsis :\n\nArbitrary code can be executed on the remote host through Microsoft<br />

Excel.\n\nThe remote host is running a version of Microsoft Excel that is subject to various<br />

flaws that may allow arbitrary code to be run. An attacker may use this to execute arbitrary<br />

code on this host. To succeed, the attacker would have to send a rogue file to a user of the<br />

remote computer and have it open it with Microsoft Excel.<br />

Solution: Microsoft has released a set of patches for Excel 2000, XP and 2003.<br />

CVE-2007-3890<br />

Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (940965)<br />

<strong>PVS</strong> ID: 4169 FAMILY: Generic RISK: HIGH NESSUS ID:25882<br />

Description: Synopsis :\n\nArbitrary code can be executed on the remote host through Microsoft<br />

Excel.\n\nThe remote host is running a version of Microsoft Excel that is subject to various<br />

flaws that may allow arbitrary code to be run. An attacker may use this to execute arbitrary<br />

code on this host. To succeed, the attacker would have to send a rogue file to a user of the<br />

remote computer and have it open it with Microsoft Excel.<br />

Solution: Microsoft has released a set of patches for Excel 2000, XP and 2003.<br />

CVE-2007-3890<br />

Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (940965)<br />

<strong>PVS</strong> ID: 4170 FAMILY: Generic RISK: HIGH NESSUS ID:25882<br />

Description: Synopsis :\n\nArbitrary code can be executed on the remote host through Microsoft<br />

Excel.\n\nThe remote host is running a version of Microsoft Excel that is subject to various<br />

flaws that may allow arbitrary code to be run. An attacker may use this to execute arbitrary<br />

code on this host. To succeed, the attacker would have to send a rogue file to a user of the<br />

remote computer and have it open it with Microsoft Excel.<br />

Solution: Microsoft has released a set of patches for Excel 2000, XP and 2003.<br />

CVE-2007-3890<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Vulnerability in Windows Media Player Could Allow Remote Code Execution (936782)<br />

<strong>PVS</strong> ID: 4171 FAMILY: Web Clients RISK: HIGH NESSUS ID:25885<br />

Family Internet Services 1083


Description: Synopsis :\n\nArbitrary code can be executed on the remote host through Windows Media<br />

Player.\n\nThe remote host is running Windows Media Player. There is a vulnerability in<br />

the remote version of this software that may allow an attacker to execute arbitrary code on<br />

the remote host. To exploit this flaw, one attacker would need to set up a rogue PNG image<br />

and send it to a victim on the remote host.<br />

Solution: Microsoft has released a set of patches for Windows 2000, XP, 2003 and Vista.<br />

CVE-2007-3035<br />

Vulnerability in Windows Media Player Could Allow Remote Code Execution (936782)<br />

<strong>PVS</strong> ID: 4172 FAMILY: Web Clients RISK: HIGH NESSUS ID:25885<br />

Description: Synopsis :\n\nArbitrary code can be executed on the remote host through Windows Media<br />

Player.\n\nThe remote host is running Windows Media Player. There is a vulnerability in<br />

the remote version of this software that may allow an attacker to execute arbitrary code on<br />

the remote host. To exploit this flaw, one attacker would need to set up a rogue PNG image<br />

and send it to a victim on the remote host.<br />

Solution: Microsoft has released a set of patches for Windows 2000, XP, 2003 and Vista.<br />

CVE-2007-3035<br />

Vulnerability in Windows Media Player Could Allow Remote Code Execution (936782)<br />

<strong>PVS</strong> ID: 4173 FAMILY: Web Clients RISK: HIGH NESSUS ID:25885<br />

Description: Synopsis :\n\nArbitrary code can be executed on the remote host through Windows Media<br />

Player.\n\nThe remote host is running Windows Media Player. There is a vulnerability in<br />

the remote version of this software that may allow an attacker to execute arbitrary code on<br />

the remote host. To exploit this flaw, one attacker would need to set up a rogue PNG image<br />

and send it to a victim on the remote host.<br />

Solution: Microsoft has released a set of patches for Windows 2000, XP, 2003 and Vista.<br />

CVE-2007-3035<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Vulnerability in Windows Media Player Could Allow Remote Code Execution (936782)<br />

<strong>PVS</strong> ID: 4174 FAMILY: Web Clients RISK: HIGH NESSUS ID:25885<br />

Description: Synopsis :\n\nArbitrary code can be executed on the remote host through Windows Media<br />

Player.\n\nThe remote host is running Windows Media Player. There is a vulnerability in<br />

the remote version of this software that may allow an attacker to execute arbitrary code on<br />

the remote host. To exploit this flaw, one attacker would need to set up a rogue PNG image<br />

and send it to a victim on the remote host.<br />

Solution: Microsoft has released a set of patches for Windows 2000, XP, 2003 and Vista.<br />

Family Internet Services 1084


CVE-2007-3035<br />

Vulnerability in Windows Media Player Could Allow Remote Code Execution (936782)<br />

<strong>PVS</strong> ID: 4175 FAMILY: Web Clients RISK: HIGH NESSUS ID:25885<br />

Description: Synopsis :\n\nArbitrary code can be executed on the remote host through Windows Media<br />

Player.\n\nThe remote host is running Windows Media Player. There is a vulnerability in<br />

the remote version of this software that may allow an attacker to execute arbitrary code on<br />

the remote host. To exploit this flaw, one attacker would need to set up a rogue PNG image<br />

and send it to a victim on the remote host.<br />

Solution: Microsoft has released a set of patches for Windows 2000, XP, 2003 and Vista.<br />

CVE-2007-3035<br />

Vulnerability in Windows Media Player Could Allow Remote Code Execution (936782)<br />

<strong>PVS</strong> ID: 4176 FAMILY: Web Clients RISK: HIGH NESSUS ID:25885<br />

Description: Synopsis :\n\nArbitrary code can be executed on the remote host through Windows Media<br />

Player.\n\nThe remote host is running Windows Media Player. There is a vulnerability in<br />

the remote version of this software that may allow an attacker to execute arbitrary code on<br />

the remote host. To exploit this flaw, one attacker would need to set up a rogue PNG image<br />

and send it to a victim on the remote host.<br />

Solution: Microsoft has released a set of patches for Windows 2000, XP, 2003 and Vista.<br />

CVE-2007-3035<br />

Opera < 9.23 Arbitrary Code Execution<br />

<strong>PVS</strong> ID: 4177 FAMILY: Web Clients RISK: HIGH NESSUS ID:25900<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is affected by an arbitrary code<br />

execution vulnerability.\n\n The version of Opera installed on the remote host reportedly<br />

allows for execution of arbitrary code via specially-crafted Javascript if a user can be<br />

tricked into visiting a malicious site.<br />

Solution: Upgrade to version 9.23 or higher.<br />

Altiris Client Detection<br />

CVE-2007-4367<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4178 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is running Altiris. Altiris is a product for managing software installations<br />

across an enterprise network. With an Altiris client, it is possible for an Altiris server to<br />

remotely manage software configurations on the local machine.<br />

Family Internet Services 1085


Solution: Ensure that such usage is in alignment with corporate policies regarding remote access.<br />

Altiris Server Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 4179 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is running Altiris Server. Altiris is a product for managing software<br />

installations across an enterprise network. As an Altiris server, this machine may be<br />

managing the software configurations of multiple client machines. The reported version<br />

number was: \n %L<br />

Solution: Ensure that such usage is in alignment with corporate policies regarding remote access.<br />

CVE Not available<br />

Altiris Deployment Solution < 6.8 SP2 Aclient Log File Viewer Local Privilege Escalation<br />

<strong>PVS</strong> ID: 4180 FAMILY: Generic RISK: HIGH NESSUS ID:25904<br />

Description: Synopsis :\n\nThe remote Windows host has a program that is prone to a local privilege<br />

escalation attack.\n\nThe version of the Altiris Client Agent (aclient) installed on the<br />

remote host reportedly contains a flaw where local users can use the Log File Viewer to<br />

open or execute files on the affected host with SYSTEM privileges.<br />

Solution: Upgrade to version 6.8 SP2 or higher.<br />

CVE-2007-4380<br />

ZoneAlarm Pro < 7.0.362.000 Local Privilege Escalation<br />

<strong>PVS</strong> ID: 4181 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple local 'privilege escalation'<br />

flaws.\n\nThe remote host is running ZoneAlarm, a firewall for Windows. The<br />

vendor has released version 7.0.362.000 of ZoneAlarm. This version corrects a flaw<br />

where a local user can disable the firewall or escalate privileges due to incorrect<br />

access control lists on local configuration files and device drivers.<br />

Solution: Upgrade to version 7.0.362.000 or higher.<br />

CVE-2005-2932<br />

EMC Legato <strong>Network</strong>er 'nsrexecd.exe' Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4182 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running EMC Legato <strong>Network</strong>er, an enterprise application that enables centralized file<br />

management, backup and more. This version of Legato is vulnerable to a flaw in the<br />

Family Internet Services 1086


'nsrexecd.exe' application. An attacker exploiting this flaw would only require the ability to<br />

connect to the nsrexecd.exe listening port (111/TCP). Successful exploitation would result<br />

in the execution of arbitrary code.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2007-3618<br />

ClamAV < 0.91.2 Multiple Remote DoS<br />

<strong>PVS</strong> ID: 4183 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running the ClamAV anti-virus client version '%L'\n\nThis version of<br />

ClamAV is vulnerable to multiple denial of service (DoS) attacks when handling<br />

malformed files. An attacker exploiting this flaw would only need the ability to send an<br />

email to the vulnerable system. Successful exploitation would result in the application<br />

crashing.<br />

Solution: Upgrade to version 0.91.2 or higher.<br />

CVE-2007-4560<br />

Potential SPAM Server Detection<br />

<strong>PVS</strong> ID: 4184 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote server is forwarding email in a manner consistent with many SPAM/UCE<br />

servers. The SMTP header that triggered this alert was\n%P\n\n<strong>PVS</strong> observed the computer<br />

connecting to a remote SMTP server and attempting to send an email that was denied for<br />

the reason denoted above.<br />

Solution: Ensure that this email server is authorized to send SPAM/UCE emails.<br />

CVE Not available<br />

Potential SPAM Server Detection<br />

<strong>PVS</strong> ID: 4185 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote server is forwarding email in a manner consistent with many SPAM/UCE<br />

servers. The SMTP header that triggered this alert is\n%L<br />

realtimeonly<br />

Solution: Ensure that this email server is authorized to send SPAM/UCE emails.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1087


Lotus Notes < 7.0.2 ntmulti.exe Local Privilege Escalation<br />

<strong>PVS</strong> ID: 4186 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a local 'privilege escalation' flaw.\n\nThe<br />

remote host is running the Lotus Notes email client. The reported version is less than 7.0.2.<br />

There is a flaw in this version of Lotus Notes that would allow a local user to replace the<br />

'ntmulti.exe' file. After replacing the executable, the local attacker would have their code<br />

executed with SYSTEM level privileges. The reported version of Lotus Notes is: \n %L<br />

Solution: Upgrade to version 7.0.2 or higher.<br />

CVE Not available<br />

Cache Database Version Detection<br />

<strong>PVS</strong> ID: 4187 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Cache database server version %L<br />

Solution: N/A<br />

CVE Not available<br />

TrendMicro Server Detection<br />

<strong>PVS</strong> ID: 4188 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a TrendMicro Antivirus server.<br />

Solution: N/A<br />

CVE Not available<br />

Cache Database Version Detection<br />

<strong>PVS</strong> ID: 4189 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Cache database server version %L<br />

Solution: N/A<br />

CVE Not available<br />

Cache Database Server Redirection Vulnerability<br />

<strong>PVS</strong> ID: 4190 FAMILY: Database<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 1088


Description: Synopsis :\n\nThe remote host is vulnerable to unspecified remote attack vectors.\n\nThe<br />

remote host is running the Cache database server version %L\nThis version of Cache is<br />

reported to be prone to a flaw in the way that it handles redirection. While the details of the<br />

flaw are unknown, it is alleged that an attacker can modify data within the database without<br />

proper authorization. Successful exploitation would lead to the loss of data integrity.<br />

Solution: Upgrade to version 2007.1.0.369.0, 2007.1.1.420.0 or higher.<br />

CVE Not available<br />

Bugzilla Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4191 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nhe remote host is<br />

running Bugzilla, a bug-tracking software with a web interface. The version of Bugzilla on<br />

the remote host suffers from multiple flaws. An attacker exploiting these flaws would be<br />

able to inject HTML, execute arbitrary remote commands and disclose sensitive<br />

information.<br />

Solution: Upgrade to version 2.20.5, 2.22.3, 3.0.1, 3.1.1 or higher.<br />

CVE-2007-4543<br />

Helix Server < 11.1.4 RTSP Command Multiple Requires Overflow<br />

<strong>PVS</strong> ID: 4192 FAMILY: Generic RISK: HIGH NESSUS ID:25950<br />

Description: Synopsis :\n\nThe remote RTSP server is prone to a buffer overflow.\n\n The remote host is<br />

running Helix Server or Helix DNA Server, a media streaming server. The version of the<br />

Helix server installed on the remote host reportedly contains a heap overflow that is<br />

triggered using an RTSP command with multiple 'Require' headers. An unauthenticated<br />

remote attacker can leverage this flaw to execute arbitrary code subject to the privileges<br />

under which it operates, by default LOCAL SYSTEM on Windows.<br />

Solution: Upgrade to Helix Server / Helix DNA Server version 11.1.4 or higher.<br />

CVE-2007-4561<br />

Netopia Timbuktu Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4193 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Timbuktu, a remote management software. Systems running<br />

Timbuktu can both manage and be managed remotely. Further, the software supports<br />

tunneling, which allows a host to be accessed despite firewall policies that might attempt to<br />

block it. The email account associated with this Timbuktu software is\n%L<br />

Solution: Ensure that such software is authorized according to corporate policies and guidelines.<br />

Family Internet Services 1089


CVE Not available<br />

Netopia Timbuktu Detection<br />

<strong>PVS</strong> ID: 4194 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Timbuktu, a remote management software. Systems running<br />

Timbuktu can both manage and be managed remotely. Further, the software supports<br />

tunneling, which allows a host to be accessed despite firewall policies that might attempt to<br />

block it.<br />

Solution: Ensure that such software is authorized according to corporate policies and guidelines.<br />

CVE Not available<br />

ISC BIND < 8.4.7-P1 Outgoing Query Predictable DNS Query ID<br />

<strong>PVS</strong> ID: 4195 FAMILY: DNS Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote DNS server is vulnerable to a cache-poisoning attack.\n\nThe<br />

remote host is running a version of BIND DNS Server prior to 8.4.7-P1. This version of<br />

BIND is vulnerable to a flaw that would allow cache poisoning. An attacker exploiting this<br />

flaw would need to be able to manipulate the vulnerable DNS server into contacting a<br />

malicious DNS server. Successful exploitation would lead to a cache-poisoning attack.<br />

Solution: BIND 8 is no longer supported by ISC. Upgrade or patch according to vendor<br />

recommendations.<br />

CVE-2007-2930<br />

Windows Live Messenger Version Detection<br />

<strong>PVS</strong> ID: 4196 FAMILY: Internet Messengers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Windows Live Messenger version %L<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Windows Live Messenger < 8.1.0178 Video Processing Overflow<br />

<strong>PVS</strong> ID: 4197 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Windows Live Messenger version %L. This version of Windows Live Messenger<br />

is vulnerable to a flaw in the way that it processes video messages. An attacker exploiting<br />

this flaw would need to be able to initiate a chat session with a user running a vulnerable<br />

version of the software. Successful exploitation would result in the attacker executing<br />

Family Internet Services 1090


arbitrary code.<br />

Solution: Upgrade to version 8.1.0178 or higher.<br />

CVE-2007-2931<br />

Subversion (SVN) < 1.4.5 Directory Traversal Privilege Escalation<br />

<strong>PVS</strong> ID: 4198 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a directory traversal flaw.\n\nThe remote<br />

host is running Subversion, an open-source file management product. According to the<br />

version number, the remote system is reported to be vulnerable to a flaw where<br />

authenticated users can write to files outside the Subversion folders. By prepending '../' to a<br />

file name, an attacker can overwrite sensitive system files that may then be executed by a<br />

SYSTEM process. Given this, successful exploitation would likely result in the attacker<br />

gaining elevated access to the server hosting Subversion.<br />

Solution: Upgrade to version 1.4.5 or higher.<br />

CVE-2007-3846<br />

Yahoo! Messenger < 8.1.0.419 YVerInfo ActiveX Buffer Overflow<br />

<strong>PVS</strong> ID: 4199 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:25955<br />

Description: Synopsis :\n\nThe remote Windows host has an ActiveX control that is affected by a buffer<br />

overflow vulnerability.\n\n The remote host contains the 'YVerInfo' ActiveX control,<br />

distributed as part of the Yahoo! services suite typically downloaded with the installer for<br />

Yahoo! Messenger. The version of this control installed on the remote host reportedly<br />

contains a boundary error. If an attacker can trick a user on the affected host into visiting a<br />

specially-crafted web page, he may be able to leverage this issue to execute arbitrary code<br />

on the host subject to the user's privileges.<br />

Solution: Either disable the use of this ActiveX control from within Internet Explorer by setting its<br />

'kill' bit or upgrade to Yahoo! Messenger version 8.1.0.419 (version 2007.8.27.1 of the<br />

YVerInfo control itself) or higher.<br />

CVE-2007-4515<br />

EnterpriseDB Advanced Server Version Detection<br />

<strong>PVS</strong> ID: 4200 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running EnterpriseDB Advanced Server version: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1091


EnterpriseDB Advanced Server < 8.2.4.12 Version Detection<br />

<strong>PVS</strong> ID: 4201 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running EnterpriseDB Advanced Server version: \n %L \n\nThis version of<br />

EnterpriseDB is vulnerable to a remote Denial of Service attack. An attacker exploiting this<br />

flaw would need to be able to authenticate to the database. Successful exploitation would<br />

result in the service crashing and denying access to valid users.<br />

Solution: Upgrade to version 8.2.4.12 or higher.<br />

CVE-2007-4639<br />

PHP < 5.2.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4202 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120<br />

distinct security flaws impacting confidentiality, integrity and availability. The reported<br />

version of PHP is: \n %L<br />

Solution: Upgrade to version 5.2.4 or higher.<br />

MailMarshal <<br />

CVE-2007-3806<br />

<strong>PVS</strong> ID: 4203 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a directory traversal flaw.\n\nThe remote<br />

host is running MailMarshal Mail Server version 6.2.1 or lower. There is a flaw in the<br />

remote version of this server. An attacker can create an archive file such that upon opening,<br />

critical system files would be overwritten with files of the attacker's choice. Successful<br />

exploitation would result in the attacker replacing arbitrary files.<br />

Solution: Upgrade to a version higher than 6.2.1.<br />

CVE Not available<br />

iTunes < 7.4.0 MP4/AAC File covr atom Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4204 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running iTunes - an application for managing and listening to music media files. The<br />

version of iTunes client is %L. \nThis version of iTunes is vulnerable to a buffer overflow<br />

due to the way that it processes malformed MP4/AAC files. An attacker exploiting this<br />

Family Internet Services 1092


flaw would need to be able to entice an iTunes user into opening a malformed file.<br />

Successful exploitation would result in the attacker executing arbitrary code on the remote<br />

system.<br />

Solution: Upgrade to version 7.4.0 or higher.<br />

CVE-2007-3752<br />

Gallery < 2.2.3 Information Disclosure<br />

<strong>PVS</strong> ID: 4205 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to unspecified remote attack vectors.\n\nThe<br />

remote host is running Gallery, a web-based photo album application written in PHP. The<br />

version of Gallery installed on the remote host is lower than 2.2.3. The vendor has reported<br />

multiple security flaws in this version. It is alleged that a remote attacker can use these<br />

flaws to replace and/or modify program files.<br />

Solution: Upgrade to version 2.2.3 or higher.<br />

CVE-2007-4650<br />

Lighttpd < 1.4.18 mod_fastcgi HTTP Request Header Overflow<br />

<strong>PVS</strong> ID: 4206 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Lighttpd, a small web server. This version of Lighttpd is vulnerable to a buffer<br />

overflow via the 'mod_fastcgi' module. An attacker exploiting this flaw would only need<br />

the ability to send large, malformed requests to the 'mod_fastcgi' module. Successful<br />

exploitation would result in the attacker executing arbitrary code.<br />

Solution: Upgrade to 1.4.18 or higher.<br />

CVE-2007-4727<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Hexamail < 3.0.1.004 POP3 Service USER Command Overflow<br />

<strong>PVS</strong> ID: 4207 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Hexamail, an SMTP server, version %L\nThis version of Hexamail is vulnerable to<br />

a buffer overflow in its POP3 service when passed a large string to the 'USER' directive.<br />

An attacker exploiting this flaw would only need to be able to connect to the POP3 port<br />

(default TCP/110) on the remote server. Successful exploitation would result in the attacker<br />

executing arbitrary code.<br />

Solution: Upgrade to version 3.0.1.004 or higher.<br />

Family Internet Services 1093


CVE-2007-4646<br />

Samba < 3.0.26 idmap_ad.co Local Privilege Escalation<br />

<strong>PVS</strong> ID: 4208 FAMILY: Samba<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a local 'privilege escalation'<br />

flaw.\n\nAccording to its banner, the version of the Samba server installed on the remote<br />

host ('%L') is affected by a flaw where a local attacker can gain group-0 access. In order for<br />

the exploit to work, the local system must be configured to use Microsoft Active Directory<br />

and return a NULL value for the group ID. Successful exploitation would result in the local<br />

attacker gaining elevated access on the local machine.<br />

Solution: Upgrade to version 3.0.26 or higher.<br />

CVE-2007-4138<br />

OpenSSH < 4.7 Trusted X11 Cookie Connection Policy Bypass<br />

<strong>PVS</strong> ID: 4209 FAMILY: SSH RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a local 'privilege escalation' flaw.\n\nThe<br />

remote host is running a version of OpenSSH that is vulnerable to a flaw in the way that it<br />

handles local X11 cookies. It is alleged that an attacker exploiting this flaw would be able<br />

to execute SSH commands for which they are not authorized. The reported version of SSH<br />

is: \n %L<br />

Solution: Upgrade to version 4.7 or higher.<br />

CVE-2007-4752<br />

Vulnerability in Microsoft MSN Messenger and Windows Live Messenger Could Allow Remote Code<br />

Execution (942099)<br />

<strong>PVS</strong> ID: 4210 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:26019<br />

Description: Synopsis :\n\nArbitrary code can be executed on the remote host through MSN and<br />

Windows Live Messenger.\n\nThe remote host is running MSN Messenger or Windows<br />

Live Messenger. The version of Messenger used on the remote host is vulnerable to a<br />

remote buffer overflow in the way it handles webcam and video chat sessions. An attacker<br />

may exploit this vulnerability to execute arbitrary code on the remote host.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2007-2931<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Vulnerability in Microsoft MSN Messenger and Windows Live Messenger Could Allow Remote Code<br />

Execution (942099)<br />

Family Internet Services 1094


<strong>PVS</strong> ID: 4211 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:26019<br />

Description: Synopsis :\n\nArbitrary code can be executed on the remote host through MSN or Windows<br />

Live Messenger.\n\nThe remote host is running MSN Messenger or Windows Live<br />

Messenger. The version of Messenger used on the remote host is vulnerable to a remote<br />

buffer overflow in the way it handles webcam and video chat sessions. An attacker may<br />

exploit this vulnerability to execute arbitrary code on the remote host.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2007-2931<br />

Tor Tunnel 'End Point' Server Detection<br />

<strong>PVS</strong> ID: 4212 FAMILY: Policy<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote server is routing network traffic over the Tor Tunnel<br />

network. As a TOR 'end point' router, this server accepts and processes anonymized traffic<br />

over the Tor network.<br />

Solution: Ensure that the usage of the Tor network is in alignment with corporate polices and<br />

guidelines.<br />

CVE Not available<br />

Plesk Multiple Script PLESKSESSID Cookie SQL Injection<br />

<strong>PVS</strong> ID: 4213 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL injection attack.\n\nThe<br />

remote host is running Plesk. Plesk is a web-based administrative console written<br />

in PHP. This version of Plesk is vulnerable to a flaw in the way that it handles the<br />

'PLESKSESSID' cookie when passed via the 'login.php3' and 'auth.php3' scripts.<br />

An attacker exploiting this flaw would only need to be able to send HTTP requests<br />

to the vulnerable application. Successful exploitation would result in the attacker<br />

executing arbitrary SQL commands on the remote database server utilized by<br />

Plesk.<br />

Solution: Upgrade to a version of Plesk other than 7.6.1, 8.1.0, 8.1.1 and 8.2.0.<br />

CVE-2007-4892<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

WinSCP < 4.0.4 URL Protocol Handler Arbitrary File Transfer<br />

<strong>PVS</strong> ID: 4214 FAMILY: SSH RISK: HIGH NESSUS ID:26027<br />

Family Internet Services 1095


Description: Synopsis : \n\nThe remote Windows host has a program that allows arbitrary file<br />

access.\n\n According to its version, the installation of WinSCP on the remote host fails to<br />

completely sanitize input to the SCP and SFTP protocol handlers. If an attacker can trick a<br />

user on the affected host into clicking on a malicious link, he may be able to initiate a file<br />

transfer to or from the affected host. The reported version of WinSCP is: \n %L<br />

Solution: Upgrade to version 4.0.4 or higher.<br />

CVE-2007-4909<br />

AOL Instant Messenger <<br />

<strong>PVS</strong> ID: 4215 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a script injection attack.\n\nThe remote<br />

client is running AOL Instant Messenger version: %L\nThis version of AIM is vulnerable<br />

to a flaw where script code can be injected and executed by a malicious user. To exploit<br />

this flaw, an attacker would only need to be able to send a message to an unsuspecting user.<br />

Successful exploitation would result in the attacker executing arbitrary script code.<br />

Solution: Upgrade to a version higher than 6.1.41.2.<br />

CVE-2007-4901<br />

OpenOffice < 2.3 TIFF Parser Multiple Overflows<br />

<strong>PVS</strong> ID: 4216 FAMILY: Generic RISK: HIGH NESSUS ID:26064<br />

Description: The remote Windows host has a program that is affected by multiple buffer overflow<br />

vulnerabilities. The remote host is running a version of OpenOffice.org that is affected by<br />

multiple integer overflows in its TIFF document parser that can be triggered when parsing<br />

tags in TIFF directory entries. If a remote attacker can trick a user into opening a<br />

specially-crafted TIFF document, he may be able to leverage this issue to execute arbitrary<br />

code on the remote host subject to the user's privileges.<br />

Solution: Upgrade to version 2.3 or higher.<br />

CVE-2007-2834<br />

Merak Mail < 9.0.0 BODY Element HTML Injection<br />

<strong>PVS</strong> ID: 4217 FAMILY: SMTP Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML injection attack.\n\nThere is a<br />

flaw in this version of Merak mail server. Specifically, the application fails to filter out<br />

dangerous script input to email. An attacker may be able to execute arbitrary code when the<br />

user accesses Merak via the webmail interface. Successful exploitation would result in the<br />

attacker executing code in the remote client browser.<br />

Family Internet Services 1096


Solution: Upgrade to version 9.0.0 or higher.<br />

CVE-2007-5046<br />

Firefox < 2.0.0.7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4218 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe installed<br />

version of Firefox is vulnerable to multiple flaws. It is alleged that an attacker exploiting<br />

the browser would be able to inject and run arbitrary code.<br />

Solution: Upgrade to version 2.0.0.7 or higher.<br />

CVE-2007-4841<br />

Bugzilla < 3.0.2 / 3.1.2 WebService/User.pm Authentication Bypass<br />

<strong>PVS</strong> ID: 4219 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running Bugzilla, a bug-tracking software with a web<br />

interface. The version of Bugzilla on the remote host suffers from a flaw when parsing<br />

input to the 'createemailregexp' parameter of the 'offer_account_by_email()' function in the<br />

'WebService/User.pm' file. An attacker exploiting this flaw would need to know that the<br />

SOAP::Lite Perl module was installed. Successful exploitation would result in the attacker<br />

being able to create arbitrary Bugzilla user accounts.<br />

Solution: Upgrade to version 3.0.2, 3.1.2 or higher.<br />

CVE-2007-5038<br />

Mercury IMAP Server <<br />

<strong>PVS</strong> ID: 4220 FAMILY: IMAP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote IMAP server is affected by a buffer overflow<br />

vulnerability.\n\nThe remote host is running the Mercury Mail Transport System, a free<br />

suite of server products for Windows and NetWare associated with Pegasus Mail. The<br />

remote installation of Mercury Mail includes an IMAP server that is affected by a buffer<br />

overflow vulnerability. Using a specially-crafted SEARCH command, an authenticated<br />

remote attacker can leverage this issue to crash the remote application and even execute<br />

arbitrary code, subject to the privileges under which the application runs.<br />

Solution: Upgrade to a version of higher than 4.52.<br />

CVE-2007-5018<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1097


OpenSSL < 0.9.8f Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4221 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is using a version of OpenSSL that is older than 0.9.7n or 0.9.8f. There are several bugs in<br />

this version of OpenSSL that may allow an attacker to either execute remote code or cause<br />

a Denial of Service (DoS).<br />

Solution: Upgrade to version 0.9.8f or higher.<br />

CVE-2007-5135<br />

BrightStore HSM CsAgent Version Detection<br />

<strong>PVS</strong> ID: 4222 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the BrightStore HSM CsAgent version %L<br />

Solution: Ensure that you are running the latest version of CsAgent.<br />

CVE Not available<br />

DriveLock Agent Version Detection<br />

<strong>PVS</strong> ID: 4223 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: DriveLock is a software security product that can control physical access to computer<br />

resources. The remote host is running the DriveLock agent version %L<br />

Solution: Ensure that you are running the latest version of DriveLock.<br />

CVE Not available<br />

DriveLock < 5.0.0.314 Agent Version Detection<br />

<strong>PVS</strong> ID: 4224 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nDriveLock is a<br />

software security product that can control physical access to computer resources. The<br />

remote host is running the DriveLock agent version %L\nThis version of DriveLock is<br />

vulnerable to a remote buffer overflow. An attacker exploiting this flaw would only need to<br />

be able to send a very long string to the HTTP server listening on port 6061. Successful<br />

exploitation would result in the attacker executing arbitrary code on the remote machine.<br />

Solution: Upgrade to version 5.0.0.314 or higher.<br />

CVE-2007-5209<br />

HTTP Server Basic Authentication Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1098


<strong>PVS</strong> ID: 4225 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nThe remote server requires authentication for certain resources. Specifically,<br />

the resource "%P" requires user authentication. However, the server does not require a<br />

strong encryption of the passed credentials. Specifically, the server allows clients to send<br />

credentials using HTTP Basic authentication. The client credentials are passed in plaintext<br />

and slightly obfuscated by using base64 encoding. Such encoding is trivial and a passive<br />

attacker with the ability to sniff the traffic can easily gain access to a user's credentials.<br />

Solution: Use SSL or a stronger authentication mechanism.<br />

CVE Not available<br />

Firebird Database Plaintext Password<br />

<strong>PVS</strong> ID: 4226 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nThe remote host appears to be running a Firebird database client. This instance<br />

of the Firebird client allows the passing of confidential data over an unencrypted session.<br />

Given this, an attacker can sniff confidential data such as database name, user ID, or<br />

credentials to gain elevated access to the database. The sniffed account was \n%L<br />

Solution: Require remote clients to use an encrypted session.<br />

CVE Not available<br />

Firebird Database Plaintext Password<br />

<strong>PVS</strong> ID: 4227 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nThe remote host seems to be running a Firebird database server. This instance<br />

of the Firebird server allows the passing of confidential data over an unencrypted session.<br />

An attacker can sniff confidential data such as database name, user ID and credentials to<br />

gain elevated access to the database. The sniffed account was \n%P<br />

Solution: Require remote clients to use an encrypted session.<br />

CVE Not available<br />

Firebird Database Version Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4228 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1099


Description: The remote host appears to be running a Firebird database server version %L.<br />

Solution: Ensure you are running the latest version of Firebird server.<br />

CVE Not available<br />

Firebird Database < 2.0.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4229 FAMILY: Database RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

appears to be running a Firebird database server version '%L'. This version of Firebird is<br />

vulnerable to multiple flaws that, if exploited, would give an attacker the ability to execute<br />

arbitrary code on the remote database server. In order to exploit these flaws, an attacker<br />

would need the ability to authenticate to the database server.<br />

Solution: Upgrade to the latest version of Firebird server.<br />

CVE-2007-4669<br />

Firebird Database Multiple Stack-based Overflows<br />

<strong>PVS</strong> ID: 4230 FAMILY: Database RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host<br />

seems to be running a Firebird database server version '%L'. This version of Firebird is<br />

vulnerable to stack overflows that, if exploited, would give an attacker the ability to<br />

execute arbitrary code on the remote database server.<br />

Solution: Upgrade to the latest version of Firebird server.<br />

CVE-2007-5246<br />

Blackboard Academic Suite <<br />

<strong>PVS</strong> ID: 4231 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML injection attack.\n\nThe remote<br />

host is running Blackboard, a web-based academic software package that allows<br />

organizations to teach students remotely. This version of Blackboard is vulnerable to<br />

multiple HTML injection flaws. An attacker exploiting these flaws would need the ability<br />

to log in as a valid user. Successful exploitation would result in the attacker gaining<br />

confidential data from other Blackboard users.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2007-5227<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Cumulative <strong>Security</strong> Update for Microsoft Outlook Express and Windows Mail (941202)<br />

Family Internet Services 1100


<strong>PVS</strong> ID: 4232 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:26962<br />

Description: Arbitrary code can be executed on the remote host through the email client. The remote<br />

host is running a version of Microsoft Outlook Express that contains several security flaws<br />

that may allow an attacker to execute arbitrary code on the remote host. To exploit this<br />

flaw, an attacker would need to send a malformed email to a victim on the remote host and<br />

have him open it.<br />

Solution: Microsoft has released a set of patches for Outlook Express and Windows Mail.<br />

CVE-2007-3897<br />

Cumulative <strong>Security</strong> Update for Microsoft Outlook Express and Windows Mail (941202)<br />

<strong>PVS</strong> ID: 4233 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:26962<br />

Description: Arbitrary code can be executed on the remote host through the email client. The remote<br />

host is running a version of Microsoft Outlook Express that contains several security flaws<br />

that may allow an attacker to execute arbitrary code on the remote host. To exploit this<br />

flaw, an attacker would need to send a malformed email to a victim on the remote host and<br />

have him open it.<br />

Solution: Microsoft has released a set of patches for Outlook Express and Windows Mail.<br />

CVE-2007-3897<br />

Cumulative <strong>Security</strong> Update for Microsoft Outlook Express and Windows Mail (941202)<br />

<strong>PVS</strong> ID: 4234 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:26962<br />

Description: Arbitrary code can be executed on the remote host through the email client. The remote<br />

host is running a version of Microsoft Outlook Express that contains several security flaws<br />

that may allow an attacker to execute arbitrary code on the remote host. To exploit this<br />

flaw, an attacker would need to send a malformed email to a victim on the remote host and<br />

have him open it.<br />

Solution: Microsoft has released a set of patches for Outlook Express and Windows Mail.<br />

CVE-2007-3897<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Cumulative <strong>Security</strong> Update for Microsoft Outlook Express and Windows Mail (941202)<br />

<strong>PVS</strong> ID: 4235 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:26962<br />

Description: Arbitrary code can be executed on the remote host through the email client. The remote<br />

host is running a version of Microsoft Outlook Express that contains several security flaws<br />

that may allow an attacker to execute arbitrary code on the remote host. To exploit this<br />

flaw, an attacker would need to send a malformed email to a victim on the remote host and<br />

have him open it.<br />

Family Internet Services 1101


Solution: Microsoft has released a set of patches for Outlook Express and Windows Mail.<br />

CVE-2007-3897<br />

Cumulative <strong>Security</strong> Update for Microsoft Outlook Express and Windows Mail (941202)<br />

<strong>PVS</strong> ID: 4236 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:26962<br />

Description: Arbitrary code can be executed on the remote host through the email client. The remote<br />

host is running a version of Microsoft Outlook Express that contains several security flaws<br />

that may allow an attacker to execute arbitrary code on the remote host. To exploit this<br />

flaw, an attacker would need to send a malformed email to a victim on the remote host and<br />

have him open it.<br />

Solution: Microsoft has released a set of patches for Outlook Express and Windows Mail.<br />

CVE-2007-3897<br />

SQL-Ledger < 2.6.27 Multiple Fields SQL Injection<br />

<strong>PVS</strong> ID: 4237 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL injection attack.\n\nThe remote host<br />

is running SQL-Ledger, a web-based double-entry accounting system. The version of<br />

SQL-Ledger on the remote host contains a flaw in the way that it handles user-supplied<br />

data to the 'invoice quantity' and 'sort' fields. An attacker exploiting this flaw would be able<br />

to inject and run arbitrary SQL commands against the database server.<br />

Solution: Upgrade to version 2.6.27 or higher.<br />

CVE-2007-5372<br />

Firebird Database < 2.0.3.12981 'fbserver.exe' Stack Overflow<br />

<strong>PVS</strong> ID: 4238 FAMILY: Database RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host<br />

appears to be running a Firebird database server version '%L'. This version of Firebird is<br />

vulnerable to a stack overflow when processing specially malformed requests. An attacker<br />

exploiting this flaw would only need the ability to send malformed packets to the<br />

fbserver.exe process which listens on TCP port 3050 by default. Successful exploitation<br />

would result in the attacker executing arbitrary code.<br />

Solution: Upgrade to version 2.0.3.12981 or higher.<br />

CVE-2007-4992<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

IBM DB2 < 9 FixPak 3 / 8 FixPak 15 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4239 FAMILY: Database RISK: HIGH NESSUS ID:25905<br />

Family Internet Services 1102


Description: Synopsis :\n\nThe remote database server is affected by multiple issues.\n\n According to<br />

its version, the installation of DB2 on the remote host is affected by one or more of the<br />

following issues :\n\n - A local user may be able to overwrite arbitrary files,\n create<br />

arbitrary world-writeable directories, or gain root \n privileges via symlink attacks or<br />

specially-crafted \n environment variables.\n - A user may be able to continue to execute a<br />

method even \n once privileges for the method have been revoked (IY88226, \n version 8<br />

only).\n - There is an unspecified vulnerability related to \n incorrect authorization routines<br />

(JR25940, version 8 \n only).\n - There is an unspecified vulnerability in \n<br />

'AUTH_LIST_GROUPS_FOR_AUTHID' (IZ01828, version 9.1 \n only).\n - There is an<br />

unspecified vulnerability in the 'db2licm'\n and 'db2pd' tools (IY97922 / IY97936).\n -<br />

There is an unspecified vulnerability involving \n 'db2licd' and the 'OSSEMEMDBG' and<br />

'TRC_LOG_FILE' \n environment variables (IY98011 / IY98101).\n - There is a buffer<br />

overflow involving the 'DASPROF'\n environment variable (IY97346 / IY99311).\n -<br />

There is an unspecified vulnerability that can arise\n during instance and FMP startup<br />

(IZ01923 / IZ02067).\n\nNote that there is currently insufficient information to determine<br />

to what extent the first set of issues overlaps the others.<br />

Solution: Apply DB2 Version 9 FixPak 3 / 8 FixPak 15 or higher.<br />

CVE-2007-4411<br />

Magnicomp SysInfo Version Detection<br />

<strong>PVS</strong> ID: 4240 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Magnicomp SysInfo tool. This tool is used to collect and<br />

manage system information. The detected version was '%L'<br />

Solution: Ensure that you are running the latest version of SysInfo and that the traffic cannot be<br />

sniffed or leaked.<br />

CVE Not available<br />

Quintum Technologies VoIP Server Detection<br />

<strong>PVS</strong> ID: 4241 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a Quintum Technologies VoIP router. The reported version info<br />

is '%L'<br />

Solution: Ensure that you are running the latest version of the device's software and that the traffic<br />

cannot be sniffed or leaked.<br />

Google Urchin <<br />

CVE Not available<br />

<strong>PVS</strong> ID: 4242 FAMILY: Generic<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 1103


Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running the Google Urchin web application. The<br />

reported version is '%L'\nThis version of Urchin is reported prone to a flaw where an<br />

attacker can gain administrative access to the application. The 'report.cgi' script fails to<br />

adequately verify that the user is authorized. An attacker exploiting this flaw would be able<br />

to perform some subset of administrative duties without authentication.<br />

Solution: Upgrade to a version of Urchin higher than 5.7.03.<br />

CVE-2007-5113<br />

Winamp < 5.5 libFLAC Integer Overflow<br />

<strong>PVS</strong> ID: 4243 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Winamp, a multi-media software application. This version of Winamp includes a<br />

library that is reported to be prone to a remote integer overflow. An attacker exploiting this<br />

flaw would need to be able to convince a Winamp user to open a file with malformed<br />

FLAC data. Successful exploitation would result in the attacker executing arbitrary code on<br />

the remote client system.<br />

Solution: Upgrade to version 5.5 or higher.<br />

CVE-2007-4619<br />

Avocent KVM Appliance Detection<br />

<strong>PVS</strong> ID: 4244 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running an Avocent Enterprise KVM appliance. This appliance<br />

allows remote users to manage their network servers remotely.<br />

Solution: N/A<br />

CVE Not available<br />

Apache Tomcat < 6.0.15 WEBDAV Lock Request Information Disclosure<br />

<strong>PVS</strong> ID: 4245 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server can be manipulated to disclose confidential<br />

data.\n\nThe remote host is running a version of Tomcat server less than 6.0.15. This<br />

version of Tomcat is vulnerable to a flaw in the way that it parses WEBDAV 'lock'<br />

requests. Specifically, if the lock request references an external file, Tomcat will<br />

retrieve the file. This could lead to information disclosure of potentially confidential<br />

data. An attacker exploiting this flaw would need to have the ability to authenticate<br />

to the Tomcat server.<br />

Solution: Upgrade to version 6.0.15 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1104


CVE-2007-5461<br />

Ruby Version Detection<br />

<strong>PVS</strong> ID: 4246 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is running the Ruby web application. The reported version is '%L'<br />

Solution: N/A<br />

CVE Not available<br />

Ruby on Rails Version Detection<br />

<strong>PVS</strong> ID: 4247 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is running the Ruby on Rails web application. The reported version is<br />

'%L'<br />

Solution: N/A<br />

CVE Not available<br />

Ruby on Rails < 1.2.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4248 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote<br />

server is running the Ruby on Rails web application. The reported version is '%L'\nThis<br />

version of Rails is reported to be vulnerable to a number of flaws. It is reported that a<br />

remote attacker can perform man-in-the-middle attacks and gain user credentials. It is also<br />

reported that there is a content-parsing flaw in the XML handler that would allow an<br />

attacker to either gain unauthorized access to data or cause the application to fail.<br />

Solution: Upgrade to version 1.2.5 or higher.<br />

CVE-2007-5380<br />

Opera < 9.24 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4249 FAMILY: Web Clients RISK: HIGH NESSUS ID:27506<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by two<br />

vulnerabilities.\n\nThe version of Opera installed on the remote host reportedly may allow<br />

for arbitrary code execution if it has been configured to use an external news reader or<br />

email client and a user views a specially-crafted web page. In addition, it may also allow a<br />

script to bypass the same-origin policy and overwrite functions on pages from other<br />

domains when processing frames from different web sites, which can be leveraged to<br />

conduct cross-site scripting attacks.<br />

Family Internet Services 1105


Solution: Upgrade to version 9.24 or higher.<br />

CVE-2007-5541<br />

RunCMS < 1.5.3 Unspecified Vulnerability<br />

<strong>PVS</strong> ID: 4250 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to unspecified remote attack vectors.\n\nThe<br />

remote host is running RunCMS, a web-based content management and messaging system.<br />

This version of RunCMS is reported to be vulnerable to a security flaw. The details of the<br />

flaw are unknown; however, it is alleged that the remote attacker would be able to impact<br />

confidentiality, integrity and availability.<br />

Solution: Upgrade to version 1.5.3 or higher.<br />

CVE-2007-5535<br />

Oracle 10g Application Server SQL Injection<br />

<strong>PVS</strong> ID: 4251 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL injection attack.\n\nThe remote host<br />

is running a version of the Oracle 10g Application Server that is vulnerable to a remote<br />

SQL injection attack. An attacker exploiting this flaw would gain limited access to the<br />

remote database server. Successful exploitation would allow the attacker the ability to<br />

execute SQL commands on the database server.<br />

Solution: Apply the vendor patches for Oracle 10g versions 1 and 2.<br />

CVE-2007-5508<br />

Avocent DSView Server Detection<br />

<strong>PVS</strong> ID: 4252 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Avocent DSView server. This server is used to manage<br />

multiple Avocent DSR devices which, in turn, manage multiple servers. The reported<br />

version number was '%L'<br />

Solution: N/A<br />

CVE Not available<br />

Microsoft Internet Explorer Version Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4253 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1106


Description: The remote host is running Internet Explorer version '%L'. By default, Internet Explorer<br />

does not pass exact version info within HTTP headers. However, many third party browser<br />

plugins do pass the exact MSIE version number.<br />

Solution: N/A<br />

CVE Not available<br />

Firefox < 2.0.0.8 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4254 FAMILY: Web Clients RISK: HIGH NESSUS ID:27521<br />

Description: Synopsis :\n\nThe remote Windows host contains a web browser that is affected by<br />

multiple vulnerabilities.\n\n The installed version of Firefox is affected by various security<br />

issues, some of which may lead to execution of arbitrary code on the affected host subject<br />

to the user's privileges.<br />

Solution: Upgrade to version 2.0.0.8 or higher.<br />

CVE-2007-2291<br />

SeaMonkey < 1.1.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4255 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe installed<br />

version of SeaMonkey is vulnerable to multiple flaws that may lead to execution of<br />

arbitrary code on the affected host subject to the user's privileges.<br />

Solution: Upgrade to version 1.1.5 or higher.<br />

CVE-2007-5337<br />

Mozilla Thunderbird < 2.0.0.8 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4256 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote<br />

version of Mozilla Thunderbird suffers from a number of flaws that could lead to an<br />

attacker corrupting memory and possibly executing arbitrary code. An attacker exploiting<br />

this flaw would need to convince a Thunderbird user to open an HTML email.<br />

Solution: Upgrade to version 2.0.0.8 or higher.<br />

CVE-2007-5337<br />

Simple Machines Forum < 1.1.4 index.php SMFCookie218 Parameter SQL Injection<br />

<strong>PVS</strong> ID: 4257 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 1107


Description: Synopsis :\n\nThe remote host is vulnerable to a SQL injection attack.\n\nThe remote host<br />

is running the Simple Machines Forum (SMF), a web forum. This version of SMF is<br />

vulnerable to a flaw in the way that it handles user-supplied data. Data passed to the<br />

'SMFCookie218' parameter of the 'index.php' script can contain SQL queries that are<br />

ultimately run against the default database server. An attacker exploiting this flaw would be<br />

able to execute arbitrary SQL commands against the default database server.<br />

Solution: Upgrade to version 1.1.4 or higher.<br />

CVE-2007-5646<br />

Vanilla Forum < 1.1.4 sortcategories.php CategoryID Parameter SQL Injection<br />

<strong>PVS</strong> ID: 4258 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL injection attack.\n\nThe remote host<br />

is running the Vanilla Forum, a web forum. This version of Vanilla is vulnerable to a flaw<br />

in the way that it handles user-supplied data. Data passed to the 'CategoryID' parameter of<br />

the 'sortcategories.php' script can contain SQL queries that are ultimately run against the<br />

default database server. An attacker exploiting this flaw would be able to execute arbitrary<br />

SQL commands against the default database server.<br />

Solution: Upgrade to version 1.1.4 or higher.<br />

Simple PHP Blog <<br />

CVE-2007-5643<br />

<strong>PVS</strong> ID: 4259 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the Simple PHP Blog, web log (or blog) package version '%L'.\n\nThis version<br />

of Simple PHP Blog is vulnerable to multiple flaws that, at worst, allow the ability for a<br />

remote attacker to execute local script code. An attacker exploiting these flaws would only<br />

need the ability to send valid web requests to the application. Successful exploitation would<br />

result in a loss of confidentiality, integrity, and availability.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

Delegate < 9.7.5 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4260 FAMILY: POP Server RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running Delegate, a proxy server. This version of Delegate is vulnerable to<br />

multiple remote Denial of Service (DoS) attacks. An attacker exploiting these flaws would<br />

be able to impact the availability of the proxy server.<br />

Family Internet Services 1108


Solution: Upgrade to version 9.7.5 or higher.<br />

CVE Not available<br />

Lotus Domino Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4261 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of Lotus Domino Server that is prone to multiple attacks against the<br />

web server component. An attacker exploiting these flaws would be able to either view<br />

confidential data or execute arbitrary code via a buffer overflow.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2007-5910<br />

Lotus Notes < 7.0.3 HTML Email RTF Conversion Overflow<br />

<strong>PVS</strong> ID: 4262 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the Lotus Notes email client. The reported version is older than 7.0.3. This version<br />

of Lotus Notes is reported vulnerable to multiple remote buffer overflows. The specific<br />

flaw seems to be in the portion of the application that processes attachments. In order for<br />

this attack vector to be utilized, the attacker would need to be able to entice a Lotus Notes<br />

user into opening a malicious attachment. Successful exploitation would result in the<br />

attacker executing arbitrary code on the remote system. The reported version of Lotus<br />

Notes is: \n %L<br />

Solution: Upgrade to version 7.0.3 or higher.<br />

CVE-2007-4222<br />

Adaptec Storage Manager Server Detection<br />

<strong>PVS</strong> ID: 4263 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Adaptec Storage Manager (ASM) product. This software<br />

allows administrators to centrally troubleshoot and manage devices and software that are<br />

managed by ASM.<br />

Solution: N/A<br />

CVE Not available<br />

Cisco HSRP 'Active' Router Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4264 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1109


Description: The remote host is a Cisco router that is advertising itself (via HSRP) as the current active<br />

router.<br />

Solution: N/A<br />

CVE Not available<br />

Cisco HSRP 'Standby' Router Detection<br />

<strong>PVS</strong> ID: 4265 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Cisco router that is advertising itself (via HSRP) as the current standby<br />

router.<br />

Solution: N/A<br />

CVE Not available<br />

IBM Server RAID Manager Detection<br />

<strong>PVS</strong> ID: 4266 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running IBM Server RAID management software. This software allows<br />

administrators to centrally manage the RAID disks being utilized by the IBM server.<br />

Solution: N/A<br />

CVE Not available<br />

BEA WebLogic Cluster Server Detection<br />

<strong>PVS</strong> ID: 4267 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running BEA WebLogic software. Further, the server is configured as<br />

part of an Enterprise cluster of servers.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Ipswitch IMail Client < 2006.23 Multipart MIME Email Overflow<br />

<strong>PVS</strong> ID: 4268 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:27590<br />

Description: Synopsis :\n\nThe remote Windows host contains a program that is prone to a buffer<br />

overflow attack.\n\nIMail Client, a tool for administering Ipswitch IMail Server, is installed<br />

on the remote Windows host. The version of IMail Client on the remote host contains a<br />

boundary error that can be triggered by a long 'boundary' parameter in when processing<br />

emails with multipart MIME data. If an attacker can trick the Ipswitch Mail Server<br />

administrator to open a specially-crafted email using the affected application, he can<br />

leverage this issue to execute arbitrary code subject to the user's privileges.<br />

Family Internet Services 1110


Solution: Upgrade to version 2006.23 or higher.<br />

CVE-2007-4345<br />

Altiris AClient < 6.8.380 Multiple Local Vulnerabilities<br />

<strong>PVS</strong> ID: 4269 FAMILY: Generic RISK: HIGH NESSUS ID:27596<br />

Description: Synopsis :\n\nThe remote Windows host has a program that is prone to multiple local<br />

attacks.\n\nThe version of the Altiris Client Agent (aclient) installed on the remote host<br />

contains a flaw in its browser option where a local user can open or execute files on the<br />

affected host with SYSTEM privileges. It also contains a directory traversal vulnerability<br />

that allows a local user to read privileged system files.<br />

Solution: Upgrade to version 6.8.380 or higher.<br />

CVE-2007-5838<br />

WebSphere Server Version Detection<br />

<strong>PVS</strong> ID: 4270 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote WebSphere server is running version '%L'<br />

Solution: N/A<br />

GIOP Device Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 4271 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: A GIOP-enabled service is running on this port. General Inter-ORB Protocol (GIOP) is<br />

commonly used in applications that are distributed across a network and have the need to<br />

share information.<br />

Solution: N/A<br />

CVE Not available<br />

WebSphere SSL Server Detection<br />

<strong>PVS</strong> ID: 4272 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is a WebSphere SSL Server.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1111


WebSphere UDDI Console Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4273 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote<br />

WebSphere server is running version '%L'.\nThis version is reported vulnerable to a<br />

number of flaws in its UDDI Console. The flaws stem from the application's inability to<br />

parse user-supplied input to the 'uddigui/navigateTree.do' Java program. Successful<br />

exploitation would require that the attacker be able to convince a user to browse a<br />

malicious URI. Successful exploitation would result in the attacker executing script code<br />

within the client browser.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2007-5799<br />

Firefox < 2.0.0.9 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4274 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe installed<br />

version of Firefox is affected by various security issues, some of which may lead to<br />

execution of arbitrary code within vulnerable browsers. There is also a risk of the Firefox<br />

browser being crashed.<br />

Solution: Upgrade to version 2.0.0.9 or higher.<br />

CVE Not available<br />

Unix AIX Operating System Detection<br />

<strong>PVS</strong> ID: 4275 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a UNIX AIX system.<br />

Solution: N/A<br />

CVE Not available<br />

Apache-SOAP Administrative Interface Detection<br />

<strong>PVS</strong> ID: 4276 FAMILY: CGI RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Apache-SOAP administrative interface. The<br />

interface allows remote users to view, create, and delete objects.<br />

Solution: Ensure that only valid administrators can access the application.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1112


QuickTime < 7.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4277 FAMILY: Web Clients RISK: HIGH NESSUS ID:27626<br />

Description: Synopsis : \n\nThe remote Windows host contains an application that is affected by<br />

multiple issues.\n\nThe version of QuickTime installed on the remote Windows host is<br />

older than 7.3. Such versions contain several vulnerabilities that may allow an attacker to<br />

execute arbitrary code on the remote host if the user can be convinced to open a<br />

specially-crafted file with QuickTime. The reported version of QuickTime is: \n %L<br />

Solution: Upgrade to version 7.3 or higher.<br />

CVE-2007-4676<br />

OrangeHRM < 2.2.2 RepViewController.php Privilege Escalation<br />

<strong>PVS</strong> ID: 4278 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running OrangeHRM, a human resource<br />

management system written in PHP. The version of OrangeHRM installed on the remote<br />

host fails to sanitize input within the 'RepViewController.php' PHP script. An authenticated<br />

user may use this flaw to access private data. An attacker exploiting this flaw would need a<br />

valid account on the OrangeHRM system. Successful exploitation would result in the loss<br />

of confidential data.<br />

Solution: Upgrade to version 2.2.2 or higher.<br />

CVE-2007-5931<br />

HP Radia Integration Server Version Detection<br />

<strong>PVS</strong> ID: 4279 FAMILY: CGI RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the HP Radia Integration server, a component of HP Openview<br />

that is used to manage enterprise machines. The reported version is '%L'<br />

Solution: N/A<br />

CVE Not available<br />

Trillian Version Detection<br />

<strong>PVS</strong> ID: 4280 FAMILY: Internet Messengers RISK: INFO NESSUS ID:Not Available<br />

Description: The version of Trillian installed on the remote client is '%L'.\nTrillian is a chat client that<br />

can be used for messaging and file transfer.<br />

Solution: N/A<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1113


CVE Not available<br />

PHP < 5.2.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4281 FAMILY: Web Servers RISK: HIGH NESSUS ID:28181<br />

Description: The remote web server uses a version of PHP that is affected by multiple flaws. According<br />

to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such<br />

versions may be affected by various issues, including but not limited to several buffer<br />

overflows. The reported version of PHP is: \n %L<br />

Solution: Upgrade to version 5.2.5 or higher.<br />

CVE-2007-4887<br />

Oracle Web Listener Version Detection<br />

<strong>PVS</strong> ID: 4282 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is running the Oracle Web Listener application version '%L'<br />

Solution: N/A<br />

CVE Not available<br />

TestLink < 1.7.1 Authorization Mechanism Failure<br />

<strong>PVS</strong> ID: 4283 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows authenticated attackers to<br />

gain access to the account data of other users.\n\nThe remote host is running TestLink, an<br />

application testing suite written in PHP. The reported version number is '%L'\nThis version<br />

is reported vulnerable to a flaw in the 'userview.php' script. Specifically, an authenticated<br />

user would be able to view and modify the accounts of other users.<br />

Solution: Upgrade to version 1.7.1 or higher.<br />

CVE-2007-6006<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mac OS X < 10.4.11 Multiple Vulnerabilities (<strong>Security</strong> Update 2007-008)<br />

<strong>PVS</strong> ID: 4284 FAMILY: Operating System Detection RISK: HIGH NESSUS ID:28212<br />

Description: Synopsis :\n\nThe remote host is missing a Mac OS X update that fixes a security<br />

issue.\n\nThe remote host is running a version of Mac OS X 10.4 that is older than version<br />

10.4.11 or a version of Mac OS X 10.3 that does not have <strong>Security</strong> Update 2007-008<br />

applied. This update contains several security fixes for the following programs :\n\n\n -<br />

Flash Player Plugin\n - AppleRAID\n - BIND\n - bzip2\n - CFFTP\n - CF<strong>Network</strong>\n -<br />

CoreFoundation\n - CoreText\n - Kerberos\n - Kernel\n - remote_cmds\n - <strong>Network</strong>ing\n -<br />

NFS\n - NSURL\n - Safari\n - <strong>Security</strong>Agent\n - WebCore\n - WebKit<br />

Family Internet Services 1114


Solution: Upgrade to version 10.4.11 or higher.<br />

CVE-2007-4701<br />

Samba < 3.0.27 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4285 FAMILY: Samba RISK: HIGH NESSUS ID:28228<br />

Description: Synopsis :\n\nThe remote Samba server may be affected one or more vulnerabilities.\n\n<br />

According to its banner, the version of the Samba server ('%L') on the remote host contains<br />

a boundary error in the 'reply_netbios_packet()' function in 'nmbd/nmbd_packets.c' when<br />

sending NetBIOS replies. Provided the server is configured to run as a WINS server, a<br />

remote attacker can exploit this issue by sending multiple specially-crafted WINS 'Name<br />

Registration' requests followed by a WINS 'Name Query' request, leading to a stack-based<br />

buffer overflow and allow for execution of arbitrary code.\nThere is also a stack buffer<br />

overflow in nmbd's logon request processing code that can be triggered by means of<br />

specially-crafted GETDC mailslot requests when the affected server is configured as a<br />

Primary or Backup Domain Controller. The Samba security team currently does not believe<br />

this particular vulnerability can be exploited to execute arbitrary code remotely.<br />

Solution: Upgrade to version 3.0.27 or later.<br />

CVE-2007-5398<br />

WebSphere HTML 'Expect' Header HTML Injection<br />

<strong>PVS</strong> ID: 4286 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML injection attack.\n\nThe remote<br />

WebSphere server is running version '%L'.\nThis version is reported to be vulnerable to an<br />

HTML injection flaw. An attacker exploiting this flaw would need to create a custom<br />

request that utilized custom 'Expect' headers and be able to convince unsuspecting users to<br />

launch the URI. Successful exploitation would result in an attacker gaining access to<br />

confidential client data.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2007-5944<br />

VMWare Server Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4287 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running VMWare server, an application that allows users to run multiple<br />

operating systems virtually. Further, this instance of VMWare is a server application that<br />

allows remote administrator access to the VMWare console. The displayed banner is '%L'<br />

Solution: Only allow administrative VMWare connections from trusted hosts.<br />

Family Internet Services 1115


CVE Not available<br />

VMWare Server Plaintext Authorization<br />

<strong>PVS</strong> ID: 4288 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nThe remote host is running VMWare server, an application that allows users to<br />

run multiple operating systems virtually. Futher, this instance of VMWare is a server<br />

application that allows remote administrator access to the VMWare console. The displayed<br />

banner is '%L'\nThis version of VMWare Server allows authentication without SSL.<br />

Sending credentials in plaintext allows passive attackers to either execute<br />

man-in-the-middle attacks or sniff the credentials while in transit.<br />

Solution: Newer versions of the VMware Authentication daemon can be configured to only accept<br />

authentication over SSL.<br />

CVE Not available<br />

LIVE555 Media Server < 2007.11.18 DoS<br />

<strong>PVS</strong> ID: 4289 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running LIVE555 Media Server, a media streaming server. The version of<br />

LIVE55 installed on the remote host is vulnerable to a denial of service attack when sent a<br />

request of less than 8 bytes. An attacker exploiting this flaw would only need the ability to<br />

connect to the RTSP server via the network. Successful exploitation would result in the<br />

service crashing.<br />

Solution: Upgrade to version 2007.11.18 or higher.<br />

CVE-2007-4561<br />

Ability Mail Server < 2.61 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4290 FAMILY: IMAP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:28289<br />

Description: Synopsis :\n\nThe remote mail server is affected by multiple denial of service<br />

vulnerabilities.\n\n The remote host appears to be running Ability IMAP Server. According<br />

to its banner, the installed version of Ability Mail Server is affected by two issues that<br />

could cause the application to crash. One involves messages that are changed to a blank<br />

string, the other concerns IMAP4 commands with malformed number list ranges. It is not<br />

currently known whether either or both issues can be exploited without authentication.<br />

Solution: Upgrade to version 2.61 or higher.<br />

CVE-2007-6101<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1116


Ability Mail Server < 2.61 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4291 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:28289<br />

Description: Synopsis :\n\nThe remote mail server is affected by multiple denial of service<br />

vulnerabilities.\n\n The remote host appears to be running Ability SMTP Server. According<br />

to its banner, the installed version of Ability Mail Server is affected by two issues that<br />

could cause the application to crash. One involves messages that are changed to a blank<br />

string, the other concerns IMAP4 commands with malformed number list ranges. It is not<br />

currently known whether either or both issues can be exploited without authentication.<br />

Solution: Upgrade to version 2.61 or higher.<br />

CVE-2007-6101<br />

Ability Mail Server < 2.61 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4292 FAMILY: POP Server<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:28289<br />

Description: Synopsis :\n\nThe remote mail server is affected by multiple denial of service<br />

vulnerabilities.\n\n The remote host appears to be running Ability POP3 Server. According<br />

to its banner, the installed version of Ability Mail Server is affected by two issues that<br />

could cause the application to crash. One involves messages that are changed to a blank<br />

string, the other concerns IMAP4 commands with malformed number list ranges. It is not<br />

currently known whether either or both issues can be exploited without authentication.<br />

Solution: Upgrade to version 2.61 or higher.<br />

CVE-2007-6101<br />

Ability Mail Server < 2.61 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4293 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:28289<br />

Description: Synopsis :\n\nThe remote mail server is affected by denial of service vulnerabilities.\n\n<br />

The remote host appears to be running Ability Mail Server. According to its banner, the<br />

installed version of Ability Mail Server is affected by two issues that could cause the<br />

application to crash. One involves messages that are changed to a blank string, the other<br />

concerns IMAP4 commands with malformed number list ranges. It is not currently known<br />

whether either or both issues can be exploited without authentication.<br />

Solution: Upgrade to version 2.61 or higher.<br />

CVE-2007-6101<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Microsoft Outlook Web Access (OWA) Version Detection<br />

<strong>PVS</strong> ID: 4294 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1117


Description: The remote server is running Microsoft Outlook Web Access (OWA) version : '%P'<br />

Solution: Ensure that this instance of Outlook Web Access is within corporate standards and is<br />

fully patched.<br />

CVE Not available<br />

RunCMS include/common.php xoopsOption Parameter Local File Inclusion<br />

<strong>PVS</strong> ID: 4295 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:28291<br />

Description: The remote web server contains a PHP application that is susceptible to a local file<br />

inclusion attack. The remote host appears to be running RunCMS, a content-management<br />

system written in PHP. The version of RunCMS installed on the remote host fails to<br />

sanitize user input to the 'xoopsOption[pagetype]' parameter before using it to include PHP<br />

code in 'include/common.php'. Regardless of PHP's 'register_globals' setting, an<br />

unauthenticated remote attacker may be able to exploit this issue to view arbitrary files or<br />

to execute arbitrary PHP code on the remote host, subject to the privileges of the web<br />

server user ID.<br />

Solution: No solution is known at this time.<br />

CVE-2008-0224<br />

Firefox < 2.0.0.10 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4296 FAMILY: Web Clients RISK: HIGH NESSUS ID:28329<br />

Description: Synopsis :\n\nThe remote Windows host contains a web browser that is affected by<br />

multiple vulnerabilities.\n\n The installed version of Firefox is affected by various security<br />

issues :\n\n - Three bugs that can result in crashes with traces of memory corruption\n - A<br />

cross-site scripting vulnerability involving support for the 'jar:' URI scheme\n - A timing<br />

issue when setting the 'window.location' property that could be leveraged to conduct<br />

cross-site request forgery attacks.<br />

Solution: Upgrade to version 2.0.0.10 or higher.<br />

CVE-2007-5960<br />

Sentinel Protection Server < 7.4.1 Directory Traversal File Access<br />

<strong>PVS</strong> ID: 4297 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a directory traversal flaw.\n\nThe remote<br />

host is running a the Sentinel Protection Server version %L.\nThis version of Sentinel is<br />

vulnerable to a flaw where specially formatted HTTP requests, like 'GET<br />

/..\..\..\..\..\..\winnt\win.ini', will cause the server to return potentially confidential data from<br />

outside of the web directories.<br />

Family Internet Services 1118


Solution: Upgrade to version 7.4.1 or higher.<br />

CVE-2008-0760<br />

SeaMonkey < 1.1.7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4298 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote Windows host contains a web browser that is affected<br />

by multiple vulnerabilities.\n\n The installed version of SeaMonkey is affected by<br />

various security issues :\n\n - Three bugs that can result in crashes with traces of<br />

memory corruption\n - A cross-site scripting vulnerability involving support for<br />

the 'jar:' URI scheme\n - A timing issue when setting the 'window.location'<br />

property that could be leveraged to conduct cross-site request forgery attacks.<br />

Solution: Upgrade to version 1.1.7 or higher.<br />

CVE-2007-5960<br />

Ruby on Rails < 1.2.6 Cookie Related Session Fixation<br />

<strong>PVS</strong> ID: 4299 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote server can be used to attack user authentication data.\n\nThe<br />

remote server is running the Ruby on Rails web application. The reported version is<br />

'%L'\nThis version of Rails is reported to be vulnerable to a flaw in the way that it handles<br />

authentication data. Allegedly, the 'lib/action_controller/cgi_process.rb' script is vulnerable<br />

to a flaw that would allow an attacker to steal cookie data. An attacker could then use this<br />

data to gain access to the application with the user's credentials.<br />

Solution: Upgrade to version 1.2.6 or higher.<br />

CVE-2007-6077<br />

IBM Director Version Detection<br />

<strong>PVS</strong> ID: 4300 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is running IBM Director version: %L<br />

Solution: N/A<br />

IBM Director <<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4301 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1119


Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote server is running IBM Director version: %L.\nThis version of IBM Director is<br />

vulnerable to an attack against resources. Specifically, an attacker making multiple<br />

connections to a service port can cause the system to consume high CPU and memory<br />

resources. Successful exploitation would result in the system becoming less responsive or<br />

crashing.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

Maltego Tool Detection<br />

CVE-2007-5612<br />

<strong>PVS</strong> ID: 4302 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized according to<br />

corporate policy.\n\nThe remote host is running Maltego, a tool commonly used for<br />

gathering intelligence about an individual, domain, phone number, and more.<br />

Solution: Ensure that this application is being used in conjunction with corporate policies and<br />

guidelines.<br />

CVE Not available<br />

Plumtree Version Detection<br />

<strong>PVS</strong> ID: 4304 FAMILY: CGI RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Plumtree Portal, a part of the BEA Aqualogic web software.<br />

The reported version number and build information was: '%L'.<br />

Solution: N/A<br />

CVE Not available<br />

Squid < 2.6.STABLE18 Update Reply Processing DoS<br />

<strong>PVS</strong> ID: 4305 FAMILY: Web Servers RISK: HIGH NESSUS ID:29216<br />

Description: Synopsis :\n\nThe remote proxy server is prone to a denial of service attack. \n\nAccording<br />

to its banner, the version of the Squid proxy caching server installed on the remote host is<br />

older than 2.6.STABLE17. Such versions reportedly use incorrect bounds checking when<br />

processing some cache update replies. A client trusted to use the service may be able to<br />

leverage this issue to crash the application, thereby denying service to legitimate users.<br />

Solution: Either upgrade to version 2.6.STABLE18 or higher or patch according to vendor<br />

recommendations.<br />

CVE-2007-6239<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1120


Snitz Forum < 3.4.0.07 active.asp BuildTime Parameter SQL Injection<br />

<strong>PVS</strong> ID: 4306 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL injection attack.\n\nThe remote host<br />

appears to be running Snitz Forum, a web forum application implemented in ASP. This<br />

version of Snitz ('%L') is reported to be vulnerable to a SQL injection flaw within the<br />

'active.asp' script. An attacker exploiting this flaw would send specially formed HTTP<br />

queries to the active.asp script. These queries would include SQL statements that would<br />

ultimately be executed on the database utilized by Snitz.<br />

Solution: Upgrade to version 3.4.0.07 or higher.<br />

CVE-2007-6240<br />

Jetty < 6.1.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4307 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Jetty (version: '%L'), a Java web server that can be downloaded off the Internet<br />

and is currently bundled with some IBM applications. This version of Jetty is vulnerable to<br />

a remote flaw in the way that it handles cookie quotes. An attacker exploiting this flaw<br />

would be able to hijack the session of valid users without authentication. Further, this<br />

version of Jetty is vulnerable to a flaw in the way that it handles Carriage-Return/Line-Feed<br />

characters. An attacker can exploit this flaw to inject malicious HTTP headers into a<br />

session. This version of Jetty is also vulnerable to a cross-site scripting (XSS) attack that<br />

would allow an attacker to possibly retrieve sensitive data from client browsers.<br />

Solution: Upgrade to version 6.1.6 or higher.<br />

CVE-2007-5614<br />

OpenOffice HSQLDB Document Handling Java Code Injection<br />

<strong>PVS</strong> ID: 4308 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a script injection attack.\n\nThe remote host<br />

is running a version of OpenOffice.org that is affected by a remote code execution flaw.<br />

The root of the flaw appears to be the HSQLDB database engine. An attacker exploiting<br />

this flaw would need to be able to convince a user to open a file that was handled by the<br />

OpenOffice HSQLDB database engine. Successful exploitation would result in the attacker<br />

executing arbitrary Java code on the remote system.<br />

Solution: Upgrade to version 2.3.1 (2.3 build 9238) or higher.<br />

CVE-2007-4575<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

MySQL < 5.0.51 RENAME TABLE Symlink System Table Overwrite<br />

<strong>PVS</strong> ID: 4309 FAMILY: Database RISK: LOW NESSUS ID:29251<br />

Family Internet Services 1121


Description: Synopsis :\n\nThe remote database server is susceptible to a local symlink attack.\n\n The<br />

version of MySQL installed on the remote host reportedly fails to check whether a file to<br />

which a symlink points exists when using RENAME TABLE against a table with explicit<br />

DATA DIRECTORY and INDEX DIRECTORY options. A local attacker may be able to<br />

leverage this issue to overwrite system table information by replacing the file to which the<br />

symlink points.<br />

Solution: Upgrade to version 5.0.51 or higher.<br />

CVE-2007-5969<br />

Skype Technologies < 3.6.0.216 skype4com URI Handler Remote Heap Corruption<br />

<strong>PVS</strong> ID: 4310 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:29250<br />

Description: Synopsis :\n\nThe remote Skype client is affected by a buffer overflow.\n\nThe version of<br />

Skype installed on the remote host is vulnerable to a heap overflow vulnerability in the<br />

skype4com URI handler. A remote attacker would have to convince a user to click on a<br />

specially-crafted Skype URL to exploit this flaw.<br />

Solution: Upgrade to version 3.6.0.216 or higher.<br />

CVE-2007-5989<br />

Samba < 3.0.28 send_mailslot Function Buffer Overflow<br />

<strong>PVS</strong> ID: 4311 FAMILY: Samba RISK: HIGH NESSUS ID:29252<br />

Description: Synopsis :\n\nThe remote Samba server may be affected by a buffer overflow<br />

vulnerability.\n\n According to its banner, the version of the Samba server ('%L') on the<br />

remote host is reportedly affected by a boundary error in 'nmbd' within the 'send_mailslot'<br />

function. Provided the 'domain logons' option is enabled in 'smb.conf', an attacker can<br />

leverage this issue to produce a stack-based buffer overflow using a 'SAMLOGON' domain<br />

logon packet in which the username string is placed at an odd offset and is followed by a<br />

long 'GETDC' string. Note that <strong>PVS</strong> has not verified whether 'domain logons' are enabled<br />

on the remote host.<br />

Solution: Upgrade to version 3.0.28 or higher.<br />

CVE-2007-6015<br />

MySQL Enterprise Server < 5.0.52 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4312 FAMILY: Database<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:29346<br />

Description: Synopsis :\n\nThe remote database server is affected by several issues.\n\nThe version of<br />

MySQL Enterprise Server installed on the remote host reportedly is affected by the<br />

following issues :\n\n - Using RENAME TABLE against a table with explicit DATA<br />

DIRECTORY and INDEX DIRECTORY options can be used to overwrite system table<br />

information. (Bug #32111).\n\n - ALTER VIEW retained the original DEFINER value,<br />

Family Internet Services 1122


even when altered by another user, which could allow that user to gain the access rights of<br />

the view. (Bug #29908)\n\n - When using a FEDERATED table, the local server can be<br />

forced to crash if the remote server returns a result with fewer columns than expected. (Bug<br />

#29801)<br />

Solution: Upgrade to version 5.0.52 or higher.<br />

CVE-2007-6304<br />

MySQL Community Server < 5.1.23 / 6.0.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4313 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:29345<br />

Description: Synopsis :\n\nThe remote database server is affected by several issues.\n\nThe version of<br />

MySQL Server installed on the remote host reportedly is affected by the following issues<br />

:\n\n - It is possible, by creating a partitioned table using the DATA DIRECTORY and<br />

INDEX DIRECTORY options, to gain privileges on other tables having the same name as<br />

the partitioned table. (Bug #32091)\n\n - Using RENAME TABLE against a table with<br />

explicit DATA DIRECTORY and INDEX DIRECTORY options can be used to overwrite<br />

system table information. (Bug #32111).\n\n - ALTER VIEW retains the original<br />

DEFINER value, even when altered by another user, which can allow that user to gain the<br />

access rights of the view. (Bug #29908)\n\n - When using a FEDERATED table, the local<br />

server can be forced to crash if the remote server returns a result with fewer columns than<br />

expected. (Bug #29801)<br />

Solution: Upgrade to version 5.1.23, 6.0.4 or higher.<br />

CVE-2007-6304<br />

QuickTime < 7.3.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4314 FAMILY: Web Clients RISK: HIGH NESSUS ID:29698<br />

Description: Synopsis :\n\nThe remote host contains an application that is affected by multiple<br />

vulnerabilities.\n\n The version of QuickTime installed on the remote host is older than<br />

7.3.1. Such versions contain several vulnerabilities that may allow an attacker to execute<br />

arbitrary code on the remote host if a user opens a specially-crafted RTSP movie, QTL file<br />

or Flash media file with QuickTime.<br />

Solution: Upgrade to version 7.3.1 or higher.<br />

CVE-2007-6166<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

WebGUI < 7.4.18 Secondary Admin Remote Privilege Escalation<br />

<strong>PVS</strong> ID: 4315 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1123


Description: Synopsis :\n\nThe remote host is vulnerable to a remote 'privilege escalation' flaw.\n\nThe<br />

remote host is running WebGUI, a content management framework. The remote version of<br />

this software is vulnerable to a flaw where an authenticated 'secondary admin' user can<br />

bypass security restrictions and gain administrative ability to add and modify user accounts.<br />

This would include the ability to create administrative accounts. An attacker exploiting this<br />

flaw would need a valid 'secondary admin' account.<br />

Solution: Upgrade to version 7.4.18 or higher.<br />

CVE Not available<br />

LDAP Client Anonymous Bind Utilization<br />

<strong>PVS</strong> ID: 4316 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is an LDAP client. Improperly configured LDAP servers will allow any<br />

user to connect to the server and query for information. <strong>PVS</strong> has noted a client that utilized<br />

a NULL LDAP bind request.<br />

Solution: Ensure that such usage is in line with corporate policies regarding authentication and<br />

authorization.<br />

CVE Not available<br />

LDAP Client Anonymous Bind Utilization<br />

<strong>PVS</strong> ID: 4317 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is an LDAP client. Improperly configured LDAP servers will allow any<br />

user to connect to the server and query for information. <strong>PVS</strong> has noted a client that utilized<br />

a NULL LDAP bind request.<br />

Solution: Ensure that such usage is in line with corporate policies regarding authentication and<br />

authorization.<br />

CVE Not available<br />

PeerCast < 0.1218 servhs.cpp handShakeHTTP Function Remote Overflow<br />

<strong>PVS</strong> ID: 4318 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server suffers from a buffer overflow vulnerability.\n\nThe<br />

version of PeerCast installed on the remote host fails to properly sanitize user-supplied data<br />

passed to the 'handShakeHTTP()' function. An unauthenticated attacker can leverage this<br />

issue to crash the affected application and to possibly execute arbitrary code on the remote<br />

host subject to the privileges of the user running PeerCast.<br />

Solution: Upgrade to version 0.1218 or higher.<br />

CVE-2007-6454<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1124


RaidenHTTPD <<br />

<strong>PVS</strong> ID: 4319 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a directory traversal flaw.\n\nThe remote<br />

host is running RaidenHTTPD, a web server for Windows. Specifically, the 'ulang'<br />

parameter of the 'raidenhttpd-admin/workspace.php' script fails to adequately parse<br />

user-supplied data. A request containing '../' would allow an attacker to gain access to files<br />

outside the web root.<br />

Solution: Upgrade to a version higher than 2.0.19.<br />

CVE-2007-6453<br />

CUPS < 1.3.5 Back End SNMP Response Remote Overflow<br />

<strong>PVS</strong> ID: 4320 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the Common Unix Printing System (CUPS) daemon. This version of CUPS is<br />

vulnerable to a remote buffer overflow. The flaw is in the way that CUPS handles SNMP<br />

responses. An attacker sending a malformed SNMP response would be able to execute<br />

arbitrary code on the remote system. In order to exploit this flaw, the attacker would need<br />

for SNMP to be enabled on the CUPS server as well as the ability to intercept and respond<br />

to SNMP messages bound for valid hosts.<br />

Solution: Upgrade to a version 1.3.5 or higher<br />

CVE-2007-5849<br />

ClamAV < 0.92.0 PE File Handling Integer Overflow<br />

<strong>PVS</strong> ID: 4321 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the ClamAV antivirus client version %L\n\nThis version of ClamAV is vulnerable<br />

to a remote integer overflow due to a content-parsing flaw when handling malformed PE<br />

files. An attacker exploiting this flaw would only need the ability to send a malformed<br />

attachment to a system protected by ClamAV. Successful exploitation would result in the<br />

attacker overwriting critical memory blocks and either crashing the service or executing<br />

arbitrary code.<br />

Solution: Upgrade to version 0.92.0 or higher.<br />

CVE-2007-6596<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Flash Player < 9.0.115.0 / 7.0.73.0 APSB07-20 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4322 FAMILY: Web Clients RISK: HIGH NESSUS ID:29741<br />

Family Internet Services 1125


Description: Synopsis :\n\nThe remote Windows host contains a browser plugin that is affected by<br />

multiple issues.\n\n According to its version number, the instance of Flash Player on the<br />

remote Windows host is affected by multiple issues, including several that could allow for<br />

arbitrary code execution by means of a malicious SWF file. The reported version of Flash<br />

Player is: %L<br />

Solution: Upgrade to version 9.0.115.0, 7.0.73.0 or higher.<br />

CVE-2007-6245<br />

Opera < 9.25 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4323 FAMILY: Web Clients RISK: HIGH NESSUS ID:29742<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is affected by several<br />

issues.\n\n The version of Opera installed on the remote host reportedly is affected by<br />

several issues : \n\n - An issue where TLS certificates could be used to execute arbitrary<br />

code.\n\n - The browser processes a 3xx HTTP CONNECT response before a successful<br />

SSL handshake, which could allow a man-in-the-middle attacker to execute arbitrary web<br />

script in the context of a HTTPS server.\n\nThe reported version of Opera is : \n %L<br />

Solution: Upgrade to version 9.25 or higher.<br />

CVE-2007-6524<br />

CuteNews < 1.4.6 search.php files_arch Array Arbitrary File Access<br />

<strong>PVS</strong> ID: 4324 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data\n\nAccording to its version number, the remote host is running a<br />

version of CuteNews that allows an attacker to read files that should not be typically read.<br />

The root of the flaw is in the way that 'search.php' handles user-supplied input. An attacker<br />

exploiting this flaw would only need the ability to send HTTP requests to the 'search.php'<br />

script. Successful exploitation will result in the loss of confidential data.<br />

Solution: Upgrade to version 1.4.6 or higher.<br />

CVE Not available<br />

Gallery < 2.2.4 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4325 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is running Gallery, a web-based photo album application written in PHP. The<br />

version of Gallery installed on the remote host is less than 2.2.4. The vendor has reported<br />

multiple security flaws in this version.<br />

Family Internet Services 1126


Solution: Upgrade to version 2.2.4 or higher.<br />

CVE Not available<br />

Mantis < 0.9.5 / 1.1.0 RC5 view.php HTML Injection<br />

<strong>PVS</strong> ID: 4326 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML injection attack.\n\nThe remote<br />

host appears to be running a vulnerable version of Mantis, a bug tracker web application<br />

written in PHP. The reported version number is '%L'. It is reported that versions lower than<br />

1.1.0 are vulnerable to a persistent HTML injection attack. The root of the flaw is in the<br />

way that Mantis handles user-supplied data to the 'view.php' script. An attacker exploiting<br />

this flaw would only need the ability to send HTTP requests to the 'view.php' script.<br />

Successful exploitation would result in arbitrary code being executed within the browser of<br />

other Mantis users.<br />

Solution: Upgrade to version 0.19.5, 1.0.0 RC5 or higher.<br />

CVE-2008-0404<br />

OpenBiblio < 0.6.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4327 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is missing a critical security patch or<br />

upgrade.\n\nAccording to its version number, the remote host is running a version of<br />

OpenBiblio that is vulnerable to a number of flaws. The reported version info is: \n %L<br />

\n\nOpenBiblio is an open-source, web-based library system. The vendor has released<br />

version 0.6.0 which addresses a number of flaws. An attacker exploiting these flaws would<br />

only require the ability to access the OpenBiblio web interface. Successful exploitation<br />

would allow the attacker to read confidential data and execute malicious code on the local<br />

server, database server and client browser.<br />

Solution: Upgrade to version 0.6.0 or higher.<br />

CVE-2007-6608<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

CMS Made Simple content_css.php templateid Parameter SQL Injection<br />

<strong>PVS</strong> ID: 4328 FAMILY: CGI RISK: HIGH NESSUS ID:29829<br />

Description: Synopsis :\n\nThe remote web server contains a PHP script that is prone to a SQL injection<br />

attack.\n\n The remote host appears to be running CMS Made Simple ( version %L ), a<br />

content management system written in PHP. The version of CMS Made Simple installed on<br />

the remote host fails to sanitize user-supplied input to the 'templateid' parameter of the<br />

'modules/TinyMCE/content_css.php' script before using it in a database query. Regardless<br />

of PHP's 'magic_quotes_gpc' and 'register_globals' settings, an attacker may be able to<br />

exploit this issue to manipulate database queries, leading to disclosure of sensitive<br />

information, modification of data or other attacks against the underlying database.<br />

Family Internet Services 1127


Solution: No solution is known at this time.<br />

CVE-2007-6656<br />

Atlassian JIRA < 3.12.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4329 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:29834<br />

Description: Synopsis :\n\nThe remote web server contains an application that is affected by one or<br />

more vulnerabilities.\n\nAtlassian JIRA, a web-based application for bug tracking, issue<br />

tracking and project management, installed on the remote web server is affected by one or<br />

more of the following issues :\n\n - A cross-site scripting issue due to its failure to sanitize<br />

error messages under a user's control and passed to the '500page.jsp' script before using<br />

them to generate dynamic output.\n\n - A security bypass issue that may allow an attacker<br />

to change JIRA's default language by accessing its first setup page directly.\n\n - A security<br />

bypass issue by which a user may delete a shared filter created by another user.\n<br />

Solution: Upgrade to version 3.12.1 or higher or patch according to vendor recommendations.<br />

CVE-2007-6617<br />

Mort Bay Jetty < 6.1.7 Double Slash Information Disclosure<br />

<strong>PVS</strong> ID: 4330 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:29852<br />

Description: Synopsis :\n\nThe remote web server is affected by an information disclosure<br />

vulnerability.\n\n The remote instance of Mort Bay Jetty allows an attacker to view static<br />

content in WEB-INF and behind security constraints because of the approach it uses to<br />

compact URLs like '/foo///bar'.<br />

Solution: Upgrade to version 6.1.7 or higher.<br />

CVE-2007-6672<br />

PHP < 4.4.8 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4331 FAMILY: Web Servers RISK: HIGH NESSUS ID:29833<br />

Description: Synopsis : \n\nThe remote web server uses a version of PHP that is affected by multiple<br />

issues.\n\n According to its banner, the version of PHP installed on the remote host is older<br />

than 4.4.8. Such versions may be affected by several issues, including integer overflows<br />

involving the 'chunk_split', 'strcspn', and 'strspn' functions, and 'safe_mode' / 'open_basedir'<br />

bypasses. The installed version of PHP is: \n %L<br />

Solution: Upgrade to version 4.4.8 or higher.<br />

CVE-2007-3378<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1128


Vulnerability in SMBv2 Could Allow Remote Code Execution (942624) - <strong>Network</strong> Check<br />

<strong>PVS</strong> ID: 4332 FAMILY: Generic RISK: HIGH NESSUS ID:29855<br />

Description: Synopsis :\n\nIt is possible to execute code on the remote host.\n\nThe remote version of<br />

Windows contains a version of SMBv2 (Server Message Block) protocol that is vulnerable<br />

to several vulnerabilities. An attacker may exploit these flaws to elevate privileges and gain<br />

control of the remote host.\nIAVT Reference : 2007-T-0049\nSTIG Finding Severity :<br />

Category I<br />

Solution: Microsoft has released a set of patches for Windows Vista :<br />

CVE-2007-5351<br />

PostgreSQL Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4333 FAMILY: Database RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running PostgreSQL, an open source relational database. This version is vulnerable to six<br />

distinct remote flaws. The nature of three of these flaws involves privilege escalation. An<br />

attacker exploiting the 'privilege escalation' bugs would either need local access or user<br />

credentials in order to elevate their access. The other three flaws involve remote denial of<br />

service attacks. An attacker exploiting these flaws would not need any sort of credentials<br />

and would have the ability to crash the database service.<br />

Solution: Upgrade to PostgreSQL 7.3.21, 7.4.19, 8.0.15, 8.1.11, 8.2.6 or higher.<br />

CVE-2007-3278<br />

Malicious Website - JavaScript Files Linked on Web Site<br />

<strong>PVS</strong> ID: 4334 FAMILY: Backdoors RISK: HIGH NESSUS ID:29871<br />

Description: Synopsis :\n\nThe remote web server appears to have been compromised.\n\nThe remote<br />

web site appears to link to malicious JavaScript files hosted on a third party web site. This<br />

means that the remote web site has been compromised, and it might infect its visitors as<br />

well. This indicates that the remote web site is vulnerable to SQL injection attacks. The<br />

following page is the one hosting a link to the malicious JavaScript code\n%P<br />

Solution: Restore the web site to its original state and audit your dynamic pages for SQL injection<br />

vulnerabilities.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

SSH Tectia Server < 5.2.4 / 5.3.6 Local Privilege Escalation<br />

<strong>PVS</strong> ID: 4335 FAMILY: SSH RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1129


Description: Synopsis :\n\nThe remote host is vulnerable to a local privilege escalation<br />

flaw.\n\nThe remote host is running SSH Tectia Server, a commercial SSH server.<br />

According to its banner, the installed version of this software contains a local flaw in<br />

the way that it handles command line arguments to the 'ssh-signer' binary. This flaw<br />

is only relevant to Unix machines. An attacker exploiting this flaw would need local<br />

access. Successful exploitation would result in the attacker executing code as the<br />

'root' user.<br />

Solution: Upgrade to version 5.2.4, 5.3.6 or higher.<br />

CVE-2007-5616<br />

MaxDB Version Detection<br />

<strong>PVS</strong> ID: 4336 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running MaxDB version %L<br />

Solution: Ensure you are running the latest version of MaxDB.<br />

CVE Not available<br />

SAP DB / MaxDB Cons Program Arbitrary Command Execution<br />

<strong>PVS</strong> ID: 4337 FAMILY: Database RISK: HIGH NESSUS ID:29924<br />

Description: Synopsis :\n\nThe remote database service allows execution of arbitrary commands.\n\n<br />

The version of SAP DB / MaxDB installed on the remote host fails to sanitize user-supplied<br />

input to the 'show' and 'exec_sdbinfo' commands before passing it to a 'system()' call. An<br />

unauthenticated remote attacker can leverage this issue to execute arbitrary commands on<br />

the affected host subject to the privileges under which the service operates, which under<br />

Windows is SYSTEM.<br />

Solution: No solution is known at this time.<br />

CVE-2008-0244<br />

Horde Imp < 4.1.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4338 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

Horde Imp installed on the remote host suffers from a number of flaws. A failure to sanitize<br />

user-supplied input could lead to a situation where an attacker can inject malicious HTML<br />

code or delete arbitrary email messages.<br />

Solution: Upgrade to version 4.1.6 or higher.<br />

CVE-2007-6018<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1130


Lotus Domino < 7.0.2 FP3 Unspecified DoS<br />

<strong>PVS</strong> ID: 4339 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:29925<br />

Description: Synopsis :\n\nThe remote host has an application that is affected by a denial of service<br />

vulnerability.\n\n The version of Lotus Domino on the remote host appears to be older than<br />

7.0.2 FP3. According to IBM, such versions are potentially affected by an unspecified<br />

denial of service issue (SPR #WRAY6WHTCC).<br />

Solution: Upgrade to version 7.0.2 FixPack3 or higher.<br />

CVE-2008-0243<br />

Sun Java System Identity Manager Version Detection<br />

<strong>PVS</strong> ID: 4340 FAMILY: CGI RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Sun Java System Identity Manager version %L<br />

Solution: Ensure that you are running the latest version of Identity Manager.<br />

CVE Not available<br />

Sun Java System Identity Manager XSS<br />

<strong>PVS</strong> ID: 4341 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running Sun Java System Identity Manager. The reported version (%L) is<br />

vulnerable to multiple cross-site scripting (XSS) attacks. An attacker exploiting these flaws<br />

would be able to inject script code into the browsers of other clients of the Identity<br />

Manager. Successful exploitation could result in the loss of confidential client data.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2008-0241<br />

netOctopus Agent Detection (UDP)<br />

<strong>PVS</strong> ID: 4342 FAMILY: Generic RISK: INFO NESSUS ID:29930<br />

Description: Synopsis :\n\nAn asset management agent is listening on the remote host.\n\n The remote<br />

service is a netOctopus Agent, the component of the netOctopus asset management<br />

software suite installed on individual computers.<br />

Solution: Filter incoming traffic to this port.<br />

CVE Not available<br />

netOctopus Server Detection (UDP)<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1131


<strong>PVS</strong> ID: 4343 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nAn asset management server is running on the remote host.\n\n The remote<br />

service is a netOctopus Server, the server component of the netOctopus asset management<br />

software suite.<br />

Solution: Filter incoming traffic to this port.<br />

CVE Not available<br />

QuickTime < 7.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4344 FAMILY: Web Clients RISK: HIGH NESSUS ID:29982<br />

Description: Synopsis : \n\nThe remote host contains an application that is affected by multiple<br />

vulnerabilities.\n\n The version of QuickTime installed on the remote host is older than 7.4.<br />

Such versions contain several vulnerabilities that may allow an attacker to execute arbitrary<br />

code on the remote host if a user opens a specially-crafted movie or PICT file with<br />

QuickTime. The installed version of QuickTime is: \n %L<br />

Solution: Upgrade to version 7.4 or higher.<br />

CVE-2008-0036<br />

WinErr Messages OS Detection<br />

<strong>PVS</strong> ID: 4345 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Description: According to the Windows error report that was just sent to watson.microsoft.com, the<br />

remote host is running Microsoft operating system version %L<br />

Solution: N/A<br />

CVE Not available<br />

MyBB < 1.2.11 forumdisplay.php sortby Parameter Command Execution<br />

<strong>PVS</strong> ID: 4346 FAMILY: CGI RISK: HIGH NESSUS ID:29996<br />

Description: Synopsis :\n\nThe remote web server contains a PHP script that allows arbitrary command<br />

execution.\n\n The version of MyBB installed on the remote host fails to sanitize input to<br />

the 'sortby' parameter of the 'forumdisplay.php' script before using it in an 'eval()' statement<br />

to evaluate PHP code. An unauthenticated attacker can leverage this issue to execute<br />

arbitrary code on the remote host subject to the privileges of the web server user ID. In<br />

addition, this version of MyBB is vulnerable to several SQL injection attacks that, if<br />

exploited, would give the attacker the ability to execute arbitrary SQL commands on the<br />

database server utilized by MyBB.<br />

Solution: Upgrade to version 1.2.11 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1132


CVE-2008-0383<br />

Winamp < 5.52 Ultravox Streaming Metadata Parsing Buffer Overflows<br />

<strong>PVS</strong> ID: 4347 FAMILY: Generic RISK: HIGH NESSUS ID:29998<br />

Description: Synopsis :\n\nThe remote Windows host contains a multimedia application that is affected<br />

by multiple buffer overflow vulnerabilities.\n\nThe remote host is using Winamp, a popular<br />

media player for Windows. The version of Winamp installed on the remote Windows host<br />

reportedly contains two stack-based buffer overflows in 'in_mp3.dll' when parsing Ultravox<br />

streaming metadata that can be triggered by overly-long '' and '' tag values.<br />

If an attacker can trick a user on the affected host into opening a specially-crafted file, he<br />

may be able to leverage this issue to execute arbitrary code on the host subject to the user's<br />

privileges.<br />

Solution: Upgrade to version 5.52 or higher.<br />

BoastMachine <<br />

CVE-2008-0065<br />

<strong>PVS</strong> ID: 4348 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe<br />

remote host is running BoastMachine, a blogging software, version %L.\nThis<br />

version of BoastMachine is vulnerable to a flaw in the mail.php script. Specifically,<br />

a remote user can pass arbitrary SQL commands to the mail.php script that would<br />

then be executed on the database server.<br />

Solution: Upgrade to a version higher than 3.1.<br />

CVE-2008-0422<br />

WebSphere serveServletsByClassnameEnabled Unspecified Vulnerability<br />

<strong>PVS</strong> ID: 4349 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is a WebSphere application server. The reported version number is '%L'.\nThis<br />

version is reported to be vulnerable to a flaw in the serveServletsByClassnameEnabled<br />

module. While the details of this flaw are currently unknown, the vendor has released a fix.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2008-0389<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

WebSphere serveServletsByClassnameEnabled Unspecified Vulnerability<br />

<strong>PVS</strong> ID: 4350 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1133


Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote server is a WebSphere application server. The reported version number is<br />

'%L'.\nThis version is reported to be vulnerable to a flaw in the<br />

serveServletsByClassnameEnabled module. While the details of this flaw are currently<br />

unknown, the vendor has released a fix.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2008-0389<br />

Coppermine Photo Gallery < 1.4.11 Album Password Cookie SQL Injection<br />

<strong>PVS</strong> ID: 4351 FAMILY: CGI RISK: HIGH NESSUS ID:31137<br />

Description: Synopsis : \n\nThe remote web server contains a PHP application that is prone to a SQL<br />

injection attack.\n\nThe version of Coppermine installed on the remote host fails to sanitize<br />

user-supplied input to the album password cookie before using it in a database query in the<br />

'get_private_album_set' function in 'include/functions.inc.php'. Regardless of PHP's<br />

'magic_quotes_gpc' setting, an attacker may be able to exploit this issue to manipulate<br />

database queries, leading to disclosure of sensitive information, execution of arbitrary code<br />

or attacks against the underlying database.<br />

Solution: Upgrade to version 1.4.11 or higher.<br />

CVE-2007-1107<br />

Citadel < 7.11 makeuserkey Function RCPT TO Command Remote Overflow<br />

<strong>PVS</strong> ID: 4352 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Citadel, a messaging software for Unix systems. There is a buffer overflow<br />

vulnerability in the remote version of this software that may be exploited by an attacker to<br />

execute arbitrary commands on the remote host. The flaw stems from a flaw when handling<br />

user-supplied 'RCPT TO' data. The application cannot handle 'RCPT TO' strings that are<br />

greater than 4096 bytes.<br />

Solution: Upgrade to version 7.11 or higher.<br />

CVE-2008-0394<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

MyBB < 1.2.12 private.php options[disablesmilies] Parameter SQL Injection<br />

<strong>PVS</strong> ID: 4353 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe version of<br />

MyBB installed on the remote host fails to sanitize input to the 'options[disablesmilies]'<br />

parameter of the 'private.php' script before using it in a SQL query. An attacker exploiting<br />

this flaw would need to be able to authenticate with a valid user ID and send data to the<br />

private.php script. Successful exploitation would result in the attacker executing arbitrary<br />

SQL commands on the database server utilized by MyBB.<br />

Family Internet Services 1134


Solution: Upgrade to version 1.2.12 or higher.<br />

CVE-2008-0787<br />

Tivoli Provisioning Manager < 5.1.0.3 DoS<br />

<strong>PVS</strong> ID: 4354 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running the IBM 'Tivoli Provisioning Manager for OS deployment' version<br />

%L\nThis version of the software is vulnerable to a flaw in the way that it handles<br />

malformed requests. An attacker exploiting this flaw can cause a crash that would affect all<br />

of the Tivoli services on the server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2008-0401<br />

WebSphere Application Server < 6.0.2.25 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4355 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote<br />

server is a WebSphere application server. The reported version number is '%L'.\nThis<br />

version is reported to be vulnerable to a number of flaws. First, there is a reported flaw in<br />

the way that the administrative console monitors role users. Second, there is a buffer<br />

overflow in the default messaging component. Third, there is an unspecified flaw in the<br />

Java Transaction service. Fourth, there is an information disclosure flaw in the<br />

'http_plugin.log' file. Fifth, there is an information disclosure flaw in the<br />

'PropFilePasswordEncoder' utility. The details of these flaws are currently unknown;<br />

however, the vendor has released a patch to address these issues.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2008-0741<br />

NetCache Version Detection<br />

<strong>PVS</strong> ID: 4356 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the NetCache proxy. NetCache is a content-filtering proxy that<br />

allows users to access the Internet through a common portal. The reported version is: %L<br />

Solution: Upgrade or patch according to vendor recommednations.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Web Wiz Forums < 9.08 Multiple Script Directory Traversals<br />

<strong>PVS</strong> ID: 4357 FAMILY: CGI NESSUS ID:Not Available<br />

Family Internet Services 1135


RISK:<br />

MEDIUM<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a directory traversal flaw.\n\nThe remote<br />

host is running Web Wiz Forums, a free tool for generating web-based forums. The<br />

reported version (%L) is reported to be vulnerable to a number of flaws that, if executed,<br />

would give an attacker access to confidential data. Specifically, the 'sub' parameter of the<br />

'RTE_file_browser.asp' script fails to sanitize user-supplied data of the form '../'. An<br />

attacker can use this flaw to access data outside of the web directories. This same flaw can<br />

also be exploited via the 'file_browser.asp' script.<br />

Solution: Upgrade to version 9.08 or higher.<br />

CVE-2008-0481<br />

DB2 < 8.1 FixPak 16 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4358 FAMILY: Database RISK: HIGH NESSUS ID:30153<br />

Description: Synopsis :\n\nThe remote database server is affected by multiple issues.\n\nAccording to its<br />

version, the installation of DB2 on the remote host is affected by one or more of the<br />

following issues :\n\n - A local user may be able to gain root privileges using the 'db2pd'<br />

tool (IZ03546).\n - The 'b2dart' tool executes a TPUT command that effectively allows<br />

users to run commands as the DB2 instance owner (IZ03647).\n - A buffer overflow and<br />

invalid memory access vulnerability exists in the DAS server code (IZ05496).\n - An<br />

unspecified vulnerability in 'SYSPROC.ADMIN_SP_C' (IZ06972).\n - An unspecified<br />

vulnerability exists due to incorrect authorization checking in 'ALTER TABLE' statements<br />

(IZ07337).<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2008-0698<br />

MicroTik Router Version Detection<br />

<strong>PVS</strong> ID: 4359 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a MicroTik router. The reported version is: %L<br />

Solution: Ensure that you are running the latest version of MicroTik router.<br />

CVE Not available<br />

MicroTik Router Version Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4360 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a MicroTik router. The reported version is: %L<br />

Solution: Ensure that you are running the latest version of MicroTik router.<br />

Family Internet Services 1136


CVE Not available<br />

WS_FTP Server < 6.1.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4361 FAMILY: FTP Servers RISK: HIGH NESSUS ID:40771<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThis host is<br />

running a vulnerable version of WS_FTP FTP server. Versions up to and including 6.1.0<br />

are reported prone to multiple flaws:\n\n - A vulnerability caused by an improper handling<br />

of UDP packets within the FTP log server. An attacker can exploit this to crash the affected<br />

service. (CVE-2008-0608)\n\n - A buffer overflow vulnerability in the SSH server service<br />

when handling arguments to the 'opendir' command. (CVE-2008-0590)\n\n - An<br />

information disclosure vulnerability when processing HTTP requests for the<br />

'FTPLogServer/LogViewer.asp' script. An attacker can exploit this to gain access to the log<br />

viewing interface. (CVE-2008-5692)\n\nThe reported version of WS_FTP is\n%L<br />

Solution: Upgrade to version 6.1.1 or higher.<br />

CVE-2008-5693<br />

iPhoto < 7.1.2 Photocast Subscription Format String<br />

<strong>PVS</strong> ID: 4362 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:30201<br />

Description: Synopsis :\n\nThe remote Mac OS X host contains an application that is affected by a<br />

format string vulnerability.\n\nThe remote host is running a version of iPhoto older than<br />

version 7.1.2. Such versions are reportedly affected by a format string vulnerability. If an<br />

attacker can trick a user on the affected host into subscribing to a specially-crafted<br />

photocast, he may be able to leverage these issues to execute arbitrary code on the affected<br />

host subject to the user's privileges.<br />

Solution: Upgrade to version 7.1.2 or higher.<br />

CVE-2008-0043<br />

QuickTime < 7.4.1 RTSP Response Handling Overflow<br />

<strong>PVS</strong> ID: 4363 FAMILY: Web Clients RISK: HIGH NESSUS ID:30204<br />

Description: Synopsis :\n\nThe remote Windows host contains an application that is affected by a buffer<br />

overflow vulnerability.\n\nThe version of QuickTime installed on the remote Windows host<br />

is older than 7.4.1. Such versions contain a heap buffer overflow in the application's<br />

handling of HTTP responses when RTSP tunneling is enabled. If an attacker can trick a<br />

user to visit a specially-crafted webpage, he may be able to to execute arbitrary code on the<br />

remote host subject to the user's privileges.<br />

Solution: Upgrade to version 7.4.1 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1137


CVE-2008-0234<br />

WordPress < 2.3.3 XML-RPC Unauthenticated Post Modification<br />

<strong>PVS</strong> ID: 4364 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for unauthorized access to<br />

data.\n\nThe version of WordPress installed on the remote host is vulnerable to an<br />

unauthorized access attack. An attacker exploiting this flaw would need the ability to<br />

authenticate as a valid user. Upon authentication, the user would be able to manipulate data<br />

sent to the 'xmlrpc.php' script which would allow for editing of other user posts. The path to<br />

the vulnerable version of WordPress is:\n%P<br />

Solution: Upgrade to version 2.3.3 or higher.<br />

CVE-2008-0664<br />

Firefox < 2.0.0.12 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4365 FAMILY: Web Clients RISK: HIGH NESSUS ID:30209<br />

Description: Synopsis :\n\nThe remote Windows host contains a web browser that is affected by<br />

multiple vulnerabilities.\n\nThe installed version of Firefox is affected by various security<br />

issues :\n\n - Several stability bugs leading to crashes that, in some cases, show traces of<br />

memory corruption\n\n - Several file input focus stealing vulnerabilities that could result in<br />

uploading of arbitrary files provided their full path and file names are known.\n\n - Several<br />

issues that allow scripts from page content to escape from their sandboxed context and/or<br />

run with chrome privileges, resulting in privilege escalation, XSS and/or remote code<br />

execution.\n\n - An issue that could allow a malicious site to inject newlines into the<br />

application's password store when a user saves his password, resulting in corruption of<br />

saved passwords for other sites.\n\n - A directory traversal vulnerability via the 'chrome:'<br />

URI.\n\n - A vulnerability involving 'designMode' frames that may result in web browsing<br />

history and forward navigation stealing.\n\n - A file action dialog tampering vulnerability<br />

involving timer-enabled security dialogs.\n\n - Mis-handling of locally-saved plain text<br />

files.\n\n - Possible disclosure of sensitive URL parameters, such as session tokens, via the<br />

.href property of stylesheet DOM nodes reflecting the final URI of the stylesheet after<br />

following any 302 redirects.\n\n - A failure to display a web forgery warning dialog in<br />

cases where the entire contents of a page are enclosed in a '' tag with absolute<br />

positioning.<br />

Solution: Upgrade to version 2.0.0.12 or higher.<br />

CVE-2008-0416<br />

SeaMonkey < 1.1.8 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4366 FAMILY: Web Clients RISK: HIGH NESSUS ID:30210<br />

Family Internet Services 1138


Description: Synopsis :\n\nA web browser on the remote host is affected by multiple vulnerabilities.<br />

\n\nThe installed version of SeaMonkey is affected by various security issues :\n\n -<br />

Several stability bugs leading to crashes that, in some cases, show traces of memory<br />

corruption\n\n - Several file input focus stealing vulnerabilities that could result in<br />

uploading of arbitrary files provided their full path and file names are known.\n\n - Several<br />

issues that allow scripts from page content to escape from their sandboxed context and/or<br />

run with chrome privileges, resulting in privilege escalation, XSS and/or remote code<br />

execution.\n\n - A directory traversal vulnerability via the 'chrome:' URI.\n\n - A<br />

vulnerability involving 'designMode' frames that may result in web browsing history and<br />

forward navigation stealing.\n\n - Mis-handling of locally-saved plain text files.\n\n -<br />

Possible disclosure of sensitive URL parameters, such as session tokens, via the .href<br />

property of stylesheet DOM nodes reflecting the final URI of the stylesheet after following<br />

any 302 redirects.<br />

Solution: Upgrade to version 1.1.8 or higher.<br />

CVE-2008-0594<br />

Thunderbird < 2.0.0.12 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4367 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe installed<br />

version of Thunderbird is missing a critical patch. The vendor has released a patch that<br />

addresses a number of remote vulnerabilities.<br />

Solution: Upgrade to version 2.0.0.12 or higher.<br />

CVE-2008-0413<br />

Apache Tomcat < 6.0.16 Information Disclosure<br />

<strong>PVS</strong> ID: 4368 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server can be manipulated into disclosing confidential<br />

data.\n\nThe remote host is running a version of Tomcat server lower than 6.0.16. This<br />

version of Tomcat is vulnerable to a flaw in the way that it handles exceptions. According<br />

to the vendor, if an exception occurs during the processing of parameters, the parameters<br />

may be used in future requests to disclose potentially confidential data.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2007-5333<br />

ExtremeZ-IP Version Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4369 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1139


Description: The remote host is running ExtremeZ-IP version: %L\n\nExtremeZ-IP is a software product<br />

that allows for file sharing and printing between Mac and Windows machines.<br />

Solution: Ensure that you are running the latest version of the software.<br />

CVE Not available<br />

F5 BIG-IP Web Management Version Detection<br />

<strong>PVS</strong> ID: 4370 FAMILY: Web Servers RISK: INFO NESSUS ID:30216<br />

Description: Synopsis :\n\nThe remote web server is a web management interface.\n\nThe remote host is<br />

running the F5 Big-IP web management software. The reported version number is: %L<br />

Solution: N/A<br />

CVE Not available<br />

ExtremeZ-IP Version Detection<br />

<strong>PVS</strong> ID: 4371 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:30253<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running ExtremeZ-IP version: %L\n\nExtremeZ-IP is a software product that allows for<br />

file sharing and printing between Mac and Windows machines. This version is reported to<br />

be vulnerable to a number of remote flaws. Specifically, the server is vulnerable to a denial<br />

of service attack within the Service Location Protocol (SLP) and Apple Filing Protocol<br />

(AFP). An attacker exploiting either of these two flaws would send malformed data to the<br />

service, resulting in a loss of service availability. The third flaw is a directory traversal flaw<br />

that would allow an attacker the ability to download certain files (those with an extension<br />

of gif, png, jpg, xml, ico, zip, and html) from outside the defined web directory. This can<br />

lead to a loss of confidential data.<br />

Solution: Upgrade to a version higher than 5.1.2x15.<br />

CVE-2008-0767<br />

Windows Vista Operating System Detection<br />

<strong>PVS</strong> ID: 4372 FAMILY: Operating System Detection RISK: NONE NESSUS ID:Not Available<br />

Description: The remote host is running Windows Vista.<br />

Solution: N/A<br />

CVE Not available<br />

Mac OS X < 10.5.2 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4373 FAMILY: Operating System Detection RISK: HIGH NESSUS ID:30255<br />

Family Internet Services 1140


Description: Synopsis :\n\nThe remote host is missing a Mac OS X update that fixes various security<br />

issues.\n\n The remote host is running a version of Mac OS X that is older than version<br />

10.5.2. Mac OS X 10.5.2 contains several security fixes for a number of programs.<br />

Solution: Upgrade to version 10.5.2 or higher.<br />

CVE-2008-0042<br />

WebDAV Mini Redirector Client Detection<br />

<strong>PVS</strong> ID: 4374 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Windows client utilizes the WebDAV service via the Mini Redirector client<br />

software version: %L<br />

Solution: Ensure that you are running the latest version of WebDAV Mini Redirector.<br />

CVE Not available<br />

ClamAV < 0.92.1 Multiple Overflows<br />

<strong>PVS</strong> ID: 4375 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running ClamAV version: %L\n\nThis version of ClamAV is vulnerable to several flaws<br />

due to the way that it parses user-supplied input. It has been reported that there is a heap<br />

overflow within the 'mew.c' file. It has further been reported that there is an integer<br />

overflow in the 'cli_scanpe' function of the 'pe.c' file. An attacker exploiting these flaws<br />

would either crash the service or execute arbitrary code on the remote machine.<br />

Solution: Upgrade to version 0.92.1 or higher.<br />

CVE-2008-0318<br />

Apache mod_jk2 < 2.0.4 Multiple Overflows<br />

<strong>PVS</strong> ID: 4376 FAMILY: Web Servers RISK: HIGH NESSUS ID:31786<br />

Description: Synopsis :\n\nThe remote host is affected by multiple buffer overflow<br />

vulnerabilities.\n\nThe remote host is running Apache web server with mod_jk2, a<br />

connector that connects a web server such as Apache. According to its banner, the version<br />

of mod_jk2 installed is affected by multiple buffer overflow vulnerabilities. An attacker<br />

may be able to exploit these vulnerabilities to cause a denial-of-service condition or execute<br />

arbitrary code subject to the privileges of the user running the Apache process.<br />

Solution: Upgrade to version 2.0.4 or higher.<br />

CVE-2007-6258<br />

WinIPDS Version Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1141


<strong>PVS</strong> ID: 4377 FAMILY: CGI RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the WinIPDS application. WinIPDS is an advanced function<br />

printing (AFP) and intelligent print data stream (IPDS) print server. The reported version<br />

is: %L<br />

Solution: Ensure that you are running the latest version of this software.<br />

CVE Not available<br />

Flash Media Server Detection<br />

<strong>PVS</strong> ID: 4378 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Adobe Flash Media Server. The reported version is: %L<br />

Solution: N/A<br />

CVE Not available<br />

Flash Media Server Detection<br />

<strong>PVS</strong> ID: 4379 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Adobe Flash Media Server. The reported version is: %L<br />

Solution: N/A<br />

CVE Not available<br />

Flash Media Server Detection<br />

<strong>PVS</strong> ID: 4380 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to several remote overflows.\n\nThe remote<br />

host is running Adobe Flash Media Server. The reported version is: %L\n\nThis version of<br />

Flash Media Server is vulnerable to several flaws. There is a flaw in the way that the server<br />

handles RTMP messages. A specific and malformed request can cause the server to access<br />

memory that has already been de-allocated. Another flaw with the RTMP processing would<br />

allow an attacker to allocate a large buffer that would lead to a corruption of heap memory.<br />

Solution: Upgrade to version 2.0.5 or higher.<br />

CVE-2007-6431<br />

Kerio MailServer < 6.5.0 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4381 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:31119<br />

Family Internet Services 1142


Description: Synopsis :\n\nThe remote mail server is affected by multiple vulnerabilities.\n\nThe remote<br />

host is running Kerio MailServer, a commercial mail server available for Windows, Linux<br />

and Mac OS X platforms. According to its banner, the installed version of Kerio<br />

MailServer is affected by several issues :\n\n - There is a possible buffer overflow in the<br />

Visnetic antivirus plugin.\n\n - There is an unspecified security issue with NULL DACL in<br />

the AVG plugin.\n\n - Memory corruption is possible during uudecode decoding.<br />

Solution: Upgrade to version 6.5.0 or higher.<br />

CVE-2008-0860<br />

SHOUTcast Server Service Port Default Password<br />

<strong>PVS</strong> ID: 4382 FAMILY: Generic RISK: HIGH NESSUS ID:31098<br />

Description: Synopsis :\n\nThe remote service is protected with default credentials.\n\nThe remote<br />

SHOUTcast Server's service port is configured to use the default password to allow<br />

broadcasting content and administration. Knowing it, an attacker can gain administrative<br />

control of the affected application.<br />

Solution: Edit the application's 'sc_serv.ini' file and change the 'Password' setting. Then, restart the<br />

service to put the change into effect.<br />

CVE Not available<br />

BEA WebLogic Server Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4383 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of BEA WebLogic Server that is vulnerable to a number of distinct<br />

flaws. An attacker exploiting these flaws would be able to impact availability,<br />

confidentiality and integrity. The vendor has released new versions of the WebLogic<br />

software that address these issues.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Now SMS/MMS Gateway Version Detection<br />

<strong>PVS</strong> ID: 4384 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Now SMS/MMS Gateway, a commercial product for<br />

managing SMS/MMS messaging on a network. The reported version is: %L<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1143


Apache < 2.2.8 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4385 FAMILY: Web Servers RISK: LOW NESSUS ID:31118<br />

Description: Synopsis :\n\nThe remote web server may be affected by several issues.\n\nThe version of<br />

Apache installed on the remote host is advertising a version older than 2.2.8. Such versions<br />

may be affected by several issues, including :\n\n - A cross-site scripting issue involving<br />

mod_imagemap (CVE-2007-5000).\n\n - A cross-site scripting issue involving 413 error<br />

pages via a malformed HTTP method (PR 44014 / CVE-2007-6203).\n\n - A cross-site<br />

scripting issue in mod_status involving the refresh parameter (CVE-2007-6388).\n\n - A<br />

cross-site scripting issue in mod_proxy_balancer involving the worker route and worker<br />

redirect string of the balancer manager (CVE-2007-6421).\n\n - A denial of service issue in<br />

the balancer_handler function in mod_proxy_balancer can be triggered by an authenticated<br />

user when a threaded Multi-Processing Module is used (CVE-2007-6422).\n\n - A<br />

cross-site scripting issue using UTF-7 encoding in mod_proxy_ftp exists because it does<br />

not define a charset (CVE-2008-0005).<br />

Solution: Upgrade to version 2.2.8 or higher.<br />

CVE-2007-6423<br />

Opera < 9.26 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4386 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:31129<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by several<br />

issues.\n\nThe version of Opera installed on the remote host is reportedly affected by<br />

several issues :\n\n - Simulated text input could trick users into uploading arbitrary<br />

files.\n\n - Image properties comments containing script will be run when displaying the<br />

image properties, leading to code execution in the wrong security context.\n\n -<br />

Representation of DOM attribute values could allow cross-site scripting when importing<br />

XML into a document.<br />

Solution: Upgrade to version 9.26 or higher.<br />

CVE-2008-1082<br />

sapLPD Version Detection<br />

<strong>PVS</strong> ID: 4387 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the SAP Line Printer Daemon (LPD) version: %L<br />

Solution: N/A<br />

CVE Not available<br />

SAPlpd < 6.29 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4388 FAMILY: Generic RISK: HIGH NESSUS ID:31121<br />

Family Internet Services 1144


Description: Synopsis :\n\nThe remote print service is affected by multiple vulnerabilities.\n\nSAPlpd, a<br />

component of SAP GUI, is running on the remote host. According to its version number,<br />

the installation of SAPlpd running on the remote host is affected by several denial of<br />

service and buffer overflow vulnerabilities. An unauthenticated remote attacker can<br />

leverage these issues to crash the affected service or to execute arbitrary code on the<br />

affected host subject to the privileges under which it operates.<br />

Solution: Upgrade to version 6.29 or higher by updating to SAP GUI for Windows version 7.10<br />

Patchlevel 6 / 6.30 Patchlevel 30 / 6.20 Patchlevel 72 or higher.<br />

CVE-2008-0621<br />

Now SMS/MMS Gateway Multiple Remote Overflows<br />

<strong>PVS</strong> ID: 4389 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the Now SMS/MMS Gateway, a commercial product for managing SMS/MMS<br />

messaging on a network. The reported version is: %L\n\nThis version is vulnerable to<br />

several remote overflows. The first affects the HTTP server (which is installed by default).<br />

Long HTTP authorization messages can cause the application to crash. The second<br />

overflow affects the SMPP server (which is not enabled by default). An attacker exploiting<br />

these flaws would be able to execute arbitrary code on the remote system.<br />

Solution: When available, apply the vendor-supplied patch. As a workaround, the administrative<br />

interface allows for the creation of Access Control Lists (ACLs) that restrict the machines<br />

that are allowed to connect to the respective services. Utilize strong ACLs to only allow<br />

traffic from trusted hosts.<br />

CVE-2008-0871<br />

CUPS < 1.3.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4390 FAMILY: Web Servers RISK: LOW NESSUS ID:31131<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nAccording<br />

to its banner, the version of CUPS installed on the remote host contains a number of flaws.<br />

While the details of the flaws are currently unknown, it is alleged that an attacker could<br />

cause the application to crash, possibly executing code.<br />

Solution: Upgrade to version 1.3.6 or later.<br />

CVE-2008-0047<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

PunBB < 1.2.17 Password Reset Information Disclosure<br />

<strong>PVS</strong> ID: 4391 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 1145


Description: Synopsis :\n\nThe remote host relies on pseudo-random data within the authentication<br />

process.\n\nThe version of PunBB installed on the remote host is vulnerable to a password<br />

attack. There is a flaw in the way that PunBB generates random passwords and cookie<br />

seeds. An attacker exploiting this flaw would be able to run efficient brute-force attacks<br />

against passwords that had been recently reset. The root cause of this flaw seems to be the<br />

use of the PHP 'mt_rand()' function which gives, at most, 1,000,000 possible outputs.<br />

Solution: Upgrade to version 1.2.17 or higher.<br />

CVE-2008-1484<br />

Mobilink Monitor Client Detection<br />

<strong>PVS</strong> ID: 4392 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Sybase Mobilink Monitor client. The client is configured to monitor<br />

remote Sybase database servers.<br />

Solution: N/A<br />

CVE Not available<br />

Mobilink Monitor Server Detection<br />

<strong>PVS</strong> ID: 4393 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Sybase Mobilink Monitor server. The Sybase Mobilink Monitor is an<br />

application that ships with the Sybase database. The purpose of Mobilink Monitor is to<br />

allow external machines to monitor the different server processes from a remote machine.<br />

Solution: N/A<br />

CVE Not available<br />

Mobilink Monitor Server Version Detection<br />

<strong>PVS</strong> ID: 4394 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Sybase Mobilink Monitor server. The Sybase Mobilink Monitor is an<br />

application that ships with the Sybase database. The purpose of Mobilink Monitor is to<br />

allow external machines to monitor the different server processes from a remote machine.<br />

The reported version is: %L<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

MobiLink Server < 10.0.1 Build 3649 Multiple Remote Overflows<br />

<strong>PVS</strong> ID: 4395 FAMILY: Web Clients RISK: HIGH NESSUS ID:31719<br />

Family Internet Services 1146


Description: Synopsis :\n\nThe remote Windows host has a program that is prone to a buffer overflow<br />

attack.\n\nThe version of the SQL Anywhere MobiLink Server installed on the remote host<br />

reportedly is affected by a heap-based buffer overflow when handling strings such as the<br />

username, version and remote ID that are longer than 128 bytes. An unauthenticated<br />

attacker may be able to leverage this issue to execute arbitrary code on the affected system.<br />

Solution: Upgrade to SQL Anywhere 10.0.1 build 3649 or higher.<br />

CVE-2008-0912<br />

Sybase SQL Anywhere Database Version Detection<br />

<strong>PVS</strong> ID: 4396 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Sybase SQL Anywhere database server. The reported version is: %L<br />

Solution: N/A<br />

CVE Not available<br />

OSSIM Version Detection<br />

<strong>PVS</strong> ID: 4397 FAMILY: CGI RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Open Source <strong>Security</strong> Information Management (OSSIM)<br />

server. This security software is used for managing security data and tasks. The software is<br />

available via the following URI: '%P' and the reported version is OSSIM %L<br />

Solution: N/A<br />

OSSIM <<br />

CVE Not available<br />

<strong>PVS</strong> ID: 4398 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:31133<br />

Description: Synopsis :\n\nThe remote web server contains a PHP application that is affected by<br />

multiple flaws.\n\nThe remote host is running OSSIM (Open Source <strong>Security</strong> Information<br />

Management), a suite of security tools managed by a web-based front-end. The version of<br />

OSSIM installed on the remote host fails to sanitize user input to the 'dest' parameter of the<br />

'session/login.php' script before using it to generate dynamic HTML output. An<br />

unauthenticated attacker can exploit this to inject arbitrary HTML and script code into a<br />

user's browser to be executed within the security context of the affected site. In addition,<br />

there is a SQL injection flaw within the 'modifyportform.php' script. An attacker exploiting<br />

this flaw would need the ability to authenticate to the application.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2008-0920<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1147


ListManager < 9.3b / 9.2c / 8.95d Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4399 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:31134<br />

Description: Synopsis :\n\nThe remote web server is affected by multiple vulnerabilities.\n\nThe remote<br />

host is running ListManager, a web-based commercial mailing list management application<br />

from Lyris. According to its banner, the version of ListManager installed on the remote<br />

host relies on client-side code to validate unspecified form parameters before processing<br />

them. An attacker who is subscribed to a list managed by the affected application can<br />

reportedly leverage this issue to elevate his privileges to list administrator or gain access to<br />

arbitrary mailing lists. In addition, once administrative access has been granted, another<br />

vulnerability in ListManager's administrative interface allows creation of new accounts that<br />

collide with existing accounts, which results in overwriting data in the existing accounts.<br />

Solution: Upgrade to version 9.3b / 9.2c / 8.95d or higher.<br />

CVE-2007-6319<br />

Generic Botnet Client Detection<br />

<strong>PVS</strong> ID: 4400 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that has been compromised<br />

and is being controlled by a botnet. A botnet is a network of compromised computers that<br />

are remotely controlled by a malicious bot administrator. Botnets are commonly used<br />

for\nsending spam\nrunning Denial of Service (DoS) attacks against other<br />

networks\nscanning and compromising new systems\nInstalling sniffers\nInstalling<br />

keyloggers\nIdentify theft \nThe observed request that was sent to the control bot was '%L'<br />

realtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Server Detection<br />

<strong>PVS</strong> ID: 4401 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that is being used to control<br />

a botnet. A botnet is a network of compromised computers that are remotely controlled by a<br />

malicious bot administrator. Botnets are commonly used for\nsending spam\nrunning<br />

Denial of Service (DoS) attacks against other networks\nscanning and compromising new<br />

systems\ninstalling sniffers\ninstalling keyloggers\nidentify theft\nThe observed bot client<br />

request was '%P' and the response from the server was '%L'<br />

realtime<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1148


Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

H-Sphere Multiple Unspecified Vulnerabilities<br />

<strong>PVS</strong> ID: 4402 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to unspecified remote attack vectors.\n\nThe<br />

remote host is running H-Sphere, a web-based management console for managed service<br />

providers. This version of H-Sphere is vulnerable to a number of flaws that, while not fully<br />

disclosed, have been acknowledged and patched by the vendor.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2008-1049<br />

ActivePDF Server Detection<br />

<strong>PVS</strong> ID: 4403 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running an ActivePDF server. ActivePDF is an application server<br />

that converts different file formats to PDF.<br />

Solution: N/A<br />

CVE Not available<br />

ICQ 6 Version Detection<br />

<strong>PVS</strong> ID: 4404 FAMILY: Internet Messengers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is an ICQ client. ICQ is a messaging software that is used for chat, file<br />

exchange and more. The reported build number is: %L<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

ICQ 6 HTML Code Generation Remote Format String<br />

<strong>PVS</strong> ID: 4405 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote format string flaw.\n\nThe remote<br />

host is an ICQ client. ICQ is a messaging software that is used for chat, file exchange and<br />

more. The reported build number is: %L\nThis version is reported to be vulnerable to a<br />

remote format string overflow. An attacker exploiting this flaw would need to be able to<br />

convince a user to open a specially formatted message. Successful exploitation would result<br />

in the attacker executing arbitrary code on the target machine.<br />

Family Internet Services 1149


Solution: Upgrade to version 6 build 6043 or higher.<br />

CVE-2008-1120<br />

Sony Playstation Version Detection<br />

<strong>PVS</strong> ID: 4406 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Sony Playstation gaming system. The reported version is: %L<br />

Solution: N/A<br />

CVE Not available<br />

PHPMyAdmin < 2.11.5 SQL Injection<br />

<strong>PVS</strong> ID: 4407 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL injection attack.\n\nThe remote host<br />

is running phpMyAdmin, a web interface for administering MySQL database servers. This<br />

version of phpMyAdmin is vulnerable to a SQL injection attack via the '$_REQUEST'<br />

variable. An attacker exploiting this flaw would need to send a specially formatted cookie<br />

containing the attacker's SQL commands. An attacker exploiting this flaw would be able to<br />

execute arbitrary SQL commands on the database server utilized by phpMyAdmin.<br />

Solution: Upgrade to version 2.11.5 or higher.<br />

CVE-2008-1149<br />

Eye-Fi Version Detection<br />

<strong>PVS</strong> ID: 4408 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Eye-Fi, a wireless card and software, that allows users to upload<br />

photos from their wireless devices directly to the web. The reported version of Eye-Fi is:<br />

%L<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

WebSphere MQ Server Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4409 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the WebSphere MQ software. WebSphere MQ (formerly<br />

MQSeries) is an IBM middleware solution that allows different applications and<br />

platforms to communicate with each other.<br />

Family Internet Services 1150


Solution: Ensure that you are running the latest version of WebSphere MQ.<br />

CVE Not available<br />

WebSphere MQ Server Detection<br />

<strong>PVS</strong> ID: 4410 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the WebSphere MQ software. WebSphere MQ (formerly<br />

MQSeries) is an IBM middleware solution that allows different applications and<br />

platforms to communicate with each other.<br />

Solution: Ensure that you are running the latest version of WebSphere MQ.<br />

CVE Not available<br />

Lighttpd < 1.4.19 Information Disclosure<br />

<strong>PVS</strong> ID: 4411 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server can be manipulated to disclose source code.\n\nThe<br />

remote host is running Lighttpd, a small web server. This version of Lighttpd is vulnerable<br />

to an information disclosure flaw. The 'mod_cgi' module, when put under a considerable<br />

load, could fail to fork its process. Such a failure would lead to the web server returning the<br />

source code of the CGI script that had been requested. An attacker exploiting this flaw<br />

would be able to gain access to potentially confidential data.<br />

Solution: Upgrade to version 1.4.19 or higher.<br />

CVE-2008-1111<br />

Borland StarTeam Server Detection<br />

<strong>PVS</strong> ID: 4412 FAMILY: Generic RISK: INFO NESSUS ID:31355<br />

Description: Synopsis :\n\nA software configuration management (SCM) service is listening on the<br />

remote host.\n\nThe remote host is running a Borland StarTeam Server. StarTeam is a<br />

commercial software configuration and change management tool. The reported build<br />

number is: %L<br />

Solution: Limit incoming traffic to this port if desired.<br />

CVE Not available<br />

Perforce Server Version Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4413 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1151


Description: The remote host is running Perforce server, an application for sharing data between<br />

machines. The reported build number is: %L<br />

Solution: Ensure that you are running the latest version of this software.<br />

CVE Not available<br />

Perforce Client Detection<br />

<strong>PVS</strong> ID: 4414 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Perforce client, an application for sharing data between<br />

machines.<br />

Solution: Ensure that you are running the latest version of this software.<br />

CVE Not available<br />

Perforce Proxy Server Detection<br />

<strong>PVS</strong> ID: 4415 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Perforce proxy server. Perforce is an application that is used to<br />

share files between machines. The Perforce suite of products includes a proxy server. This<br />

server is used for remote clients that cannot connect to the default Perforce server port.<br />

Solution: Ensure that you are running the latest version of this software.<br />

CVE Not available<br />

Versant Object Database Version Detection<br />

<strong>PVS</strong> ID: 4416 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Versant Object Database version: %L<br />

Solution: Ensure that you are running the latest version of Versant.<br />

CVE Not available<br />

IBM Rational Clearquest Server Detection<br />

<strong>PVS</strong> ID: 4418 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running IBM Rational Clearquest software. Clearquest is a product<br />

that is used for managing software projects.<br />

Solution: Ensure that you are running the latest version of IBM Rational Clearquest.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1152


Altiris AClient < 6.9.164 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4419 FAMILY: Generic RISK: HIGH NESSUS ID:31417<br />

Description: Synopsis :\n\nThe remote Windows host has a program that is affected by multiple<br />

privilege escalation vulnerabilities.\n\nThe version of the Altiris Client Agent (aclient)<br />

installed on the remote host is reportedly susceptible to a shatter attack that could allow a<br />

local user to elevate his or her privileges on the affected system.<br />

Solution: Upgrade to version 6.9.164 or higher.<br />

CVE-2008-1754<br />

phpList < 2.10.9 Multiple Remote File Inclusion<br />

<strong>PVS</strong> ID: 4420 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server contains a PHP application that is susceptible to<br />

multiple remote file inclusion attacks.\n\nThe version of phpList installed on the remote<br />

host fails to filter user input to the '_SERVER[ConfigFile]' and '_ENV[CONFIG]'<br />

parameters of the 'admin/index.php' script before passing it to PHP 'include()' functions.<br />

Provided PHP's 'register_globals' setting is disabled, an unauthenticated attacker can exploit<br />

this issue to view arbitrary files on the remote host or to execute arbitrary PHP code,<br />

possibly taken from third-party hosts. The reported version of phpList is: \n %L<br />

Solution: Upgrade to version 2.10.9 or higher.<br />

CVE Not available<br />

Vulnerability in Microsoft Outlook Could Allow Remote Code Execution (949031)<br />

<strong>PVS</strong> ID: 4421 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:31414<br />

Description: Synopsis :\n\nArbitrary code can be executed on the remote host through the email<br />

client.\n\nThe remote host is running a version of Outlook or Exchange that is vulnerable to<br />

a bug when processing a specially malformed URI mailto: link, which can let an attacker<br />

execute arbitrary code on the remote host by sending a specially crafted email.\nIAVA<br />

Reference : 2008-A-0012\nSTIG Finding Severity : Category II<br />

Solution: Microsoft has released a set of patches for Outlook 2000, XP, 2003 and 2007.<br />

SSF Server Detection<br />

CVE-2008-0110<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4422 FAMILY: SSH RISK: LOW NESSUS ID:31421<br />

Description: Synopsis :\n\nThe remote version of the SSH server is no longer maintained.\n\nAccording<br />

to its banner, the remote SSH server is a SSF derivative. SSF had been written to be<br />

compliant with restrictive laws on cryptography in some European countries. These<br />

regulations have been softened and OpenSSH received a formal authorization from the<br />

Family Internet Services 1153


French administration in 2002 and the development of SSF has been discontinued. SSF is<br />

based upon an old version of OpenSSH and it implements an old version of the protocol.<br />

As it is no longer maintained, it might be vulnerable to dangerous flaws.<br />

Solution: Remove SSF and install an up-to-date version of OpenSSH.<br />

CVE Not available<br />

Informix Dynamic Server Multiple Remote Overflows<br />

<strong>PVS</strong> ID: 4423 FAMILY: Database RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the Informix database server version '%L'.\nThis version of Informix is reported<br />

to be vulnerable to a number of remote flaws. While the details of the flaw are currently<br />

unknown, it is believed that a successful attack would result in the attacker overflowing a<br />

memory buffer and either executing arbitrary code or crashing the service.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2008-0949<br />

IBM WebSphere Application Server < 6.1.0.15 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4424 FAMILY: Web Servers RISK: HIGH NESSUS ID:45422<br />

Description: Synopsis :\n\nThe remote application server is affected by multiple vulnerabilities.\n\nIBM<br />

WebSphere Application Server 6.1 before Fix Pack 15 appears to be running on the remote<br />

host. Such versions are reportedly affected by the following vulnerabilities :\n\n - There is<br />

an unspecified security exposure in wsadmin (PK45726).\n\n - Sensitive information might<br />

appear in clear text in the http_plugin.log file (PK48785).\n\n - There is an unspecified<br />

potential security exposure in the 'PropFilePasswordEncoder' utility (PK52709).\n\n - There<br />

is an unspecified potential security exposure with 'serveServletsByClassnameEnabled'<br />

(PK52059).\n\n - Sensitive information may appear in plain text in startserver.log<br />

(PK53198).<br />

Solution: Apply Fix Pack 15 (6.1.0.15) or higher.<br />

CVE Not available<br />

Apple iPhone < 1.1.4 Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4425 FAMILY: Mobile Devices RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is an Apple iPhone. This version of iPhone is vulnerable to a flaw in the way<br />

that the Safari browser handles memory. Specifically, when all memory has been utilized<br />

by the browser, it will attempt to close all inactive documents. In the process of closing<br />

these documents, a kernel panic and ensuing crash occurs. An attacker exploiting this flaw<br />

would need to be able to entice an iPhone user to browse to a malicious web server.<br />

Successful exploitation would result in the device crashing.<br />

Family Internet Services 1154


Solution: Upgrade the iPhone software to version 1.1.4 or higher.<br />

CVE-2008-0729<br />

KiSS PC-Link Server Detection (TCP)<br />

<strong>PVS</strong> ID: 4426 FAMILY: Policy RISK: INFO NESSUS ID:31464<br />

Description: Synopsis :\n\nA multimedia streaming service is listening on the remote host.\n\nThe<br />

remote service is a PC-Link server, used for streaming videos, music, and pictures to a<br />

KiSS player. The observed request was '%P'\nThe observed response of files being shared<br />

on the remote server was:\n %L<br />

Solution: Ensure that use of this software is in accordance with your corporate security policy. If this<br />

service is unwanted or not needed, disable it or filter incoming traffic to this port.<br />

CVE Not available<br />

KiSS PC-Link Server Detection (UDP)<br />

<strong>PVS</strong> ID: 4427 FAMILY: Policy<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:31465<br />

Description: Synopsis :\n\nA multimedia streaming service is listening on the remote host.\n\nThe<br />

remote service is a PC-Link server, used for streaming videos, music, and pictures to a<br />

KiSS player, and this port is used by a player when searching for a PC-Link server.<br />

Solution: Ensure that use of this software is in accordance with your corporate security policy. If this<br />

service is unwanted or not needed, disable it or filter incoming traffic to this port.<br />

CVE Not available<br />

KiSS PC-Link Client Detection<br />

<strong>PVS</strong> ID: 4428 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nA multimedia client is active on the remote host.\n\nThe remote computer is<br />

running a PC-Link client, used for receiving streaming videos, music, and pictures from a<br />

KiSS server.<br />

Solution: Ensure that use of this software is in accordance with your corporate security policy. If this<br />

service is unwanted or not needed, disable it or filter outbound traffic.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

VLC Media Player < 0.8.6f Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4429 FAMILY: Web Clients RISK: HIGH NESSUS ID:31853<br />

Family Internet Services 1155


Description: Synopsis :\n\nThe remote Windows host contains a media player that is affected by several<br />

vulnerabilities.\n\nThe version of VLC Media Player installed on the remote host is<br />

reportedly affected by several security issues :\n\n - A subtitle buffer overflow<br />

(CVE-2007-6681).\n - A Real RTSP code execution problem (CVE-2008-0073).\n - MP4<br />

integer overflows (CVE-2008-1489).\n - A cinepak integer overflow.<br />

Solution: Upgrade to version 0.8.6f or higher.<br />

CVE-2007-6682<br />

VLC Media Player Detection<br />

<strong>PVS</strong> ID: 4430 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the VLC Media Player version %L. VLC is a multimedia player<br />

that is used to view movies or listen to audio.<br />

Solution: Ensure that such usage is in alignment with corporate policies and guidelines.<br />

NetWin SurgeMail <<br />

CVE Not available<br />

<strong>PVS</strong> ID: 4431 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running NetWin SurgeMail, a mail server application. The remote version of this software<br />

is vulnerable to a remote buffer overflow in its IMAP component and exploit code was<br />

released. Specifically, a malformed 'LIST' command can cause the application to fail,<br />

possibly executing arbitrary code. An attacker exploiting this flaw would need the ability to<br />

authenticate as a valid user.<br />

Solution: Upgrade to a version higher than 3.8k4-4.<br />

CVE-2008-1497<br />

F-Secure Multiple Products Unspecified Code Execution<br />

<strong>PVS</strong> ID: 4432 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the F-Secure antivirus software package. This version of F-Secure is vulnerable to<br />

a content-parsing flaw in the way that it handles malformed files. An attacker exploiting<br />

these flaws would be able to crash the remote firewall/antivirus software or possibly<br />

execute arbitrary code.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2008-1412<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1156


Check for Windows Update Traffic<br />

<strong>PVS</strong> ID: 4433 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is enabled and utilizing Microsoft Windows Update. This service<br />

allows users to check for missing updates and initiate remediation via the Microsoft<br />

update site. Depending on your individual policy, this may or may not be a desirable<br />

action.<br />

Solution: Ensure that Windows Update utilization is a valid use of company resources.<br />

CVE Not available<br />

Mac OS X Safari < 3.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4434 FAMILY: Web Clients RISK: HIGH NESSUS ID:31604<br />

Description: Synopsis : \n\nThe remote host web browser is affected by multiple vulnerabilities.\n\nThe<br />

remote Mac OS X host is running a version of Safari that is older than version 3.1. The<br />

remote version of this software contains several security vulnerabilities that may allow an<br />

attacker to execute arbitrary code or a cross-site scripting attack on the remote host. To<br />

exploit these flaws, an attacker would need to convince a victim to visit a rogue web site or<br />

open a malicious HTML file. The exact version number that <strong>PVS</strong> observed was: \n %L<br />

Solution: Upgrade to version 3.1 or higher.<br />

CVE-2008-0050<br />

Mac OS X Version Detection<br />

<strong>PVS</strong> ID: 4435 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Mac OS X version: '%L'<br />

Solution: N/A<br />

cPanel <<br />

CVE Not available<br />

<strong>PVS</strong> ID: 4436 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running cPanel, a web-hosting control panel. The remote<br />

version of this software is vulnerable to an information disclosure flaw. Specifically, the<br />

'showtree' parameter of the 'frontend/x/diskusage/index.html' script fails to sanitize<br />

user-supplied data. An attacker exploiting this flaw would be able to gain information<br />

regarding the programs and files utilized by the server. This information may be useful in<br />

more sophisticated attacks.<br />

Family Internet Services 1157


Solution: No solution is known at this time.<br />

AFP Server Detection<br />

CVE-2008-7142<br />

<strong>PVS</strong> ID: 4437 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is an AFP Server. Apple Filing Protocol (AFP) is a service that allows<br />

network-based file sharing between machines. The server supports AFP version %P.<br />

Solution: Ensure that this file server is authorized and configured correctly.<br />

AFP Server Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 4438 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is an AFP Server. Apple Filing Protocol (AFP) is a service that allows<br />

network-based file sharing between machines. The server supports AFP protocol<br />

versions\n%L.<br />

Solution: Ensure that this file server is authorized and configured correctly.<br />

AFP Client Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 4439 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is an AFP Client. Apple Filing Protocol (AFP) is a service that allows<br />

network-based file sharing between machines. The client is using AFP protocol version %L<br />

Solution: N/A<br />

CVE Not available<br />

Generic Botnet Client Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4440 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that has been compromised<br />

and is being controlled by a botnet. A botnet is a network of compromised computers that<br />

are remotely controlled by a malicious bot Administrator. Botnets are commonly used<br />

for\nsending spam\nrunning Denial of Service (DoS) attacks against other<br />

networks\nscanning and compromising new systems\ninstalling sniffers\ninstalling<br />

keyloggers\nidentify theft \n\nThe observed request that was sent to the control bot was<br />

'%P' and the observed response from the infected botnet client was '%L'<br />

Family Internet Services 1158


ealtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Server Detection<br />

<strong>PVS</strong> ID: 4441 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that is a server within a<br />

botnet network. A botnet is a network of compromised computers that are remotely<br />

controlled by a malicious bot administrator. Botnets are commonly used for\nsending<br />

spam\nrunning Denial of Service (DoS) attacks against other networks\nscanning and<br />

compromising new systems\ninstalling sniffers\ninstalling keyloggers\nidentify theft<br />

\n\nThe observed command being sent from the server was '%L'<br />

realtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Client Detection<br />

<strong>PVS</strong> ID: 4442 FAMILY: IRC Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that has been compromised<br />

and is being controlled by a botnet. A botnet is a network of compromised computers that<br />

are remotely controlled by a malicious bot administrator. Botnets are commonly used<br />

for\nsending spam\nrunning Denial of Service (DoS) attacks against other<br />

networks\nscanning and compromising new systems\ninstalling sniffers\ninstalling<br />

keyloggers\nidentify theft\nThe observed command was '%P'\n<br />

realtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

Orb Client Detection<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4443 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1159


Description: The remote host is running the Orb streaming media client. Orb is a multimedia client that<br />

is used to stream multimedia to a variety of devices. The user account and software version<br />

information is '%L'<br />

Solution: Ensure that such usage is in alignment with corporate policies and guidelines.<br />

CVE Not available<br />

PHP < 5.2.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4444 FAMILY: Web Servers RISK: HIGH NESSUS ID:31649<br />

Description: Synopsis : \n\nThe remote web server uses a version of PHP that is affected by multiple<br />

buffer overflows.\n\n According to its banner, the version of PHP installed on the remote<br />

host is older than 5.2.0. Such versions may be affected by several buffer overflows. To<br />

exploit these issues, an attacker would need the ability to upload an arbitrary PHP script to<br />

the remote server, or to be able to manipulate several variables processed by some PHP<br />

functions such as htmlentities(). The reported version of PHP is: \n %L<br />

Solution: Upgrade to version 5.2.0 or higher.<br />

CVE Not available<br />

SMTP Sender Policy Framework (SPF) Enabled<br />

<strong>PVS</strong> ID: 4445 FAMILY: DNS Servers RISK: INFO NESSUS ID:31658<br />

Description: Synopsis :\n\nThe remote domain name has SPF in place.\n\nThe remote domain name has<br />

SPF (Sender Policy Framework) in place. This mechanism is a way to let a mail server<br />

know which mail servers are authorized to send emails on behalf of your domain.<br />

Solution: N/A<br />

CVE Not available<br />

Thunderbird < 2.0.0.13 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4446 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe installed<br />

version of Thunderbird is missing a critical patch. The vendor has released a patch that<br />

addresses a number of remote vulnerabilities.<br />

Solution: Upgrade to version 2.0.0.13 or higher.<br />

CVE-2008-1241<br />

Firefox < 2.0.0.13 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4447 FAMILY: Web Clients RISK: HIGH NESSUS ID:31652<br />

Family Internet Services 1160


Description: Synopsis :\n\nThe remote Windows host contains a web browser that is affected by<br />

multiple vulnerabilities.\n\n The installed version of Firefox is affected by various security<br />

issues :\n\n - A series of vulnerabilities that allow for JavaScript privilege escalation and<br />

arbitrary code execution.\n - Several stability bugs leading to crashes that, in some cases,<br />

show traces of memory corruption.\n - An HTTP Referer spoofing issue with malformed<br />

URLs.\n - A privacy issue with SSL client authentication.\n - Web content fetched via the<br />

'jar:' protocol can use Java via LiveConnect to open socket connections to arbitrary ports on<br />

the localhost.\n - It is possible to have a background tab create a borderless XUL pop-up in<br />

front of the active tab in the user's browser.<br />

Solution: Upgrade to version 2.0.0.13 or higher.<br />

CVE-2008-1241<br />

SeaMonkey < 1.1.9 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4448 FAMILY: Web Clients RISK: HIGH NESSUS ID:31653<br />

Description: Synopsis :\n\nA web browser on the remote host is affected by multiple<br />

vulnerabilities.\n\nThe installed version of SeaMonkey is affected by various security<br />

issues :\n - A series of vulnerabilities that allow for JavaScript privilege escalation and<br />

arbitrary code execution.\n - Several stability bugs leading to crashes that, in some cases,<br />

show traces of memory corruption.\n - An HTTP Referer spoofing issue with malformed<br />

URLs.\n - A privacy issue with SSL client authentication.\n - Web content fetched via the<br />

'jar:' protocol can use Java via LiveConnect to open socket connections to arbitrary ports on<br />

the localhost.\n - It is possible to have a background tab create a borderless XUL pop-up in<br />

front of the active tab in the user's browser.<br />

Solution: Upgrade to version 1.1.9 or higher.<br />

CVE-2008-0416<br />

IBM Solid Database Version Detection<br />

<strong>PVS</strong> ID: 4449 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Solid Database version: '%L'<br />

Solution: Ensure that you are running the latest version of Solid Database.<br />

CVE Not available<br />

IBM Solid Database Version Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4450 FAMILY: Database RISK: INFO NESSUS ID:53811<br />

Description: The remote host is running Solid Database version: '%L'<br />

Solution: Ensure that you are running the latest version of Solid Database.<br />

Family Internet Services 1161


CVE Not available<br />

GnuPG < 1.4.9 / 2.0.9 Key Import Duplicate ID Memory Corruption<br />

<strong>PVS</strong> ID: 4451 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is running GnuPG. The version of GnuPG is: \n %L \nThis version is<br />

vulnerable to a memory corruption flaw when handling duplicate IDs from a public key<br />

server.<br />

Solution: Upgrade to version 1.4.9, 2.0.9 or higher.<br />

CVE-2008-1530<br />

X2 Thin Client Server Detection<br />

<strong>PVS</strong> ID: 4452 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is an X2 thin client server.<br />

Solution: N/A<br />

CVE Not available<br />

X2 Thin Client Server Detection<br />

<strong>PVS</strong> ID: 4453 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is an X2 thin client server.<br />

Solution: N/A<br />

CVE Not available<br />

Sympa < 5.4 Content-Type Header Remote DoS<br />

<strong>PVS</strong> ID: 4454 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running Sympa, a mailing list manager. This version of Sympa is reported to<br />

be vulnerable to a Denial-of-Service flaw stemming from an inability to properly parse<br />

user-supplied 'Content-Type' headers. An attacker exploiting this flaw would send a<br />

malformed request to the server, causing the service to fail.<br />

Solution: Upgrade to version 5.4 or higher.<br />

CVE-2008-1648<br />

Sympa Application Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1162


<strong>PVS</strong> ID: 4455 FAMILY: CGI RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Sympa, an open-source mailing list software application. The<br />

reported version number is '%L'<br />

Solution: N/A<br />

CVE Not available<br />

CUPS < 1.3.7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4456 FAMILY: Web Servers RISK: LOW NESSUS ID:31730<br />

Description: Synopsis :\n\nThe remote printer service is affected by multiple<br />

vulnerabilities.\n\nAccording to its banner, the version of CUPS installed on the remote<br />

host is affected by several issues :\n\n - A buffer overflow in 'cgiCompileSearch' that can<br />

lead to arbitrary code execution (STR #2729).\n - A GIF image filter overflow involving<br />

'code_size' value from a user-supplied GIF image used in 'gif_read_lzw' (STR #2765).\n -<br />

A temporary file with Samba credentials may be left behind by cupsaddsmb if no Windows<br />

drivers were installed (STR #2779).<br />

Solution: Upgrade to version 1.3.7 or higher.<br />

CVE-2008-1373<br />

Opera < 9.27 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4457 FAMILY: Web Clients RISK: HIGH NESSUS ID:31734<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by several<br />

issues.\n\nThe version of Opera installed on the remote host reportedly is affected by<br />

several issues :\n\n - Resized canvas patterns can lead to a program crash with possible<br />

memory corruption.\n - A newsfeed prompt can cause Opera to execute arbitrary code.\n -<br />

Improved keyboard handling of password inputs.<br />

Solution: Upgrade to version 9.27 or higher.<br />

CVE-2008-1762<br />

QuickTime < 7.4.5 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4458 FAMILY: Web Clients RISK: HIGH NESSUS ID:31735<br />

Description: Synopsis : \n\nThe remote Windows host contains an application that is affected by<br />

multiple vulnerabilities.\n\nThe version of QuickTime installed on the remote Windows<br />

host is older than 7.4.5. Such versions contain several vulnerabilities : \n\n - Untrusted Java<br />

applets may obtain elevated privileges (CVE-2008-1013).\n - Downloading a movie file<br />

may lead to information disclosure (CVE-2008-1014).\n - Viewing a specially-crafted<br />

movie file may lead to a program crash or arbitrary code execution (CVE-2008-1015,<br />

CVE-2008-1016, CVE-2008-1017, CVE-2008-1018, CVE-2008-1021, CVE-2008-1022).\n<br />

- Opening a specially-crafted PICT image file may lead to a program crash or arbitrary<br />

Family Internet Services 1163


code execution (CVE-2008-1019, CVE-2008-1020, CVE-2008-1023). The remote client is<br />

running QuickTime version: \n %L<br />

Solution: Upgrade to version 7.4.5 or higher.<br />

CVE-2008-1023<br />

OpenSSH < 5.0 X11 Forwarding Local Session Hijacking<br />

<strong>PVS</strong> ID: 4459 FAMILY: SSH<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:31737<br />

Description: Synopsis : \n\nThe remote SSH service is prone to an X11 session hijacking<br />

vulnerability.\n\nAccording to its banner, the version of SSH installed on the remote host is<br />

older than 5.0. Such versions may allow a local user to hijack X11 sessions because it<br />

improperly binds TCP ports on the local IPv6 interface if the corresponding ports on the<br />

IPv4 interface are in use. The reported version of SSH is: \n %L<br />

Solution: Upgrade to version 5.0 or higher.<br />

CVE-2008-1483<br />

Apache-SSL Environment Variables Manipulation<br />

<strong>PVS</strong> ID: 4460 FAMILY: Web Servers RISK: HIGH NESSUS ID:31738<br />

Description: Synopsis :\n\nThe remote web server is prone to a memory disclosure / privilege escalation<br />

attack.\n\nAccording to its banner, the version of Apache-SSL installed on the remote host<br />

is older than apache_1.3.41+ssl_1.59. Such versions fail to properly sanitize certificate data<br />

before using it to populate environment variables. By sending a client certificate with<br />

special characters for the subject, a remote attacker can overwrite certain environment<br />

variables used by the web server, resulting in memory disclosure or potential privilege<br />

escalation in a web application.<br />

Solution: Upgrade to apache_1.3.41+ssl_1.59 or higher.<br />

CVE-2008-0555<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Flash Player < 9.0.124.0 APSB08-11 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4461 FAMILY: Web Clients RISK: HIGH NESSUS ID:31799<br />

Description: Synopsis :\n\nThe remote Windows host contains a browser plugin that is affected by<br />

multiple issues.\n\nAccording to its version number ('%L'), the instance of Flash Player on<br />

the remote Windows host is affected by multiple issues, including several that could allow<br />

for arbitrary code execution.\nIAVB Reference : 2008-B-0011\nSTIG Finding Severity :<br />

Category II<br />

Solution: Upgrade to version 9.0.124.0 or higher.<br />

Family Internet Services 1164


CVE-2008-1655<br />

TIBCO Rendezvous < 8.0.1 Remote Overflow<br />

<strong>PVS</strong> ID: 4462 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the TIBCO Rendezvous web server. Rendezvous is part of the TIBCO messaging<br />

suite that facilitates network-based communication. This version of Rendezvous ( %L ) is<br />

vulnerable to a remote buffer overflow. An attacker exploiting this flaw would be able to<br />

execute arbitrary code on the remote Rendezvous server.<br />

Solution: Upgrade to version 8.0.1 or higher.<br />

CVE-2008-1704<br />

Openfire < 3.5.0 Queue Handling Remote DoS<br />

<strong>PVS</strong> ID: 4463 FAMILY: CGI RISK: HIGH NESSUS ID:31855<br />

Description: Synopsis :\n\nThe remote host contains an application that is prone to a denial of service<br />

attack.\n\nThe remote host is running Openfire / Wildfire, an instant messaging server that<br />

supports the XMPP protocol. According to its version, the installation of Openfire or<br />

Wildfire on the remote host suffers from an unspecified denial of service vulnerability that<br />

could bring the server down.<br />

Solution: Upgrade to version 3.5.0 or higher.<br />

CVE-2008-1728<br />

Coppermine Photo Gallery < 1.4.18 Bridge Wizard Cookie SQL Injection<br />

<strong>PVS</strong> ID: 4464 FAMILY: CGI RISK: HIGH NESSUS ID:31859<br />

Description: Synopsis :\n\nThe remote web server contains a PHP application that is prone to a SQL<br />

injection attack.\n\nThe version of Coppermine installed on the remote host fails to sanitize<br />

user-supplied input to the bridge wizard session cookie before using it in a database query<br />

in 'bridge/coppermine.inc.php'. Regardless of PHP's 'magic_quotes_gpc' setting, an attacker<br />

may be able to exploit this issue to manipulate database queries, leading to disclosure of<br />

sensitive information, bypassing authentication, or attacks against the underlying database.<br />

Solution: Upgrade to version 1.4.18 or higher.<br />

CVE-2008-1841<br />

ClamAV < 0.93.0 Multiple Overflows<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4465 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1165


Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running ClamAV version: %L\n\nThis version of ClamAV is vulnerable to several flaws<br />

due to the way that it parses user-supplied input. It has been reported that there is a heap<br />

overflow within the 'libclamav/pe.c' file. An attacker exploiting these flaws would either<br />

crash the service or execute arbitrary code on the remote machine.<br />

Solution: Upgrade to version 0.93.0 or higher.<br />

CVE-2008-1837<br />

OTRS < 2.1.8 / 2.2.6 SOAP Interface Authentication Bypass<br />

<strong>PVS</strong> ID: 4466 FAMILY: CGI RISK: HIGH NESSUS ID:31789<br />

Description: Synopsis :\n\nThe remote web server contains a CGI script that does not properly check for<br />

authentication.\n\nThe remote host is running OTRS, a web-based ticketing request system.<br />

The version of OTRS, '%L', installed on the remote host allows a remote attacker to read<br />

and modify objects via the OTRS SOAP interface without any credentials.<br />

Solution: Upgrade to version 2.1.8 / 2.2.6 or higher.<br />

CVE-2008-1515<br />

MarketFirst Software Detection<br />

<strong>PVS</strong> ID: 4467 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the MarketFirst marketing application. This application is used<br />

to track downloads, users, preferences and more. The observed request to this server<br />

was:\n%P<br />

Solution: Ensure that this service is authorized according to policies and guidelines.<br />

CVE Not available<br />

MarketFirst Client Detection<br />

<strong>PVS</strong> ID: 4468 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client was just observed being tracked by a MarketFirst server. The observed<br />

request was: \n %L \n\nMarketFirst is used to track downloads, users, preferences and<br />

more.<br />

Solution: N/A<br />

CVE Not available<br />

Potential SPAM Server Detection<br />

<strong>PVS</strong> ID: 4469 FAMILY: SMTP Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 1166


Description: The remote server is forwarding email in a manner consistent with many SPAM/UCE<br />

servers. The SMTP header that <strong>PVS</strong> flagged on was: \n %L<br />

realtime<br />

Solution: Ensure that this email server is authorized to send SPAM/UCE emails.<br />

CVE Not available<br />

Malicious Website - Embedded Iframe Detection<br />

<strong>PVS</strong> ID: 4470 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server may have had malicious code injected.\n\nThe remote<br />

web server may have been infected with a malicious 'IFRAME' tag. These tags usually<br />

point to a malicious site that is hosting code designed to subvert the security of the client<br />

machine. The observed iframe was '%L'<br />

Solution: Ensure that the server is not serving malicious or injected IFRAME tags.<br />

CVE Not available<br />

Malware Payload Code Detection<br />

<strong>PVS</strong> ID: 4471 FAMILY: Backdoors RISK: HIGH NESSUS ID:31854<br />

Description: Synopsis :\n\nThe remote service appears to be distributing the payload of malware<br />

code.\n\nThe remote port seems to be sending the payload of a malware. This is used by<br />

malware when spreading by infecting other hosts. The system is probably infected by a<br />

worm or a Trojan horse.<br />

Solution: Inspect the system for malicious code and follow appropriate incident response procedures.<br />

CVE Not available<br />

Safari < 3.1.1 PCRE Nested Repetition Count Overflow<br />

<strong>PVS</strong> ID: 4472 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of Apple Safari that is less than 3.1.1. The reported version is<br />

'%L'\n\nThis version of Safari is vulnerable to a remote exploit. An attacker exploiting this<br />

flaw would need to be able to entice a user to browse to a malicious URI and further entice<br />

the user to download a file. Successful exploitation would result in the attacker executing<br />

arbitary code. In addition, this version of Safari is running a version of AppleWebKit that is<br />

less than 525.18. There are a number of flaws associated with that version of AppleWebKit<br />

as well.<br />

Solution: Upgrade to version 3.1.1 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1167


CVE-2008-1024<br />

Firefox < 2.0.0.14 Javascript Garbage Collection DoS<br />

<strong>PVS</strong> ID: 4473 FAMILY: Web Clients RISK: HIGH NESSUS ID:31864<br />

Description: Synopsis :\n\nThe remote Windows host contains a web browser that may allow arbitrary<br />

code execution.\n\nThe installed version of Firefox contains a stability problem that could<br />

result in a crash during Javascript garbage collection. Although there are no examples of<br />

this extending beyond a crash, similar issues in the past have been shown to allow arbitrary<br />

code execution.<br />

Solution: Upgrade to version 2.0.0.14 or higher.<br />

CVE-2008-1380<br />

OpenOffice < 2.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4474 FAMILY: Generic RISK: HIGH NESSUS ID:31968<br />

Description: Synopsis :\n\nThe remote Windows host has a program that is affected by multiple<br />

vulnerabilities.\n\nThe version of OpenOffice installed on the remote host is reportedly<br />

affected by several issues :\n\n - Heap overflow and arbitrary code execution vulnerabilities<br />

involving ODF text documents with XForms (CVE-2007-4770/4771).\n - Heap overflow<br />

and arbitrary code execution vulnerabilities involving Quattro Pro files<br />

(CVE-2007-5745/5747).\n - Heap overflow and arbitrary code execution vulnerabilities<br />

involving EMF files (CVE-2007-5746).\n - Heap overflow and arbitrary code execution<br />

vulnerabilities involving OLE files (CVE-2008-0320).<br />

Solution: Upgrade to version 2.4 or higher.<br />

CVE-2008-0320<br />

phpBB < 3.0.1 Multiple Information Disclosure Vulnerabilities<br />

<strong>PVS</strong> ID: 4475 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack<br />

vectors.\n\nAccording to its banner, the remote host is running a version of<br />

phpBB that is vulnerable to several flaws. An attacker exploiting these flaws<br />

would need the ability to authenticate as a valid user. Successful exploitation<br />

would allow the user to view user lists and email attachments of other users.<br />

Solution: Upgrade to version 3.0.1 or higher.<br />

CVE-2008-1766<br />

Trojan Horse Client Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4476 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1168


Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote client appears to be infected by a Trojan horse. <strong>PVS</strong> had<br />

determined this based on the outbound connections recently made to control servers.<br />

Solution: Manually check system integrity and remove any malicious code or processes that may<br />

reside on the system.<br />

CVE Not available<br />

Trojan Horse Client Detection<br />

<strong>PVS</strong> ID: 4477 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote client appears to be infected by a Trojan horse. <strong>PVS</strong> had<br />

determined this based on the outbound connections recently made to control servers. <strong>PVS</strong><br />

just observed the host attempting to connect to importtrenz -dot- com.<br />

Solution: Manually check system integrity and remove any malicious code or processes that may<br />

reside on the system.<br />

CVE Not available<br />

Trojan Horse Client Detection<br />

<strong>PVS</strong> ID: 4478 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote client appears to be infected by a Trojan horse. <strong>PVS</strong> had<br />

determined this based on the outbound connections recently made to control servers.<br />

Solution: Manually check system integrity and remove any malicious code or processes that may<br />

reside on the system.<br />

CVE Not available<br />

Trojan Horse Client Detection<br />

<strong>PVS</strong> ID: 4479 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote client appears to be infected by a Trojan horse. <strong>PVS</strong> had<br />

determined this based on the outbound connections recently made to control servers.<br />

Solution: Manually check system integrity and remove any malicious code or processes that may<br />

reside on the system.<br />

CVE Not available<br />

Trojan Horse Client Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1169


<strong>PVS</strong> ID: 4480 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote client appears to be infected by a Trojan horse. <strong>PVS</strong> had<br />

determined this based on the outbound connections recently made to control servers.<br />

Solution: Manually check system integrity and remove any malicious code or processes that may<br />

reside on the system.<br />

CVE Not available<br />

Trojan Horse Client Detection<br />

<strong>PVS</strong> ID: 4481 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote client appears to be infected by a Trojan horse. <strong>PVS</strong> had<br />

determined this based on the outbound connections recently made to control servers.<br />

Solution: Manually check system integrity and remove any malicious code or processes that may<br />

reside on the system.<br />

WordPress <<br />

CVE Not available<br />

<strong>PVS</strong> ID: 4482 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe version of WordPress installed on the remote host is<br />

vulnerable to a directory traversal attack. An attacker exploiting this flaw would send<br />

malformed data to the 'cat' parameter of the 'index.php' script. Successful<br />

exploitation would result in the attacker gaining access to confidential files on the<br />

target server. The path to the vulnerable version of WordPress is:\n%P<br />

Solution: Upgrade to a version higher than 2.3.3.<br />

eTrust Proxy Detection<br />

CVE-2008-4769<br />

<strong>PVS</strong> ID: 4483 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the eTrust Secure Content Manager proxy.<br />

Solution: N/A<br />

CVE Not available<br />

CA eTrust SCM Plaintext Login Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1170


<strong>PVS</strong> ID: 4484 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nThe remote host is running the CA eTrust SCM application. The administrative<br />

interface is enabled on this host. Further, <strong>PVS</strong> has just observed a client logging in with<br />

plaintext credentials. Confidential data, such as administrative passwords, should always be<br />

passed over encrypted or secured channels. The observed user account was\n%P<br />

Solution: Force the use of encryption during login and all administrative functions.<br />

CVE Not available<br />

eTrust SCM SMTP Version Detection<br />

<strong>PVS</strong> ID: 4485 FAMILY: SMTP Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the eTrust SCM SMTP notification service. This service is used<br />

to notify administrators when new software or signature updates have been made available.<br />

The reported version is: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

ePOclient Version Detection<br />

<strong>PVS</strong> ID: 4486 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the McAfee ePOclient version: \n %L<br />

Solution: Ensure that you are running the latest version of this software.<br />

CVE Not available<br />

Malicious Website - Embedded Javascript Detection<br />

<strong>PVS</strong> ID: 4487 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server may have had malicious code injected.\n\nThe remote<br />

web server may have been infected with a malicious script tag. These tags usually point to a<br />

malicious site that is hosting code designed to subvert the security of the client machine.<br />

The observed Javascript was '%L'<br />

Solution: Ensure that the server is not serving malicious or injected script tags.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

WordPress < 2.5.1 Crafted Cookie Authentication Bypass<br />

<strong>PVS</strong> ID: 4488 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1171


Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows authenticated users to<br />

gain administrative access.\n\nThe version of WordPress installed on the remote host is<br />

vulnerable to a flaw in the way that it handles cookies. Specifically, an attacker with the<br />

ability to create specific accounts would be able to use the flaw in the cookie handler to<br />

gain administrative access to the application. The path to the vulnerable WordPress<br />

application is:\n%P<br />

Solution: Upgrade to version 2.5.1 or higher.<br />

CVE-2008-1930<br />

WebGUI < 7.4.35 Data Form List View Unspecified Vulnerability<br />

<strong>PVS</strong> ID: 4489 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is running WebGUI, a content management framework. The remote version of<br />

this software is vulnerable to an unspecified flaw. While the details of the flaw are<br />

currently unknown, the vendor has released a fix.<br />

Solution: Upgrade to version 7.4.35 or higher.<br />

CVE-2008-2077<br />

Sun Directory Version Detection<br />

<strong>PVS</strong> ID: 4490 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Sun Directory version: \n %L<br />

Solution: Ensure that you are running the latest version of this software.<br />

CVE Not available<br />

Sun Directory < 6.3 bind-dn Remote Privilege Escalation<br />

<strong>PVS</strong> ID: 4491 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a flaw that allows for the<br />

bypassing of authentication.\n\nThe remote host is running Sun Directory<br />

version: \n %L \n\nThis version is vulnerable to a flaw in the way that it<br />

handles the 'bind-dn' parameter from a client. This may allow an attacker to<br />

gain administrative access.<br />

Solution: Upgrade to version 6.3 or higher.<br />

CVE-2008-1995<br />

eTrust SCM SMTP Version Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4492 FAMILY: SMTP Clients RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1172


Description: The remote host is running the eTrust SCM SMTP notification service. This service is used<br />

to notify administrators when new software or signature updates have been made available.<br />

The reported version(s) of the antivirus signatures is: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

PHP < 5.2.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4493 FAMILY: Web Servers RISK: HIGH NESSUS ID:32123<br />

Description: Synopsis :\n\nThe remote web server uses a version of PHP that is affected by<br />

multiple flaws.\n\nAccording to its banner ('%L'), the version of PHP installed<br />

on the remote host is older than 5.2.6. Such versions may be affected by the<br />

following issues :\n\n - A stack buffer overflow in FastCGI SAPI.\n - An integer<br />

overflow in printf().\n - An unspecified security issue tracked by<br />

CVE-2008-0599.\n - A safe_mode bypass in cURL.\n - Incomplete handling of<br />

multibyte chars inside escapeshellcmd().\n - Issues in the bundled PCRE fixed<br />

by version 7.6.<br />

Solution: Upgrade to version 5.2.6 or higher.<br />

CVE-2008-0599<br />

SAP MaxDB Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4494 FAMILY: Database RISK: HIGH NESSUS ID:32194<br />

Description: Synopsis :\n\nThe remote database server is affected by multiple issues.\n\nThe remote<br />

host is running MaxDB, a database server from SAP. According to its version, the remote<br />

server is affected by multiple flaws.\n \n - A vulnerability in the 'vserver' process could<br />

allow an unauthenticated attacker to execute arbitrary code, subject to the privileges of the<br />

user under which the process operates. In order to successfully exploit this issue, an<br />

attacker must have prior knowledge of an active database name on the server.\n - A design<br />

error in 'sdbstarter' could allow an attacker to elevate his privileges to root level.\n - A<br />

vulnerability in cons.exe could allow command execution before authenticating to the<br />

database server.<br />

Solution: Upgrade to SAP MaxDB 7.7.04 Build 08 / 7.7.03 Build 23 / 7.7.02 Build 20 / 7.6.05 Build<br />

02 / 7.6.04 Build 06 / 7.6.03 Build 15 / 7.5.00 Build 48 or higher.<br />

CVE-2008-0307<br />

Novell eDirectory Version Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4495 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1173


Description: The remote host is running the Novell eDirectory LDAP server. The reported version is: \n<br />

%L<br />

Solution: Ensure that you are using the latest version of the software.<br />

CVE Not available<br />

LDAP Version Detection<br />

<strong>PVS</strong> ID: 4496 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a Lightweight Directory Access Protocol (LDAP) server. LDAP<br />

is a directory service that can be queried or modified remotely. The reported name/version<br />

is: \n %L<br />

Solution: Ensure that you are using the latest version of the software.<br />

CVE Not available<br />

Mozilla Thunderbird < 2.0.0.14 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4497 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:32134<br />

Description: Synopsis :\n\nThe remote Windows host contains a mail client that is affected by multiple<br />

vulnerabilities.\n\nThe installed version of Thunderbird is affected by various security<br />

issues :\n\n - A series of vulnerabilities that allow for JavaScript privilege escalation and<br />

arbitrary code execution.\n - Several stability bugs leading to crashes that, in some cases,<br />

show traces of memory corruption.<br />

Solution: Upgrade to version 2.0.0.14 or higher.<br />

CVE-2008-1237<br />

MySQL 4.1 < 4.1.24 MyISAM Table Privilege Check Bypass<br />

<strong>PVS</strong> ID: 4498 FAMILY: Database RISK: LOW NESSUS ID:32137<br />

Description: Synopsis :\n\nThe remote database server allows a local user to circumvent<br />

privileges.\n\nThe version of MySQL installed on the remote host reportedly allows a local<br />

user to circumvent privileges through creation of MyISAM tables using the 'DATA<br />

DIRECTORY' and 'INDEX DIRECTORY' options to overwrite existing table files in the<br />

application's data directory.<br />

Solution: Upgrade to version 4.1.24 or higher.<br />

CVE-2008-2079<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

MySQL Enterprise Server 5.0 < 5.0.60 MyISAM Table Privilege Check Bypass<br />

<strong>PVS</strong> ID: 4499 FAMILY: Database RISK: LOW NESSUS ID:32138<br />

Family Internet Services 1174


Description: Synopsis :\n\nThe remote database server allows a local user to circumvent<br />

privileges.\n\nThe version of MySQL Enterprise Server installed on the remote host<br />

reportedly allows a local user to circumvent privileges through creation of MyISAM tables<br />

using the 'DATA DIRECTORY' and 'INDEX DIRECTORY' options to overwrite existing<br />

table files in the application's data directory.<br />

Solution: Upgrade to version 5.0.60 or higher.<br />

CVE-2008-2079<br />

Possible Keylogger Software Installation Detection<br />

<strong>PVS</strong> ID: 4500 FAMILY: Backdoors RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host appears to be running a keyboard logger. This software is used to capture<br />

screenshots, passwords, websites viewed and more.<br />

Solution: Ensure that such software is authorized according to corporate policies and guidelines.<br />

CVE Not available<br />

Apache Tomcat Sample App cal2.jsp time Parameter XSS (CVE-2009-0781)<br />

<strong>PVS</strong> ID: 4501 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:35806<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a cross-site scripting (XSS) attack\n\nThe<br />

remote web server includes an example JSP application, 'cal2.jsp' that fails to sanitize<br />

user-supplied input before using it to generate dynamic content. An unauthenticated remote<br />

attacker may be able to leverage this issue to inject arbitrary HTML or script code into a<br />

user's browser to be executed within the security context of the affected site. The affected<br />

application can be accessed via the following URI:\n%P\n<br />

Solution: Either undeploy the Tomcat examples web application, apply the appropriate patch<br />

referenced in the vendor advisory, or upgrade to Tomcat 6.0.19 / 5.5.28 / 4.1.40 when<br />

available.<br />

CVE-2009-0781<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Vulnerability in Microsoft Publisher Could Allow Remote Code Execution (951208)<br />

<strong>PVS</strong> ID: 4502 FAMILY: Generic RISK: HIGH NESSUS ID:32311<br />

Description: Synopsis :\n\nArbitrary code can be executed on the remote host through Microsoft<br />

Publisher.\n\nThe remote host is running a version of Microsoft Publisher which is subject<br />

to a flaw which may allow arbitrary code to be run. An attacker may use this to execute<br />

arbitrary code on this host. To succeed, the attacker would have to send a rogue file to a<br />

user of the remote computer and have it open it. Then a bug in the font parsing handler<br />

would result in code execution.\nIAVA Reference : 2008-A-0029\nSTIG Finding Severity :<br />

Category II<br />

Family Internet Services 1175


Solution: Microsoft has released a set of patches for Publisher 2000, XP, 2003 and 2007:<br />

CVE-2008-0119<br />

Windows Defender Client Detection<br />

<strong>PVS</strong> ID: 4503 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Microsoft Defender software. Defender is used to protect<br />

the local system from malware.<br />

Solution: Ensure that you are running the latest version of this software<br />

CVE Not available<br />

Altiris Deployment Solution < 6.9.176 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4504 FAMILY: Generic RISK: HIGH NESSUS ID:32323<br />

Description: Synopsis :\n\nThe remote Windows host has a program that is affected by multiple<br />

vulnerabilities.\n\nThe version of the Altiris Deployment Solution installed on the remote<br />

host reportedly is affected by several issues :\n\n - A SQL injection vulnerability that could<br />

allow a user to run arbitrary code\n - A remote attacker may be able to obtain encrypted<br />

Altiris Deployment Solution domain credentials without authentication.\n - A local user<br />

could access a privileged command prompt via the Agent's user interface.\n - A local user<br />

could leverage a GUI tooltip to access a privileged command prompt.\n - A local user can<br />

modify or delete several registry keys used by the application, resulting in unauthorized<br />

access to system information or disruption of service.\n - A local user with access to the<br />

install directory of Deployment Solution could replace application components, which<br />

might then run with administrative privileges on an affected system.<br />

Solution: Upgrade to Altiris Deployment Solution 6.9.176 or later and update Agents.<br />

CVE-2008-2291<br />

Cross-Domain Policy File (crossdomain.xml) Detection<br />

<strong>PVS</strong> ID: 4505 FAMILY: CGI RISK: INFO NESSUS ID:32318<br />

Description: Synopsis :\n\nThe remote web server contains a 'crossdomain.xml' file.\n\nThe remote web<br />

server contains a cross-domain policy file. This is a simple XML file used by Adobe's Flash<br />

Player to allow access to data that resides outside the exact web domain from which a Flash<br />

movie file originated. The file resides on the webserver in the following directory: %P<br />

Solution: Review the contents of the policy file carefully. Improper policies, especially an<br />

unrestricted one with just '*', could allow for cross-site request forgery and cross-site<br />

scripting attacks against the web server.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1176


Mantis Cross-Site Request Forgery Vulnerabilities<br />

<strong>PVS</strong> ID: 4506 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:32324<br />

Description: Synopsis : \n\nThe remote web server contains a PHP application that is affected by<br />

multiple cross-site request forgery vulnerabilities.\n\nThe version of Mantis Bug Tracker<br />

installed on the remote host does not verify the validity of HTTP requests before<br />

performing various administrative actions. If a remote attacker can trick a logged-in<br />

administrator into viewing a specially-crafted page, he can leverage this issue to launch<br />

cross-site request forgery attacks against the affected application, such as creating<br />

additional users with administrator privileges. The reported version is: \n %L<br />

Solution: Upgrade to Mantis 1.2.0a1 or later.<br />

CVE Not available<br />

SUN Java System Application Server Version Detection<br />

<strong>PVS</strong> ID: 4507 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the SUN Java system application server. The version is: '%L'<br />

Solution: N/A<br />

CVE Not available<br />

JSP information disclosure in Sun Java System application server<br />

<strong>PVS</strong> ID: 4508 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks\n\nThe remote host is running the SUN Java system application server. The version<br />

is: '%L'.\nThis version is reported vulnerable to a flaw in the way that it handles requests<br />

for '.jsp' code files. An attacker, exploiting this flaw, would be able to gain access to '.jsp'<br />

source code which could give an attacker information useful in future attacks. \nIAVB<br />

Reference : 2008-B-0045\nSTIG Finding Severity : Category II<br />

Solution: SUN has released a fix for this version of their server. Apply the referenced patches.<br />

CVE-2008-2120<br />

cPanel Remote Privilege Escalation vulnerability<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4509 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote 'privilege escalation' flaw\n\nThe<br />

remote host is running cpanel, a web-hosting control panel. The remote version of this<br />

software is vulnerable to a flaw wherein users can gain Administrative access. The root of<br />

the flaw is in the way that this version of cPanel allows new user accounts to access the<br />

Family Internet Services 1177


oot directory. An attacker, exploiting this flaw, would need the ability to authenticate and<br />

the ability to create a new user. Successful exploitation would result in the attacker gaining<br />

administrative access.<br />

Solution: Upgrade to version greater than 11.18.4<br />

CVE-2008-2478<br />

MercuryBoard < 1.1.6 SQL Injection<br />

<strong>PVS</strong> ID: 4510 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack\n\nThe remote host<br />

is running MercuryBoard, a web-based Message board written in PHP. This version of<br />

MercuryBoard is vulnerable to a remote SQL Injection flaw. This version of MercuryBoard<br />

fails to sanitize user-supplied input to the 'login.php' script. An attacker, exploiting this<br />

flaw, would send a malformed HTTP query to the application. Successful exploitation<br />

would result in the attacker being able to read or write Confidential data. In addition, the<br />

attacker may be able to execute arbitrary code on the remote database server.<br />

Solution: Apply the vendor patch<br />

CVE-2008-6632<br />

Firebird Default Credentials<br />

<strong>PVS</strong> ID: 4511 FAMILY: Database RISK: HIGH NESSUS ID:32315<br />

Description: Synopsis :\n\nThe remote service is protected with default credentials.\n\nThe version of<br />

Firebird on the remote host uses default credentials to control access. Knowing these, an<br />

attacker can gain administrative access to the affected application.<br />

Solution: Use the application's 'gsec' utility to change the password for the 'SYSDBA' account.<br />

CVE Not available<br />

Interbase/Firebird Account Detection<br />

<strong>PVS</strong> ID: 4512 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running an Interbase or Firebird database server. The account observed<br />

was: '%P'<br />

Solution: N/A<br />

CVE Not available<br />

Interbase Database Version Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4513 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1178


Description: The remote host is running an Interbase database server. The version is: '%L'<br />

Solution: N/A<br />

CVE Not available<br />

Interbase Database Remote Stack Overflow<br />

<strong>PVS</strong> ID: 4514 FAMILY: Database RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

running an Interbase database server. The version is: '%L'. This version has been reported<br />

vulnerable to a remote buffer overflow. An attacker, exploiting this flaw, would only need<br />

to be able to connect to the database service port (3050/tcp by default). Successful<br />

exploitation would result in the attacker executing arbitrary code.<br />

Solution: The issue has been fixed in version 8.1.0.2578 which is available from the vendor website.<br />

CVE-2008-2559<br />

Trillian < 3.1.10.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4515 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:32400<br />

Description: Synopsis :\n\nThe remote host contains an instant messaging application that is affected by<br />

several vulnerabilities.\n\nThe version of Trillian installed on the remote host reportedly<br />

contains several vulnerabilities :\n\n - A stack buffer overflow in 'aim.dll' triggered when<br />

parsing messages with overly long attribute values within the 'FONT' tag.\n - A memory<br />

corruption issue within XML parsing in 'talk.dll' triggered when processing malformed<br />

attributes within an 'IMG' tag. \n - A stack buffer overflow in the header-parsing code for<br />

the MSN protocol when processing the 'X-MMS-IM-FORMAT' header.\n\nSuccessful<br />

exploitation of each issue can result in code execution subject to the privileges of the<br />

current user.<br />

Solution: Upgrade to Trillian 3.1.10.0 or later as it is reported to resolve these issues.<br />

CVE-2008-2409<br />

MDAP Service Detection<br />

<strong>PVS</strong> ID: 4516 FAMILY: Generic RISK: INFO NESSUS ID:32399<br />

Description: Synopsis :\n\nA network service is listening on the remote host.\n\nThe remote service<br />

supports the Multi Directory Access Protocol (MDAP), which is used to multicast<br />

commands to certain types of network devices, such as Thompson ADSL modems.<br />

Solution: Limit incoming traffic to this port if desired.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1179


Lotus Domino < 8.0.1 / 7.0.3 FP1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4517 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:32433<br />

Description: Synopsis :\n\nThe remote web server is affected by multiple vulnerabilities.\n\nAccording<br />

to its banner, the version of Lotus Domino on the remote host is older than 8.0.1 / 7.0.3<br />

FP1. The web server component of such versions is reportedly affected by a stack overflow<br />

that can be triggered by means of a specially-crafted 'Accept-Language' request header.<br />

While IBM only says this results in a denial of service, the original researchers claim to<br />

have a working proof-of-concept for Windows that allows arbitrary code execution with<br />

LOCAL SYSTEM privileges. In addition, the web server reportedly has an unspecified<br />

cross-site scripting vulnerability in its servlet engine / Web container.<br />

Solution: Upgrade to version 7.0.3 FixPack1 or 8.0.1<br />

CVE-2008-2240<br />

Barracuda Spam Firewall ldap_test.cgi Cross-Site Scripting Vulnerability<br />

<strong>PVS</strong> ID: 4518 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:32434<br />

Description: Synopsis :\n\nThe remote web server contains a CGI script that is affected by a cross-site<br />

scripting vulnerability.\n\nAccording to its firmware version, the remote Barracuda Spam<br />

Firewall device fails to filter input to the 'email' parameter of the '/cgi-bin/ldap_test.cgi'<br />

script before using it to generate dynamic content. An unauthenticated remote attacker may<br />

be able to leverage this issue to inject arbitrary HTML or script code into a user's browser<br />

to be executed within the security context of the affected site. For your information, the<br />

remote host is running firmware version: '%L'<br />

Solution: Either configure the device to limit access to the web management application by IP<br />

address or update to firmware release 3.5.11.025 or later.<br />

CVE-2008-2333<br />

Cerberus Helpdesk < Cerberus Helpdesk 4.0 Build 603<br />

<strong>PVS</strong> ID: 4519 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to UNSPECIFIED remote attack<br />

vectors\n\nThe remote host is running Cerberus Helpdesk version '%L', a web-based<br />

helpdesk suite written in PHP. The installed version of Cerberus Helpdesk on the remote<br />

host is vulnerable to several unspecified vulnerabilities.<br />

Solution: Patch the affected file as described in the forum thread referenced.<br />

CVE-2008-6440<br />

Possible Keylogger software installation detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1180


<strong>PVS</strong> ID: 4520 FAMILY: Backdoors RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host seems to be running a keyboard logger. This software is used to capture<br />

screenshots, passwords, websites viewed, and more.<br />

Solution: Ensure that such software is authorized with respect to corporate policies and guidelines.<br />

CVE Not available<br />

OpenSSL < 0.9.8h Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4521 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nFor your<br />

information, the observed version of OpenSSL installed on the remote host is : \n %L<br />

\n\nVersions of OpenSSL earlier than 0.9.8h are potentially affected by multiple<br />

vulnerabilities :\n\n - A double-free error exists related to the handling of server name<br />

extension data and specially crafted TLS 1.0 'Client Hello' packets. This can cause<br />

application crashes. Note that successful exploitation requires that OpenSSL is compiled<br />

with the TLS server name extensions. (CVE-2008-0891)\n\n - A NULL pointer dereference<br />

error exists related to anonymous Diffie-Hellman key exchange and TLS handshakes. This<br />

can be exploited by omitting the 'Server Key exchange message' from the handshake and<br />

can cause application crashes. (CVE-2008-1672)\n\n - On 32-bit builds, an information<br />

disclosure vulnerability exists during certain calculations for NIST elliptic curves P-256 or<br />

P-384. This error can allow an attacker to recover the private key of the TLS server.\n\n<br />

The following are required for exploitation :\n\n - 32-bit build\n\n - Use of elliptic curves<br />

P-256 and/or P-384\n\n - Either the use of ECDH family ciphers and/or the use of ECDHE<br />

family ciphers without the SSL_OP_SINGLE_ECDH_USE context option.<br />

(CVE-2011-4354)<br />

Solution: Upgrade to version 0.9.8h or later.<br />

CVE-2008-4534<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Samba < 3.0.30 receive_smb_raw Buffer Overflow Vulnerability<br />

<strong>PVS</strong> ID: 4522 FAMILY: Samba RISK: HIGH NESSUS ID:32476<br />

Description: Synopsis :\n\nThe remote Samba server may be affected by a buffer overflow<br />

vulnerability.\n\nAccording to its banner, the version of the Samba server on the remote<br />

host ('%L') is reportedly affected by a boundary error in 'nmbd' within the<br />

'receive_smb_raw' function in 'lib/util_sock.c' when parsing SMB packets received in a<br />

client context. By sending specially-crafted packets to an 'nmbd' server configured as a<br />

local or domain master browser, an attacker can leverage this issue to produce a heap-based<br />

buffer overflow and execute arbitrary code with system privileges.<br />

Solution: Upgrade to Samba version 3.0.30 or later or apply the patch referenced in the project's<br />

advisory.<br />

Family Internet Services 1181


Mac OS X < 10.5.3<br />

CVE-2008-1105<br />

<strong>PVS</strong> ID: 4523 FAMILY: Generic RISK: HIGH NESSUS ID:32477<br />

Description: Synopsis :\n\nThe remote host is missing a Mac OS X update that fixes various security<br />

issues.\n\nThe remote host is running a version of Mac OS X 10.5 that is older than version<br />

10.5.3. Mac OS X 10.5.3 contains security fixes for a number of programs.<br />

Solution: Upgrade to Mac OS X 10.5.3 or later.<br />

CVE-2008-1580<br />

iGuard <strong>Security</strong> Device Version Detection<br />

<strong>PVS</strong> ID: 4524 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the iGuard embedded web server. This software is commonly<br />

found on hardware security devices which are used to control facility access. The<br />

embedded web server typically allows for remote administration of the device and includes<br />

a built-in web server, database server, and more.<br />

Solution: Ensure that this device only allows connections from trusted hosts<br />

CVE Not available<br />

ipMonitor Device Version Detection<br />

<strong>PVS</strong> ID: 4525 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the ipMonitor. This software is commonly used to detect and<br />

track network devices and services. The reported version is: \n %L<br />

Solution: Ensure that this device only allows connections from trusted hosts<br />

CVE Not available<br />

DLINK Audio/Video Camera Detection<br />

<strong>PVS</strong> ID: 4526 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the DLINK Audio/Video camera with embedded web and file<br />

transfer services (HTTP and FTP).<br />

Solution: Ensure that this device and any transmitted images are in compliance with corporate<br />

policies and guidelines.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Dell Printer Administrative Web Console Detection<br />

Family Internet Services 1182


<strong>PVS</strong> ID: 4527 FAMILY: Policy RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application\n\nThe remote host is running a Dell printer administrative web console version<br />

'%L'. These consoles allow remote users to check printer jobs, change admin passwords,<br />

restart the printer, and much more. You should particularly ensure that the page<br />

'/ews/setting/setews.htm' is not accessible by untrusted users.<br />

Solution: Ensure that only trusted hosts can connect to this service<br />

CVE Not available<br />

IBM Content Manager (ICM) Version Detection<br />

<strong>PVS</strong> ID: 4528 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the IBM Content manager version: '%L'<br />

Solution: Ensure that you are running the latest version of this software<br />

CVE Not available<br />

Snap Appliance Version Detection<br />

<strong>PVS</strong> ID: 4529 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a Snap Appliance version: '%L'\nThe Snap appliance is a family<br />

of products which provides remote data storage.<br />

Solution: Ensure that you are running the latest version of this software.<br />

CVE Not available<br />

IBM WebSphere Application Server < 6.1.0.17 Unspecified Vulnerability<br />

<strong>PVS</strong> ID: 4530 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:33127<br />

Description: Synopsis :\n\nThe remote application server is affected by an unspecified<br />

vulnerability.\n\nIBM WebSphere Application Server 6.1 before Fix Pack 17 appears to be<br />

running on the remote host. There reportedly is an attribute in a SOAP security header in<br />

such versions that may cause a security explosure in Web Services applications (PK61315).<br />

Solution: Apply Fix Pack 17 (6.1.0.17) or later.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Skype Technologies URI Handler Remote Code Execution<br />

<strong>PVS</strong> ID: 4531 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1183


Description: Synopsis :\n\nThe remote host may be tricked into running an executable file\n\nThe<br />

version of Skype installed on the remote host is vulnerable to a flaw wherein specially<br />

formatted 'file://' URI will allow the download and execution of executable files. An<br />

attacker, exploiting this flaw, would need to be able to coerce a user into browsing a<br />

malicious URI. Successful exploitation would result in the attacker executing arbitrary<br />

code.<br />

Solution: Upgrade to Skype release 3.8.0.139.<br />

CVE-2008-1805<br />

Sun-One ASP Server Version Detection<br />

<strong>PVS</strong> ID: 4532 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Sun-One ASP server version: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Sun Java System ASP < 4.0.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4533 FAMILY: Web Servers RISK: HIGH NESSUS ID:33439<br />

Description: Synopsis :\n\nThe remote web server is affected by several vulnerabilities.\n\nThe remote<br />

host is running Sun Java System Active Server Pages (ASP), or an older variant such as<br />

Sun ONE ASP or Chili!Soft ASP. The web server component of the installed version of<br />

Active Server Pages on the remote host is affected by several vulnerabilities :\n\n - A flaw<br />

in an include file used by several of the administration server's ASP applications allows an<br />

attacker to write arbitrary data to a file specified by an attacker on the affected host. This<br />

issue does not affect ASP Server on a Windows platform (CVE-2008-2401).\n - Password<br />

and configuration data are stored in the administration server's web root and can be<br />

retrieved without credentials. This issue does not affect ASP Server on a Windows platform<br />

(CVE-2008-2402).\n - Multiple directory traversal vulnerabilities exist in several of the<br />

administration server's ASP applications can be abused to read or even delete arbitrary files<br />

on the affected host. This issue does not affect ASP Server on a Windows platform<br />

(CVE-2008-2403).\n - A stack buffer overflow allows code execution in the context of the<br />

ASP server (by default root) and can be exploited without authentication<br />

(CVE-2008-2404).\n - Several of the administration server's ASP applications fail to filter<br />

or escape user input before using it togenerate commands before executing them in a shell.<br />

While access to these applications nominally requires authentication, there are reportedly<br />

several methods of bypassing authentication (CVE-2008-2405).\nIAVA Reference :<br />

2008-A-0038\nSTIG Finding Severity : Category I<br />

Solution: Upgrade to Sun Java System ASP version 4.0.3 or later.<br />

CVE-2008-2405<br />

CA eTrust SCM Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1184


<strong>PVS</strong> ID: 4534 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is running the Computer Associates eTrust SCM, a filtering proxy<br />

server.<br />

Solution: N/A<br />

CVE Not available<br />

Novell Groupwise Messenger server<br />

<strong>PVS</strong> ID: 4535 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is running a Novell Groupwise Messenger server<br />

Solution: N/A<br />

CVE Not available<br />

DB2 < 9 Fix Pack 5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4536 FAMILY: Database RISK: HIGH NESSUS ID:33128<br />

Description: Synopsis : \n\nThe remote database server is affected by multiple issues.\n\nAccording to<br />

its version, the installation of DB2 on the remote host is affected by one or more of the<br />

following issues : \n\n - There is an unspecified security vulnerability related to a<br />

'DB2FMP' process (IZ20352).\n - There is an unspecified security vulnerability in a<br />

CLR-stored procedure deployment from IBM Database Add-Ins for Visual Studio<br />

(JR28432).\n - The password used to connect to the database can be seen in plaintext in a<br />

memory dump (JR27422).\n - There is a possible stack variable overrun in 'SQLRLAKA()'<br />

(IZ16346).\n - A local privilege escalation vulnerability via file creation can result in<br />

root-level access (IZ12735).\n - There are possible buffer overflows involving 'XQUERY',<br />

'XMLQUERY', 'XMLEXISTS', and 'XMLTABLE' (IZ18434). For your information, the<br />

remote server is running the following version: \n %L<br />

Solution: Apply DB2 patches from vendor.<br />

CVE-2008-3858<br />

QuickTime < 7.5 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4537 FAMILY: Web Clients RISK: HIGH NESSUS ID:33131<br />

Description: Synopsis :\n\nThe remote Mac OS X host contains an application that is affected by<br />

multiple vulnerabilities.\n\nThe version of QuickTime installed on the remote Mac OS X<br />

host is older than 7.5. Such versions contain several vulnerabilities :\n\n - There is a heap<br />

buffer overflow in QuickTime's handling of PICT image files that could result in a program<br />

crash or arbitrary code execution (CVE-2008-1583).\n - There is a memory corruption issue<br />

in QuickTime's handling of AAC-encoded media content that could result in a program<br />

crash or arbitrary code execution (CVE-2008-1582).\n - There is a stack buffer overflow in<br />

QuickTime's handling of Indeo video codec content that could result in a program crash or<br />

Family Internet Services 1185


arbitrary code execution (CVE-2008-1584).\n - There is a URL handling issue in<br />

QuickTime's handling of 'file:' URLs that may allow launching of arbitrary applications<br />

(CVE-2008-1585).<br />

Solution: Either use QuickTime's Software Update preference to upgrade to the latest version or<br />

manually upgrade to QuickTime 7.5 or later.<br />

CVE-2008-1585<br />

OpenOffice < 2.4.1 rtl_allocateMemory Integer Overflow<br />

<strong>PVS</strong> ID: 4538 FAMILY: Generic RISK: HIGH NESSUS ID:33129<br />

Description: Synopsis :\n\nThe remote Windows host has a program affected by an integer overflow<br />

vulnerability.\n\nThe version of OpenOffice installed on the remote host reportedly<br />

contains an integer overflow vulnerability in 'rtl_allocateMemory()', a custom memory<br />

allocation function used by the application. If an attacker can trick a user on the affected<br />

system, he can leverage this issue to execute arbitrary code subject to his privileges.<br />

Solution: Upgrade to OpenOffice version 2.4.1 or later.<br />

CVE-2008-2152<br />

Gordano Messaging Suite Version Detection<br />

<strong>PVS</strong> ID: 4539 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Gordano Messaging Suite version: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Gallery < 2.2.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4540 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is Missing a critical security patch or upgrade\n\nThe<br />

remote host is running Gallery, a web-based photo album application written in PHP. The<br />

version of Gallery installed on the remote host is less than 2.2.5. The vendor has reported<br />

multiple security flaws in this version. The software is prone to a cross-site scripting flaw<br />

which could allow an attacker to execute arbitrary script code within client browsers. The<br />

software is prone to an information disclosure flaw within the 'album-select' module and<br />

the 'embed.php' script which would allow an attacker to gain access to confidential data.<br />

The software is prone to a privilege escalation flaw which would allow users the ability to<br />

gain access to confidential files or processes. Finally, the software is vulnerable to a<br />

security bypass flaw which would allow an attacker the ability to view confidential data.<br />

Solution: Upgrade to version 2.2.3 or newer<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1186


CVE-2008-2724<br />

Opera < 9.50 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4541 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:33168<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by several issues.\n\n<br />

The version of Opera installed on the remote host reportedly is affected by several issues<br />

:\n\n - Improper handling of special characters in page addresses can make addresses look<br />

like other ones, aiding in phishing attacks.\n - Specially-crafted HTML canvas elements<br />

could violate the same-origin image policy.\n - Framed sources contained on the same<br />

parent page can modify each other's location.<br />

Solution: Upgrade to Opera version 9.5 or later.<br />

CVE-2008-2716<br />

Novell NetWare Print Server Detection<br />

<strong>PVS</strong> ID: 4542 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a Novell NetWare print server.<br />

Solution: N/A<br />

CVE Not available<br />

Novell NetWare iPrint Client Version Detection<br />

<strong>PVS</strong> ID: 4543 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Novell NetWare iPrint Client version: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Sun-One ASP Server Version Detection<br />

<strong>PVS</strong> ID: 4544 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Sun-One ASP server version: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

BlackBerry Version Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4545 FAMILY: Mobile Devices RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1187


Description: The remote host is running the BlackBerry operating system version: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Sun-One ASP Server Test Application Detection<br />

<strong>PVS</strong> ID: 4546 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application\n\nThe remote host is running the Sun-One ASP server version: %L.\n\nThis<br />

server is also running the default applications which are shipped with the administrative<br />

interface. Unfortunately, many of the default applications are vulnerable to trivial remote<br />

flaws which would allow an attacker to gain access to confidential data, launch persistent<br />

cross-site-scripting attacks, and more. <strong>PVS</strong> observed the following default application<br />

being accessed:\n%P<br />

Solution: Uninstall all default, test applications.<br />

CVE Not available<br />

ClamAV < 0.93.1 memcpy() Function Overflow<br />

<strong>PVS</strong> ID: 4547 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

running ClamAV version: %L\n\nThis version of ClamAV is vulnerable to a flaw within<br />

the 'memcpy()' function. An attacker, exploiting this flaw, would be able to crash the<br />

ClamAV server or possibly execute code.<br />

Solution: Upgrade to ClamAV version 0.93.1 or higher<br />

CVE-2008-2713<br />

Novell iPrint Client Unspecified Vulnerability<br />

<strong>PVS</strong> ID: 4548 FAMILY: Web Clients RISK: HIGH NESSUS ID:33227<br />

Description: Synopsis : \n\nThe remote host contains an application that is affected by an unspecified<br />

vulnerability.\n\nThe remote host has Novell iPrint Client installed. The installed version of<br />

Novell iPrint is affected by an unspecified vulnerability. For your information, the installed<br />

version number is: \n %L<br />

Solution: Upgrade to version 4.36 or higher<br />

CVE-2008-2908<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1188


ListManager words Parameter Cross-Site Scripting Vulnerability<br />

<strong>PVS</strong> ID: 4549 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:33219<br />

Description: Synopsis :\n\nThe remote web server is affected by a cross-site scripting<br />

vulnerability.\n\nThe remote host is running ListManager, a web-based commercial mailing<br />

list management application from Lyris. The version of ListManager installed on the<br />

remote host fails to sanitize user input to the 'words' parameter of the 'read/search/results'<br />

script before including it in dynamic HTML output. An attacker may be able to leverage<br />

this issue to inject arbitrary HTML and script code into a user's browser to be executed<br />

within the security context of the affected site.<br />

Solution: Upgrade to ListManager greater than 9.3d<br />

CVE-2008-2923<br />

JXTA P2P Server Detection<br />

<strong>PVS</strong> ID: 4550 FAMILY: Peer-To-Peer File Sharing<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software which should be authorized with respect<br />

to Corporate policy\n\nThe remote host is running the JXTA Server\nJXTA is a P2P<br />

application which allows users to quickly download files from multiple locations.<br />

Solution: Ensure that JXTA is allowed with respect to Corporate policies and guidelines.<br />

CVE Not available<br />

JXTA P2P Client Detection<br />

<strong>PVS</strong> ID: 4551 FAMILY: Peer-To-Peer File Sharing<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote host is running the JXTA Client.\nJXTA is a P2P<br />

application that allows users to quickly download files from multiple locations.<br />

Solution: Ensure that JXTA is allowed according to corporate policies and guidelines.<br />

CVE Not available<br />

Sun Java Calendar Version Detection<br />

<strong>PVS</strong> ID: 4552 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Sun Java Calendar version: \n %L<br />

Solution: N/A<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1189


CVE Not available<br />

Sun Java Calendar Logging Component Unspecified Remote DoS<br />

<strong>PVS</strong> ID: 4553 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running Sun Java Calendar version: \n %L \n\nThis version of Calendar is<br />

vulnerable to a remote denial of service attack. While the details of this vulnerability are<br />

currently unknown, exploitation would require that 'Access Logging' be enabled.<br />

Successful exploitation would result in the server crashing, denying access to valid users.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2008-2749<br />

Owner-Free File System Client Detection<br />

<strong>PVS</strong> ID: 4554 FAMILY: Policy RISK: INFO NESSUS ID:33228<br />

Description: Synopsis :\n\nThe remote web server acts as a distributed filesystem.\n\nThe remote web<br />

server is an OFFSystem client. OFFSystem (Owner-Free Filesystem) is a distributed<br />

filesystem for peer-to-peer file sharing in which files are stored as randomized data blocks.<br />

Solution: Ensure that use of this software is in line with your organization's security and acceptable<br />

use policies.<br />

CVE Not available<br />

SurgeMail < 3.9g2-2 IMAP Command Handling Unspecified DoS<br />

<strong>PVS</strong> ID: 4555 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:33277<br />

Description: The remote mail server is prone to a remote denial of service vulnerability. According to its<br />

banner, the remote host is running a version of SurgeMail Mail Server older than 3.9g2.<br />

Such versions are reportedly affected by a remote denial of service vulnerability when<br />

handling certain IMAP commands. An attacker can leverage this issue to crash the remote<br />

application.<br />

Solution: Upgrade to version 3.9g2-2 or higher.<br />

CVE-2008-2859<br />

Safari < 3.1.2 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4556 FAMILY: Web Clients RISK: HIGH NESSUS ID:33226<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by several<br />

issues.\n\nThe version of Safari installed on the remote host reportedly is affected by<br />

several issues :\n\n - An out-of-bounds memory read while handling BMP and GIF images<br />

may lead to information disclosure (CVE-2008-1573).\n - Safari will automatically launch<br />

Family Internet Services 1190


executable files downloaded from a site if that site is in an IE7 zone with 'Launching<br />

applications and unsafe files' set to 'Enable' or an IE6 'Local intranet ' / ' Trusted sites' zone<br />

(CVE-2008-2306).\n - There is a memory corruption issue in WebKit's handling of<br />

JavaScript arrays that could be leveraged to crash the application or execute arbitrary code<br />

if visiting a malicious site (CVE-2008-2307).\n - When handling an object with an<br />

unrecognized content type, Safari does not prompt the user before downloading the object<br />

(aka, the 'carpet-bombing' issue). If the download location is the Windows Desktop (the<br />

default), this could lead to arbitrary code execution (CVE-2008-2540).\nIAVT Reference :<br />

2009-T-0021\nSTIG Finding Severity : Category II<br />

Solution: Update to version 3.1.2 or higher.<br />

DC++ Client Detection<br />

CVE-2008-2540<br />

<strong>PVS</strong> ID: 4557 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running DC++, an open source peer-to-peer client. The reported version<br />

is: \n %L<br />

Solution: Ensure that this application is authorized according to corporate policy.<br />

CVE Not available<br />

Kismet Server Information Disclosure<br />

<strong>PVS</strong> ID: 4558 FAMILY: Policy<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:33257<br />

Description: Synopsis :\n\nIt is possible to collect information from the remote wireless monitoring<br />

service.\n\nThe remote host is running a Kismet server and allows clients to use it to<br />

monitor wireless activity. An anonymous attacker may use the information collected to<br />

enumerate a network.<br />

Solution: Limit incoming traffic to this port if and, if appropriate, do not allow clients to list WEP<br />

keys.<br />

CVE Not available<br />

WebGUI < 7.5.13 RSS Feed Authentication Bypass<br />

<strong>PVS</strong> ID: 4559 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running WebGUI, a content management framework.<br />

The remote version of this software is vulnerable to a flaw in the way that it handles access<br />

to data. Protected data can be accessed by requesting the data within an RSS feed. An<br />

attacker exploiting this flaw would only need the ability to request an RSS subscription.<br />

Family Internet Services 1191


Solution: Upgrade to version 7.5.13 or higher.<br />

CVE-2008-3503<br />

IronPort Version Detection<br />

<strong>PVS</strong> ID: 4560 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running an IronPort appliance. IronPort is a Cisco application that is<br />

used to filter spam. The build of the IronPort server is: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Resin < Viewfile file Parameter XSS<br />

<strong>PVS</strong> ID: 4561 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:33273<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a cross-site scripting (XSS) attack.\n\nThe<br />

remote web server is running Resin version: %L.\n\nThis version of Resin is vulnerable to<br />

a cross-site scripting flaw via the 'file' parameter of the Viewfile application. An attacker<br />

exploiting this flaw would be able to execute arbitrary script code in the browsers of other<br />

Resin users.<br />

Solution: Upgrade to version 3.0.25, 3.1.4 or higher.<br />

CVE-2008-2462<br />

VLC Media Player < 0.8.6h Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4562 FAMILY: Web Clients RISK: HIGH NESSUS ID:33278<br />

Description: Synopsis :\n\nThe remote Windows host contains a media player that is affected by several<br />

vulnerabilities.\n\nThe version of VLC Media Player installed on the remote host<br />

reportedly includes versions of GnuTLS, libgcrypt and libxml2 that are affected by various<br />

denial of service and buffer overflow vulnerabilities.<br />

Solution: Upgrade to version 0.8.6h or higher.<br />

CVE-2007-6284<br />

EMC AlphaStor Library Manager Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4563 FAMILY: Generic RISK: INFO NESSUS ID:33280<br />

Description: Synopsis : \n\nThere is a tape backup manager installed on the remote host.\n\nThe remote<br />

host is running the EMC AlphaStor Library Manager service. AlphaStor is a tape backup<br />

management and library sharing for EMC NetWorker. The reported OS/platform<br />

Family Internet Services 1192


Solution: N/A<br />

information is: \n %L<br />

CVE Not available<br />

Mac OS X < 10.5.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4564 FAMILY: Generic RISK: HIGH NESSUS ID:33281<br />

Description: Synopsis :\n\nThe remote host is missing a Mac OS X update that fixes various security<br />

issues.\n\nThe remote host is running a version of Mac OS X 10.5 that is older than version<br />

10.5.4. Mac OS X 10.5.4 contains security fixes for a number of programs.\nIAVB<br />

Reference : 2008-B-0078\nIAVT Reference : 2008-T-0026\nSTIG Finding Severity :<br />

Category I<br />

Solution: Upgrade to version 10.5.4 or higher.<br />

CVE-2008-2726<br />

Sun Java System Access Manager Version Detection<br />

<strong>PVS</strong> ID: 4565 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Sun Java System Access Manager, an application for managing<br />

access to web applications. The reported version is: \n %L \n\nThe path to the Access<br />

Manager is: \n%P<br />

Solution: N/A<br />

RatProxy Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 4566 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a RatProxy proxy server. RatProxy is a passive web application scanner<br />

that acts as a middle-man to normal browser-based HTTP traffic.<br />

Solution: N/A<br />

CVE Not available<br />

Firefox < 2.0.0.15 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4567 FAMILY: Web Clients RISK: HIGH NESSUS ID:33393<br />

Description: Synopsis :\n\nThe remote Windows host contains a web browser that is affected by<br />

multiple vulnerabilities.\n\nThe installed version of Firefox is affected by various security<br />

issues :\n\n - Several stability bugs leading to crashes that, in some cases, show traces of<br />

memory corruption (MFSA 2008-21).\n - A vulnerability involving violation of the<br />

Family Internet Services 1193


same-origin policy could allow for cross-site scripting attacks (MFSA 2008-22).\n -<br />

JavaScript can be injected into the context of signed JARs and executed under the context<br />

of the JAR's signer (MFSA 2008-23).\n - By taking advantage of the privilege level stored<br />

in the pre-compiled 'fastload' file, an attacker may be able to run arbitrary JavaScript code<br />

with chrome privileges (MFSA 2008-24).\n - Arbitrary code execution is possible in<br />

'mozIJSSubScriptLoader.loadSubScript()' (MFSA 2008-25).\n - An attacker can steal files<br />

from known locations on a victim's computer via originalTarget and DOM Range (MFSA<br />

2008-27).\n - It is possible for a malicious Java applet to bypass the same-origin policy and<br />

create arbitrary socket connections to other domains (MFSA 2008-28).\n - An improperly<br />

encoded '.properties' file in an add-on can result in uninitialized memory being used, which<br />

could lead to data formerly used by other programs being exposed to the add-on code<br />

(MFSA 2008-29).\n - File URLs in directory listings are not properly HTML-escaped when<br />

the filenames contained particular characters (MFSA 2008-30).\n - A weakness in the trust<br />

model regarding alt names on peer-trusted certs could lead to spoofing secure connections<br />

to any other site (MFSA 2008-31).\n - URL shortcut files on Windows (for example, saved<br />

IE favorites) could be interpreted as if they were in the local file context when opened by<br />

Firefox, although the referenced remote content would be downloaded and displayed<br />

(MFSA 2008-32).\n - A crash in Mozilla's block reflow code could be used by an attacker<br />

to crash the browser and run arbitrary code on the victim's computer (MFSA 2008-33).<br />

Solution: Upgrade to version 2.0.0.15 or higher.<br />

CVE-2008-2811<br />

SeaMonkey < 1.1.10 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4568 FAMILY: Web Clients RISK: HIGH NESSUS ID:33394<br />

Description: Synopsis :\n\nThe remote Windows host contains a web browser that is affected by<br />

multiple vulnerabilities.\n\nThe installed version of SeaMonkey is affected by various<br />

security issues :\n\n - Several stability bugs leading to crashes that, in some cases, show<br />

traces of memory corruption (MFSA 2008-21).\n - A vulnerability involving violation of<br />

the same-origin policy could allow for cross-site scripting attacks (MFSA 2008-22).\n -<br />

JavaScript can be injected into the context of signed JARs and executed under the context<br />

of the JAR's signer (MFSA 2008-23).\n - By taking advantage of the privilege level stored<br />

in the pre-compiled 'fastload' file, an attacker may be able to run arbitrary JavaScript code<br />

with chrome privileges (MFSA 2008-24).\n - Arbitrary code execution is possible in<br />

'mozIJSSubScriptLoader.loadSubScript()' (MFSA 2008-25).\n - An attacker can steal files<br />

from known locations on a victim's computer via originalTarget and DOM Range (MFSA<br />

2008-27).\n - It is possible for a malicious Java applet to bypass the same-origin policy and<br />

create arbitrary socket connections to other domains (MFSA 2008-28).\n - An improperly<br />

encoded '.properties' file in an add-on can result in uninitialized memory being used, which<br />

could lead to data formerly used by other programs being exposed to the add-on code<br />

(MFSA 2008-29).\n - File URLs in directory listings are not properly HTML-escaped when<br />

the filenames contained particular characters (MFSA 2008-30).\n - A weakness in the trust<br />

model regarding alt names on peer-trusted certs could lead to spoofing secure connections<br />

to any other site (MFSA 2008-31).\n - URL shortcut files on Windows (for example, saved<br />

IE favorites) could be interpreted as if they were in the local file context when opened by<br />

Seamonkey, although the referenced remote content would be downloaded and displayed<br />

(MFSA 2008-32).\n - A crash in Mozilla's block reflow code could be used by an attacker<br />

Family Internet Services 1194


to crash the browser and run arbitrary code on the victim's computer (MFSA 2008-33).<br />

Solution: Upgrade to version 1.1.10 or higher.<br />

CVE-2008-2811<br />

VLC Media Player < 0.8.6i WAV File Handling Remote Integer Overflow<br />

<strong>PVS</strong> ID: 4569 FAMILY: Web Clients RISK: HIGH NESSUS ID:33485<br />

Description: Synopsis :\n\nThe remote Windows host contains an application that is affected by an<br />

integer overflow vulnerability.\n\nThe installed version of VLC Media Player is affected by<br />

an integer overflow vulnerability. By tricking a user into opening a malicious .WAV file, it<br />

may be possible to cause a denial of service condition or execute arbitrary code within the<br />

context of the affected application.<br />

Solution: Upgrade to version 0.8.6i or higher.<br />

CVE-2008-2430<br />

Jabber Client Detection<br />

<strong>PVS</strong> ID: 4570 FAMILY: Internet Messengers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Jabber client.<br />

Solution: N/A<br />

Jabber Server Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 4571 FAMILY: Internet Messengers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Jabber server. Jabber is an open-source instant messaging server.<br />

Solution: N/A<br />

CVE Not available<br />

Opera < 9.51 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4572 FAMILY: Web Clients RISK: HIGH NESSUS ID:33396<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by several<br />

issues.\n\nThe version of Opera installed on the remote host reportedly is affected by<br />

several issues :\n\n - Specially-crafted HTML canvas elements could reveal data from<br />

random areas of memory.\n - An unspecified arbitrary code execution vulnerability.\n -<br />

Improperly set security status when navigating from HTTP to HTTPS.<br />

Family Internet Services 1195


Solution: Upgrade to version 9.51 or higher.<br />

CVE-2008-3078<br />

MyBB < 1.2.13 SQL Injection<br />

<strong>PVS</strong> ID: 4573 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

MyBB installed on the remote host is vulnerable to a number of vulnerabilities. The first<br />

vulnerability appears to be a cross-site scripting (XSS) flaw. The second vulnerability is a<br />

SQL injection flaw. An attacker exploiting the XSS vulnerability would be able to execute<br />

arbitrary code in the browser of unsuspecting MyBB users. An attacker exploiting the SQL<br />

injection flaw would be able to execute arbitrary SQL commands on the remote database<br />

server.<br />

Solution: Upgrade to version 1.2.13 or higher.<br />

CVE Not available<br />

Simple Machines Forum %lt; 1.1.4 / 1.0.12 SQL Injection<br />

<strong>PVS</strong> ID: 4574 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the Simple Machines Forum (SMF), a web forum. This version of SMF is<br />

vulnerable to a flaw in the way that it handles user-supplied data.\n\n - The 'topic' request<br />

parameter is used in a database query without proper sanitation. An attacker exploiting this<br />

flaw would be able to execute arbitrary SQL code against the remote database.\n - The<br />

second issue occurs in the 'preparsecode()' function when posting a message with multiple<br />

'[html]' tags.\n\nNOTE: both of these issues require credentials in order to exploit.<br />

Solution: Upgrade to version 1.1.4, 1.0.12 or higher.<br />

CVE Not available<br />

Sun Java ASP Server Default Admin Password<br />

<strong>PVS</strong> ID: 4575 FAMILY: Web Servers RISK: HIGH NESSUS ID:33437<br />

Description: Synopsis :\n\nThe remote web server can be accessed with default admin<br />

credentials.\n\nThe remote host is running Sun Java ASP server. It is possible to access the<br />

remote server with default admin credentials.<br />

Solution: Refer to the See Also section and follow the steps to change the admin password<br />

immediately.<br />

CVE Not available<br />

trixbox Version Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1196


<strong>PVS</strong> ID: 4576 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a trixbox Voice-over-IP (VoIP) administration server. The reported<br />

version number is: \n %L<br />

Solution: Ensure that this service can only be accessed by trusted machines.<br />

CVE Not available<br />

trixbox Dashboard user/index.php langChoice Parameter Local File Inclusion<br />

<strong>PVS</strong> ID: 4577 FAMILY: Web Servers RISK: HIGH NESSUS ID:33445<br />

Description: Synopsis :\n\nThe remote web server contains a PHP script that is susceptible to a local file<br />

inclusion attack.\n\nThe remote host is running trixbox dashboard, a PHP-based front-end<br />

for trixbox, an IP-PBX software solution. The version of trixbox dashboard installed on the<br />

remote host fails to sanitize user-supplied input to the 'langChoice' parameter of the<br />

'user/index.php' script before using it to include PHP code. Regardless of PHP's<br />

'register_globals' setting, an unauthenticated attacker may be able to leverage this issue to<br />

view arbitrary files or to execute arbitrary PHP code on the remote host, subject to the<br />

privileges of the web server user ID.<br />

Solution: No solution is known at this time.<br />

CVE-2008-6825<br />

ISC BIND DNS Query ID Field Prediction Cache Poisoning<br />

<strong>PVS</strong> ID: 4578 FAMILY: DNS Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote DNS server is vulnerable to a cache-poisoning attack.\n\nThe<br />

remote host is running a version of BIND DNS server which fails to randomize the UDP<br />

source port. This could allow an attacker to poison the DNS cache. A poisoned cache<br />

means that DNS clients can be directed to rogue sites and greatly simplifies phishing<br />

attacks. The reported version of BIND is: \n %L \nIAVA Reference : 2008-A-0045\nSTIG<br />

Finding Severity : Category I<br />

Solution: Many vendors build their DNS solution on top of BIND. Contact your specific DNS vendor<br />

for a fix. While the only true fix is to use DNSSEC, ISC has released patched versions of<br />

BIND that make it harder for attackers to spoof DNS answers. This is accomplished by<br />

expanding the range of UDP ports from which queries are sent. The following versions of<br />

ISC BIND increase the range of utilized UDP ports: 9.5.0-P1, 9.5.1b1, 9.4.2-P1, 9.4.3b2,<br />

9.3.5-P1<br />

CVE-2008-1447<br />

Apache < 2.2.9 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4579 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:33477<br />

Family Internet Services 1197


Description: Synopsis :\n\nThe remote web server may be affected by several issues.\n\nAccording to its<br />

banner, the version of Apache 2.2 installed on the remote host is older than 2.2.9. Such<br />

versions may be affected by several issues, including :\n\n - Improper handling of excessive<br />

forwarded interim responses may cause denial of service conditions in mod_proxy_http<br />

(CVE-2008-2364).\n - A cross-site request forgery vulnerability in the balancer-manager<br />

interface of mod_proxy_balancer (CVE-2007-6420).\n - An issue exists in the handling of<br />

the 'Options' and 'AllowOverride' directives (CVE-2009-1195).\n\nNote that the remote<br />

web server may not actually be affected by these vulnerabilities. <strong>PVS</strong> cannot determine<br />

whether the affected modules are in use.<br />

Solution: Either ensure that the affected modules are not in use or upgrade to Apache version<br />

2.2.9 or higher.<br />

CVE-2009-1195<br />

Xerox Centreware Version Detection<br />

<strong>PVS</strong> ID: 4580 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Xerox Centreware server version: \n %L<br />

Solution: N/A<br />

Sun Jconsole Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 4581 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Sun Jconsole application. This application is used to manage<br />

Sun servers across the network.<br />

Solution: N/A<br />

CVE Not available<br />

Xerox CentreWare < 4.6.46 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4582 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:33478<br />

Description: Synopsis : \n\nThe remote web server contains an application that is affected by multiple<br />

issues.\n\nXerox CentreWare Web, a web-based tool for IP printer management, is<br />

installed on the remote web server. According to its banner, the installed version of Xerox<br />

CentreWare Web reportedly contains three areas that are prone to SQL injection attacks,<br />

provided the attacker has valid credentials, and two that are prone to cross-site scripting<br />

attacks. The version of the remote server is: \n %L<br />

Solution: Upgrade to version 4.6.46 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1198


CVE-2008-3122<br />

RMI Registry Detection<br />

<strong>PVS</strong> ID: 4583 FAMILY: Generic RISK: INFO NESSUS ID:22227<br />

Description: Synopsis :\n\nAn RMI registry is listening on the remote host.\n\nThe remote host is<br />

running an RMI registry, which acts as a bootstrap naming service for registering and<br />

retrieving remote objects with simple names in the Java Remote Method Invocation (RMI)<br />

system. This server is managed and monitored by the Sun Jconsole system at IP: %L<br />

Solution: Ensure that only valid clients are allowed to connect to the management ports of this server.<br />

CVE Not available<br />

Firebird Database < 2.1.1.17910 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4584 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

seems to be running a Firebird database server version '%L'.\n\nThis version of Firebird is<br />

vulnerable to a number of flaws. While the details of the flaws are currently unknown, the<br />

vendor has addressed the issues. It is believed that an attacker exploiting these flaws would<br />

be able to gain access to confidential data and/or cause the database to crash.<br />

Solution: Upgrade to version 2.1.1.17910 or higher.<br />

CVE Not available<br />

phpBB < 3.0.2 Multiple Information Disclosure Vulnerabilities<br />

<strong>PVS</strong> ID: 4585 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is missing a critical security patch or<br />

upgrade.\n\nAccording to its banner, the remote host is running a version of phpBB that is<br />

vulnerable to several flaws. While the vendor has not released specific information<br />

regarding the flaws, it is believed that an attacker would be able to redirect valid phpBB<br />

users to malicious sites. The reported version of phpBB was: \n %L \n<br />

Solution: Upgrade to version 3.0.2 or higher.<br />

CVE Not available<br />

Java Remote Management Platform Plaintext Password Detection<br />

<strong>PVS</strong> ID: 4586 FAMILY: Generic<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 1199


Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nThe remote server is managed by a Java JConsole. Further, the server is<br />

configured to accept plaintext credentials. This can be dangerous if an attacker can gain<br />

access to network traffic. The plaintext authentication string observed was:\n%P\n<br />

Solution: Require remote clients to use an encrypted session.<br />

CVE Not available<br />

WordPress < 2.6 press-this.php XSS<br />

<strong>PVS</strong> ID: 4587 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

version of WordPress installed on the remote host is vulnerable to a cross-site scripting<br />

flaw due to the way that it parses user-supplied data to the 'press-this.php' script. An<br />

attacker exploiting this flaw would need to be able to convince a WordPress user to open a<br />

malicious URI. Successful exploitation would result in attacker code being run in the<br />

browser.<br />

Solution: Upgrade to version 2.6 or higher.<br />

CVE Not available<br />

Firefox < 2.0.0.16 / 3.0.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4588 FAMILY: Web Clients RISK: HIGH NESSUS ID:33505<br />

Description: Synopsis :\n\nThe remote Windows host contains a web browser that is affected by<br />

multiple vulnerabilities.\n\nThe installed version of Firefox is affected by various security<br />

issues :\n\n - By creating a very large number of references to a common CSS object, an<br />

attacker can overflow the CSS reference counter, causing a crash when the browser<br />

attempts to free the CSS object while still in use and allowing for arbitrary code execution<br />

(MFSA 2008-34).\n - If Firefox is not already running, passing it a command-line URI with<br />

pipe ('|') symbols will open multiple tabs, which could be used to launch 'chrome:i' URIs<br />

from the command-line or to pass URIs to Firefox that would normally be handled by a<br />

vector application (MFSA 2008-35).<br />

Solution: Upgrade to version 2.0.0.16 / 3.0.1 or higher.<br />

CVE-2008-2933<br />

Blackberry Enterprise Server Version Detection<br />

<strong>PVS</strong> ID: 4589 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Blackberry Enterprise Server version: \n %L<br />

Solution: N/A<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1200


CVE Not available<br />

BlackBerry Enterprise Server < 4.1.6 PDF Processing Arbitrary Code Execution<br />

<strong>PVS</strong> ID: 4590 FAMILY: Web Servers RISK: HIGH NESSUS ID:33550<br />

Description: Synopsis :\n\nThe remote Windows host has an application that is affected by a code<br />

execution vulnerability\n\nThe version of BlackBerry Enterprise Server on the remote host<br />

reportedly contains a vulnerability in the PDF distiller component of the BlackBerry<br />

Attachment Service. A remote attacker may be able to leverage this issue to execute<br />

arbitrary code on the affected host subject to the privileges under which the application<br />

runs, generally 'Administrator', by sending an email message with a specially crafted PDF<br />

file and having that opened for viewing on a BlackBerry smartphone.<br />

Solution: Either upgrade to BlackBerry Enterprise Server software version 4.1 Service Pack 6 (4.1.6),<br />

apply an appropriate interim security software update, or prevent the BlackBerry<br />

Attachment Service from processing PDF files.<br />

CVE Not available<br />

Firefox < 3.0.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4591 FAMILY: Web Clients RISK: HIGH NESSUS ID:33522<br />

Description: Synopsis :\n\nThe remote Windows host contains a web browser that is affected by<br />

multiple vulnerabilities.\n\nThe installed version of Firefox is affected by various security<br />

issues :\n\n - By creating a very large number of references to a common CSS object, an<br />

attacker can overflow the CSS reference counter, causing a crash when the browser<br />

attempts to free the CSS object while still in use and allowing for arbitrary code execution<br />

(MFSA 2008-34).\n - If Firefox is not already running, passing it a command-line URI with<br />

pipe ('|') symbols will open multiple tabs, which could be used to launch 'chrome:i' URIs<br />

from the command-line or to pass URIs to Firefox that would normally be handled by a<br />

vector application (MFSA 2008-35).<br />

Solution: Upgrade to version 3.0.1 or higher.<br />

CVE-2008-2933<br />

F-PROT Antivirus Version Detection<br />

<strong>PVS</strong> ID: 4592 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running F-PROT Antivirus version: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

F-PROT Attachment Handling DoS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1201


<strong>PVS</strong> ID: 4593 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running the F-PROT Antivirus product version: \n %L \n\nThis version of<br />

F-PROT is vulnerable to a remote Denial of Service (DoS) attack when processing certain<br />

file types. Specifically, malformed CHM, UPX-compressed, ASPack-compressed and<br />

Microsoft Office documents can cause the remote antivirus engine to crash. An attacker<br />

exploiting this flaw would only need the ability to send an email with a malformed<br />

attachment.<br />

Solution: Versions 4.4.4 and 6.0.9.0 are listed as not being vulnerable to this attack.<br />

CVE-2008-3244<br />

HP System Management Version Detection<br />

<strong>PVS</strong> ID: 4594 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running HP System Management version: \n %L \n\nThis application<br />

facilitates remote management via a web interface. The service primarily listens on two<br />

ports: 2301/tcp (plaintext HTTP) and 2381/tcp (SSL).<br />

Solution: Either disable port 2301 or ensure that it forces a redirect to the SSL port (2381).<br />

CVE Not available<br />

HP System Management Homepage (SMH) < 2.1.12 Unspecified XSS<br />

<strong>PVS</strong> ID: 4595 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:33548<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host appears to be running HP System Management Homepage (SMH), a<br />

web-based management interface for ProLiant and Integrity servers. The reported version<br />

is: \n %L \n\n.The version of HP SMH installed on the remote host fails to sanitize user<br />

input to an unspecified parameter and script before using it to generate dynamic HTML. A<br />

remote attacker may be able to exploit these issues to cause arbitrary HTML and script<br />

code to be executed by a user's browser in the context of the affected web site.<br />

Solution: Upgrade to version 2.1.12.0 or higher.<br />

CVE-2008-1663<br />

WinRemotePC Server Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4596 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1202


Description: The remote host is running WinRemotePC, a software application that allows for remote<br />

desktop administration of the machine.<br />

Solution: Ensure that such a solution is in alignment with corporate policies and guidelines.<br />

CVE Not available<br />

RunCMS < 1.6.2 Multiple Script Remote File Inclusion<br />

<strong>PVS</strong> ID: 4597 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a script injection attack.\n\nThe remote host<br />

is running RunCMS, a web-based content management and messaging system. This version<br />

of RunCMS is reported to be vulnerable to a number of remote file inclusion<br />

vulnerabilities. Specifically, the 'votepolls.php' and 'config.php' scripts can be tricked into<br />

opening and running scripts from a malicious webserver. An attacker exploiting these flaws<br />

would only need the ability to send requests to the application. Successful exploitation<br />

would result in the attacker executing arbitrary script code on the server.<br />

Solution: Upgrade to version 1.6.2 or higher.<br />

CVE-2008-3354<br />

OpenSSH X11 < 5.1 Session Hijacking<br />

<strong>PVS</strong> ID: 4598 FAMILY: SSH RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a local 'session hijacking'<br />

flaw.\n\nAccording to its banner, the version of SSH installed on the remote host is older<br />

than 5.1. Such versions may allow a local user to hijack X11 sessions because it improperly<br />

checks user privileges before re-binding a port. In order for the attack to be successful, the<br />

'X11UseLocalhost' option would need to be disabled. By default, the option is enabled.<br />

Further, the OpenSSH service would need to be running on an operating system (such as<br />

HP-UX) where the effective user ID is not checked.<br />

Solution: Upgrade to version 5.1 or higher.<br />

CVE-2008-3259<br />

EMC Retrospect Backup Client Version Detection<br />

<strong>PVS</strong> ID: 4599 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the EMC Retrospect backup client. This host allows a<br />

server to connect and access data remotely. This application listens on port 497/tcp<br />

for connections. The reported version number is: \n %L<br />

Solution: Ensure that only valid IP addresses can access the service.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1203


EMC Retrospect Server Detection<br />

<strong>PVS</strong> ID: 4600 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the EMC Retrospect server. This application is used to<br />

manage data backups of remote Retrospect clients. The major/minor version number<br />

of the Retrospect server is: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

DNS Server Source Port 53 Query Usage<br />

<strong>PVS</strong> ID: 4601 FAMILY: DNS Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote DNS server is vulnerable to a cache-poisoning attack.\n\nThe<br />

remote host is running a DNS server that is configured to use port 53 as its source port for<br />

queries. This is extremely dangerous as an attacker only needs to spoof a 16-bit transaction<br />

ID in order to poison the DNS cache. A poisoned cache means that DNS clients can be<br />

directed to rogue sites and greatly simplifies phishing attacks.\nIAVA Reference :<br />

2008-A-0045\nSTIG Finding Severity : Category I<br />

Solution: Ensure that the DNS server is fully patched and can utilize a wide range of UDP source<br />

port numbers. For ISC servers, ensure that the following line does not exist within the<br />

configuration file: "query-source address * port 53;"<br />

CVE-2008-1447<br />

OpenDNS Client Detection<br />

<strong>PVS</strong> ID: 4602 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is configured to use OpenDNS DNS servers. OpenDNS is a third-party<br />

DNS provider that offers administrators the ability to filter traffic, view network and user<br />

statistics, and more.<br />

Solution: Ensure that such usage is in alignment with corporate policies and guidelines.<br />

CVE Not available<br />

Agnitum Outpost Version Detection<br />

<strong>PVS</strong> ID: 4603 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is running the Agnitum Outpost security suite. This suite of tools protects<br />

users from viruses, phishing attacks, malware and more. The observed version was: \n %L<br />

Solution: N/A<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1204


CVE Not available<br />

Agnitum Outpost <strong>Security</strong> Suite < 6.5.2358.316.0607 Detection Engine Bypass<br />

<strong>PVS</strong> ID: 4604 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote client is running the Agnitum Outpost security suite. This suite of tools protects<br />

users from viruses, phishing attacks, malware and more. The observed version was: \n %L<br />

\n\nThe vendor has reported an issue where specially formatted file names may bypass the<br />

detection engines. An attacker exploiting this flaw would need to be able to convince an<br />

Outpost user to open a malicious file. Successful exploitation would result in the attacker<br />

bypassing the security rules and passing a malicious file to the client.<br />

Solution: Upgrade to version 6.5.2358.316.0607 or higher.<br />

CVE Not available<br />

Mantis < 1.1.2 account_prefs_update.php language Parameter Traversal Local File Inclusion<br />

<strong>PVS</strong> ID: 4605 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a directory traversal flaw.\n\nThe remote<br />

host is running Mantis Bug Tracker version: '%L'\n\nThe version of Mantis Bug Tracker<br />

installed on the remote host does not properly parse user-supplied data to the 'language'<br />

parameter of the 'account_prefs_update.php' script. An attacker can gain 'read' access to<br />

local files or execute arbitrary files that are already present on the web server. An attacker<br />

exploiting this flaw would send a specially formatted 'language' parameter to the affected<br />

script. This parameter would probably contain file names preceded by directory-traversal<br />

strings.<br />

Solution: Upgrade to version 1.1.2 or higher.<br />

CVE-2008-3333<br />

Retrospect Backup Client <<br />

<strong>PVS</strong> ID: 4606 FAMILY: Generic<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:33561<br />

Description: Synopsis : \n\nThe remote backup client is affected by multiple<br />

vulnerabilities.\n\nAccording to its version number, the Retrospect Backup Client installed<br />

on the remote host is affected by several vulnerabilities : \n\n - An error in the client may<br />

lead to memory corruption and in turn a denial of service condition when processing<br />

specially-crafted packets, although only when an English client is used on a Chinese<br />

operating system, which is not a supported configuration.\n - The password hash is sent<br />

over the network unencrypted, which could result in its disclosure.\n - A null pointer<br />

dereference error may lead to a denial of service condition.\n\nThe reported version number<br />

is: \n %L<br />

Family Internet Services 1205


Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2008-3290<br />

Retrospect Backup Server < 7.6 Authentication Module Password Hash Disclosure (ESA-08-009)<br />

<strong>PVS</strong> ID: 4607 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:33562<br />

Description: Synopsis : \n\nThe remote Windows host has an application that is affected by an<br />

information disclosure vulnerability.\n\nAccording to its version number, the<br />

Authentication Module in the Retrospect Backup Server installed on the remote host uses a<br />

weak hash algorithm to hash a user's password, which could allow a remote attacker to gain<br />

control of a client's machine. The reported version number is: \n %L<br />

Solution: Upgrade to version 7.6 or higher.<br />

CVE-2008-3288<br />

RealPlayer for Windows < 6.0.14.806 / 6.0.12.1675 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4608 FAMILY: Web Clients RISK: HIGH NESSUS ID:33744<br />

Description: Synopsis :\n\nThe remote Windows application is affected by at least one security<br />

vulnerability.\n\nAccording to its version number, the installed version of RealPlayer /<br />

RealPlayer Enterprise on the remote Windows host suffers from possibly several issues<br />

:\n\n - Heap memory corruption issues in several ActiveX controls can lead to arbitrary<br />

code execution (CVE-2008-1309).\n - An unspecified local resource reference vulnerability<br />

(CVE-2008-3064).\n - An SWF file heap-based buffer overflow (CVE-2007-5400).\n - A<br />

buffer overflow involving the 'import()' method in an ActiveX control implemented by the<br />

'rjbdll.dll' module could result in arbitrary code execution (CVE-2008-3066).\n\nNote that<br />

RealPlayer 11 (builds 6.0.14.738 - 6.0.14.802) are only affected by the first issue<br />

(CVE-2008-1309).\nNote that the vendor's advisory states that version numbers for<br />

RealPlayer 10.5 are not sequential.<br />

Solution: Upgrade to RealPlayer 11.0.3 (build 6.0.14.806) / RealPlayer 10.5 (build 6.0.12.1675) or<br />

higher.<br />

CVE-2008-3066<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Thunderbird < 2.0.0.16 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4609 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:33563<br />

Description: Synopsis :\n\nThe remote Windows host contains a mail client that is affected by multiple<br />

vulnerabilities.\n\nThe installed version of Thunderbird is affected by various security<br />

issues :\n\n\n - Several stability bugs leading to crashes that, in some cases, show traces of<br />

memory corruption (MFSA 2008-21).\n\n - By taking advantage of the privilege level<br />

stored in the pre-compiled 'fastload' file, an attacker may be able to run arbitrary JavaScript<br />

code with chrome privileges (MFSA 2008-24).\n\n - Arbitrary code execution is possible in<br />

'mozIJSSubScriptLoader.loadSubScript()' (MFSA 2008-25).\n\n - Several function calls in<br />

Family Internet Services 1206


the MIME handling code use unsafe versions of string routines (MFSA 2008-26).\n\n - An<br />

improperly encoded '.properties' file in an add-on can result in uninitialized memory being<br />

used, which could lead to data formerly used by other programs being exposed to the<br />

add-on code (MFSA 2008-29).\n\n - A weakness in the trust model regarding alt names on<br />

peer-trusted certs could lead to spoofing secure connections to any other site (MFSA<br />

2008-31).\n\n - A crash in Mozilla's block reflow code could be used by an attacker to crash<br />

the browser and run arbitrary code on the victim's computer (MFSA 2008-33).\n\n - By<br />

creating a very large number of references to a common CSS object, an attacker can<br />

overflow the CSS reference counter, causing a crash when the browser attempts to free the<br />

CSS object while still in use and allowing for arbitrary code execution (MFSA 2008-34).<br />

Solution: Upgrade to version 2.0.0.16 or higher.<br />

CVE-2008-2785<br />

CUPS < 1.3.8 Crafted PNG File Integer Overflow<br />

<strong>PVS</strong> ID: 4610 FAMILY: Web Servers RISK: HIGH NESSUS ID:33577<br />

Description: Synopsis :\n\nThe remote printer service is affected by a buffer overflow<br />

vulnerability.\n\nAccording to its banner, the version of CUPS installed on the remote host<br />

is affected by an integer overflow. Using a specially crafted PNG file with overly long<br />

width and height fields, a remote attacker can leverage this issue to crash the affected<br />

service and may allow execution of arbitrary code.<br />

Solution: Upgrade to version 1.3.8 or higher.<br />

CVE-2008-1722<br />

AVG Scanning Engine < 8.0.156 UPX Parsing DoS<br />

<strong>PVS</strong> ID: 4611 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:33762<br />

Description: Synopsis : \n\nThe remote Windows host contains an application that is affected by a denial<br />

of service vulnerability.\n\nAVG Anti-Virus is installed on the remote Windows host. The<br />

version of AVG Anti-Virus installed on the remote host is affected by a 'UPX' file parsing<br />

flaw. An attacker can trigger a divide-by-zero error by causing the application to process a<br />

specially crafted 'UPX' file, which would result in a denial of service condition. The<br />

reported version, build and license key is: \n %L<br />

Solution: Upgrade to version 8.0.156 or higher.<br />

CVE-2008-3373<br />

DB2 < 9.5 Fix Pack 1 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4612 FAMILY: Database RISK: HIGH NESSUS ID:33763<br />

Family Internet Services 1207


Description: Synopsis : \n\nThe remote database server is affected by multiple issues.\n\nThe<br />

installation of DB2 9.5 on the remote host does not have any Fix Packs applied and thus is<br />

affected by one or more of the following issues : \n\n - There is a security vulnerability in<br />

the 'NNSTAT' procedure on Windows platforms only that allows low-privileged users to<br />

overwrite arbitrary files (IZ10776).\n - There is a security vulnerability in the<br />

'SYSPROC.ADMIN_SP_C' procedure on Windows platforms that allows users to load<br />

arbitrary libraries and execute arbitrary code in the system (IZ10917).\n - An unspecified<br />

vulnerability affects 'DB2WATCH' and 'DB2FREEZE' on Solaris platforms (IZ12994).\n -<br />

An authenticated remote user can cause the DB2 instance to crash by passing specially<br />

crafted parameters to the 'RECOVERJAR' and 'REMOVE_JAR' procedures (IZ15496).\n -<br />

There is an internal buffer overflow vulnerability in the DAS process that could allow<br />

arbitrary code execution on the affected host (IZ12406).\n - A local attacker can create<br />

arbitrary files as root on Unix and Linux platforms using symlinks to the<br />

'dasRecoveryIndex', 'dasRecoveryIndex.tmp', '.dasRecoveryIndex.lock', and<br />

'dasRecoveryIndex.cor' files during initialization (IZ12798).\n - There is a security<br />

vulnerability related to a failure to switch the owner of the 'db2fmp' process affecting Unix<br />

and Linux platforms (IZ19155).\n - When a memory dump occurs, the password used to<br />

connect to the database remains visible in clear text in memory (JR28314). The reported<br />

version/build of the remote DB2 server is: \n %L<br />

Solution: Apply DB2 Version 9.5 Fix Pack 1.<br />

CVE-2008-1998<br />

Coppermine Photo Gallery < 1.4.19 data Cookie Local File Inclusion<br />

<strong>PVS</strong> ID: 4613 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:33789<br />

Description: Synopsis :\n\nThe remote web server contains a PHP application that is affected by a local<br />

file inclusion vulnerability.\n\nThe version of Coppermine installed on the remote host fails<br />

to sanitize input to the 'lang' array element of its data cookie before using it in<br />

'include/init.inc.php' to include PHP code. Provided the application's character set is set to<br />

'utf-8', which is default, an unauthenticated remote attacker can exploit this issue to view<br />

arbitrary files or possibly to execute arbitrary PHP code on the remote host subject to the<br />

privileges of the web server user ID.<br />

Solution: Upgrade to version 1.4.19 or higher.<br />

CVE-2008-3486<br />

Apache Tomcat < 4.1.37/5.5.26/6.0.16 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4614 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Apache Tomcat version: \n %L \n\nThis version of Tomcat is reported to be<br />

vulnerable to several flaws. First, the application fails to sanitize user input to the<br />

'RequestDispatcher' method. An attacker exploiting this flaw could request content outside<br />

Family Internet Services 1208


the web root (typically through the use of '../' or similar sequences). If successful, the<br />

attacker could gain access to confidential data. Second, the application is vulnerable to a<br />

cross-site scripting (XSS) attack via the 'HttpServerResponse.sendError()' function. The<br />

user-supplied data is echoed back within the response headers and could lead to arbitrary<br />

code being executed within the browser of Tomcat clients.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2008-2370<br />

Ingres Database Multiple Local Vulnerabilities<br />

<strong>PVS</strong> ID: 4615 FAMILY: Database RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the Ingres Database version: \n %L \n\nThis version of Ingres is vulnerable to<br />

several local vulnerabilities. There is a flaw in the 'verifydb' utility that would allow a local<br />

attacker to overwrite critical files. There is a flaw in the 'libbecompat' library that would<br />

allow a local attacker to execute a stack overflow. There is a flaw in the 'ingvalidpw' utility<br />

that would allow a local user to escalate privileges.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2008-3357<br />

Novell iManager Version Detection<br />

<strong>PVS</strong> ID: 4616 FAMILY: CGI RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Novell iManager version: \n %L \n\niManager is a web<br />

application that facilitates remote administration of Novell resources.<br />

Solution: N/A<br />

CVE Not available<br />

Winamp < 5.541 NowPlaying Unspecified Vulnerability<br />

<strong>PVS</strong> ID: 4617 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:33820<br />

Description: Synopsis : \n\nThe remote Windows host contains a multimedia application that is affected<br />

by an unspecified vulnerability.\n\nThe remote host is running Winamp, a media player for<br />

Windows. The version of Winamp installed on the remote host is earlier than 5.541. Such<br />

versions reportedly contain an unspecified vulnerability involving the software's<br />

'NowPlaying' feature. The reported version of Winamp is: \n %L<br />

Solution: Upgrade to version 5.541 or higher.<br />

CVE-2008-3567<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1209


Novell iManager < 2.7 SP1 Property Book Pages <strong>Security</strong> Bypass<br />

<strong>PVS</strong> ID: 4618 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:33867<br />

Description: Synopsis :\n\nThe remote web server is affected by a security bypass<br />

vulnerability.\n\nNovell iManager is installed on the remote host. The version of iManager<br />

installed reportedly fails to implement sufficient access control checks on 'Property Book<br />

Pages' created with Plug-in Studio before granting delete privileges on them to a user.<br />

Solution: Upgrade to version 2.7 SP1 (iManager 2.7.1) or higher.<br />

CVE-2008-3488<br />

Gallery < 1.5.8 modules.php phpEx Parameter Traversal Local File Inclusion<br />

<strong>PVS</strong> ID: 4619 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running Gallery, a web-based photo album<br />

application written in PHP. The version of Gallery installed on the remote host is less than<br />

1.5.8. This version of Gallery is vulnerable to a local file inclusion vulnerability. The root<br />

of the flaw is in the 'phpEx' parameter of the '/contrib/phpBB2/modules.php' script. An<br />

attacker exploiting this flaw would send a specially formatted request to the modules.php<br />

application. The request would likely include a directory traversal to some local file on the<br />

server. e.g. '../../../etc/passwd'. Successful exploitation would result in the attacker gaining<br />

'read' access to confidential files. The reported version of Gallery is: \n %L \n<br />

Solution: Upgrade to version 1.5.8 or higher.<br />

CVE Not available<br />

PHP < 4.4.9 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4620 FAMILY: Web Servers RISK: HIGH NESSUS ID:33849<br />

Description: Synopsis : \n\nThe remote web server uses a version of PHP that is affected by multiple<br />

issues.\n\nAccording to its banner, the version of PHP installed on the remote host is older<br />

than 4.4.9. Such versions address several security issues, including : \n\n - An update of<br />

PCRE to version 7.7.\n - An overflow in memnstr().\n - A crash in imageloadfont when an<br />

invalid font is given.\n - An open_basedir handling issue in the curl extension.\n -<br />

'mbstring.func_overload' set in '.htaccess' becomes global. Note that the release<br />

announcement states this will be the last release for the PHP 4.4 series. The reported<br />

version of PHP is: \n %L<br />

Solution: Upgrade to version 4.4.9 or higher.<br />

CVE-2008-3660<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Apache Tomcat < 6.0.18 UTF-8 Directory Traversal Arbitrary File Access<br />

Family Internet Services 1210


<strong>PVS</strong> ID: 4621 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:33866<br />

Description: Synopsis :\n\nThe remote web server is prone to a directory traversal attack.\n\nThe version<br />

of Apache Tomcat installed on the remote host is affected by a directory traversal issue. By<br />

encoding directory traversal sequences as UTF-8 in a request, an unauthenticated remote<br />

attacker can leverage this issue to view arbitrary files on the remote host. Note that<br />

successful exploitation requires that a context be configured with 'allowLinking' set to 'true'<br />

and the connector with 'URIEncoding' set to 'UTF-8', neither of which is a default setting.<br />

Solution: Upgrade to version 6.0.18 or higher.<br />

CVE-2008-2938<br />

Grendel Web Application Scanner Detection<br />

<strong>PVS</strong> ID: 4622 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote host is running the Grendel web application scanner.<br />

Grendel is an attack framework that allows users to automatically scan and fuzz web<br />

application servers.<br />

Solution: Ensure that this application is authorized according to corporate policies and guidelines.<br />

CVE Not available<br />

JBoss EAP < 4.2.0.CP03 / 4.3.0.CP01 Status Servlet Information Disclosure<br />

<strong>PVS</strong> ID: 4623 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:33869<br />

Description: Synopsis :\n\nThe remote web server contains a servlet that is affected by an information<br />

disclosure vulnerability.\n\nThe version of JBoss Enterprise Application Platform (EAP)<br />

running on the remote host allows unauthenticated access to the status servlet, which is<br />

used to monitor sessions and requests sent to the server.<br />

Solution: Upgrade to version 4.2.0.CP03 / 4.3.0.CP01 or higher.<br />

CVE-2008-3273<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

HP-UX ftpd Remote Privileged Access Authentication Bypass<br />

<strong>PVS</strong> ID: 4624 FAMILY: FTP Servers RISK: HIGH NESSUS ID:33899<br />

Description: Synopsis :\n\nThe remote FTP server may allow remote privileged access.\n\nAccording to<br />

its banner, the version of the HP-UX FTP server running on the remote host is at a patch<br />

level before PHNE_38458. Such versions reportedly contain an unspecified vulnerability<br />

that in certain account configurations could be exploited by an anonymous remote attacker<br />

to gain privileged access.\nIAVT Reference : 2008-T-0045\nSTIG Finding Severity :<br />

Category I<br />

Family Internet Services 1211


Solution: Apply patch PHNE_38458 or later.<br />

CVE-2008-1668<br />

Sun Java System Web Proxy Server Detection<br />

<strong>PVS</strong> ID: 4625 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Sun Java System web proxy server. This server retrieves web pages<br />

for internal clients. The reported version number was: \n %L<br />

Solution: N/A<br />

Sympa <<br />

CVE Not available<br />

<strong>PVS</strong> ID: 4626 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a local flaw in an application that handles<br />

local files.\n\nThe remote host is running Sympa, an open-source mailing list software<br />

application. The reported version number is '%L'\n\nThis version of Sympa is vulnerable to<br />

a flaw due to the way that sympa.pl creates files when the '--make_alias_file' option is used.<br />

An attacker exploiting this flaw would need local access. Successful exploitation would<br />

result in the attacker overwriting local files which the Sympa application had permissions<br />

on.<br />

Solution: Upgrade to a version higher than 5.4.3.<br />

CVE-2008-4476<br />

PHP Live! Helper < 2.1.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4627 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running PHP Live Helper, a customer support application, version: \n %L \n\nThis<br />

version of Live Helper is vulnerable to a number of flaws. \n\nThere is a SQL injection<br />

flaw when handling malformed data to the 'dep' parameter of the 'onlinestatus_html.php'<br />

script. An attacker exploiting this flaw would be able to execute arbitrary SQL commands<br />

against the database server.\n\nThere is a flaw in the way that the application handles data<br />

passed to the 'libsecure.php' source file. An attacker exploiting this flaw would be able to<br />

change the behavior of the database server.\n\nThere is a flaw in the way that the<br />

application handles data to the 'rg' parameter of the 'globalsoff.php' file. An attacker<br />

exploiting this flaw might be able to get arbitrary code executed via an 'eval()' function call.<br />

Solution: Upgrade to version 2.1.0 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1212


CVE-2008-3764<br />

Reflections SSH Server Version Detection<br />

<strong>PVS</strong> ID: 4628 FAMILY: SSH RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a Reflections for Secure IT SSH server version: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

RhinoSoft Serv-U FTP Server Version Detection<br />

<strong>PVS</strong> ID: 4629 FAMILY: FTP Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RhinoSoft Serv-U FTP server. Serv-U is typically<br />

installed as part of a suite of products that enables file sharing on a remote server. The<br />

installed version number is: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Serv-U < 7.2.0.1 SFTP Directory Creation Logging DoS<br />

<strong>PVS</strong> ID: 4630 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:33937<br />

Description: Synopsis : \n\nThe remote FTP server is affected by a denial of service<br />

vulnerability.\n\nThe remote host is running Serv-U File Server, an FTP server for<br />

Windows. The installed version of Serv-U is earlier than 7.2.0.1 and reportedly contains an<br />

SFTP bug in which directory creation and logging SFTP commands could lead to an<br />

application crash. The reported version number is: \n %L<br />

Solution: Upgrade to version 7.2.0.1 or higher.<br />

CVE-2008-3731<br />

RhinoSoft Serv-U Web Server Version Detection<br />

<strong>PVS</strong> ID: 4631 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the RhinoSoft Serv-U web server. Serv-U web server is<br />

typically installed as part of a suite of products that enables file sharing on a remote<br />

server. The installed version number is: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1213


Attachmate Reflection for Secure IT UNIX Server < 7.0 SP1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4632 FAMILY: SSH RISK: HIGH NESSUS ID:33948<br />

Description: Synopsis : \n\nThe remote SSH service is affected by multiple vulnerabilities.\n\nThe<br />

version of Attachmate Reflection for Secure IT UNIX Server installed on the remote host is<br />

lower than 7.0 SP1 and thus reportedly affected by several issues : \n\n - There is an<br />

inherited vulnerability in OpenSSL when parsing malformed ASN.1 structures leading to a<br />

denial of service vulnerability (CVE-2006-2937).\n - There is an inherited vulnerability in<br />

OpenSSL when parsing parasitic public keys leading to a denial of service vulnerability<br />

(CVE-2006-2940).\n - There is an inherited vulnerability in OpenSSL when performing<br />

Montgomery multiplication, leading to a side-channel attack vulnerability<br />

(CVE-2007-3108).\n - There is an inherited vulnerability in OpenSSH with the execution of<br />

the ~/.ssh2/rc session file (CVE-2008-1657).\n - There is an issue with the security of<br />

forwarded X11 connections, leading to possible hijacking. (CVE-2008-1483)\n - There are<br />

multiple unspecified other vulnerabilities.\nThe reported version of SSH is: \n %L<br />

Solution: Upgrade to version 7.0 SP1 or higher.<br />

CVE-2008-6021<br />

Cisco Secure Access Control Server Detection<br />

<strong>PVS</strong> ID: 4633 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server is part of an access policy control platform.\n\nThe<br />

remote host appears to be running Cisco Secure Access Control Server, an access policy<br />

control platform, on this port. It is used to centrally manage access to network resources.<br />

Solution: Limit incoming traffic to this port if desired.<br />

CVE Not available<br />

Opera < 9.52 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4634 FAMILY: Web Clients RISK: HIGH NESSUS ID:33949<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by several<br />

issues.\n\nThe version of Opera installed on the remote host is older than 9.52 and is<br />

reportedly affected by several issues :\n\n - Specially-crafted URLs could start Opera in a<br />

way that would allow execution of arbitrary code.\n - Invalid checking of what frames a<br />

site can change, allowing a website to open pages from other sites.\n - An unspecified<br />

cross-site scripting issue.\n - Custom shortcuts and menu commands may pass parameters<br />

created from uninitialized memory.\n - Secure sites loading insecure content in a frame will<br />

cause Opera to incorrectly display the padlock icon.\n - Feed sources can link to a user's<br />

local disk, and appropriate JavaScript can detect if these files exist or not.\n - The page<br />

address may be changed when a user subscribes to a newsfeed subscription using the feed<br />

subscription button.<br />

Solution: Upgrade to version 9.52 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1214


CVE-2008-4293<br />

SQL Worm Client Detection<br />

<strong>PVS</strong> ID: 4635 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be infected with a SQL worm. The worm is<br />

attempting to spread via other web servers. The observed network traffic from this machine<br />

was: \n %L<br />

Solution: Manually examine and clean the host.<br />

CVE Not available<br />

Kayako SupportSuite Version Detection<br />

<strong>PVS</strong> ID: 4636 FAMILY: CGI RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Kayako SupportSuite version: %L<br />

Solution: N/A<br />

CVE Not available<br />

Kayako SupportSuite < 3.30.01 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4637 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:34029<br />

Description: Synopsis : \n\nThe remote web server contains a PHP application affected by several<br />

vulnerabilities.\n\nThe remote host is running Kayako SupportSuite, a web-based electronic<br />

support portal written in PHP. According to its banner, the version of Kayako installed on<br />

the remote host is earlier than 3.30.01 and is affected by several issues: \n\n - There is a<br />

blind SQL injection issue in the staff panel that enables a staff user to gain administrative<br />

access.\n - A user may be able to inject arbitrary script into a user's browser by opening a<br />

ticket or requesting a chat if they include the script in the 'Full Name' field associated with<br />

their account.\n - There are numerous cross-site scripting issues. The reported version of<br />

SupportSuite is: \n %L<br />

Solution: Upgrade to version 3.30.01 or higher.<br />

CVE-2008-3701<br />

DB2 < 9.5 Fix Pack 2 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4638 FAMILY: Database RISK: HIGH NESSUS ID:34056<br />

Description: Synopsis :\n\nThe remote database server is affected by multiple vulnerabilities.\n\nThe<br />

installation of DB2 9.5 on the remote host does not have Fix Pack 2 applied and is affected<br />

by multiple vulnerabilities :\n\n - An unspecified vulnerability in the way it deploys 'CLR<br />

Family Internet Services 1215


Stored Procedures' for Visual Studio from IBM database add-ins (JR28431). - A buffer<br />

overflow condition in the DAS server code. (IZ22188)<br />

Solution: Apply DB2 Version 9.5 Fix Pack 2.<br />

Sharity Detection<br />

CVE-2008-6821<br />

<strong>PVS</strong> ID: 4639 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Sharity service for Unix. Sharity is a service that allows<br />

Unix computers to access SMB/CIFS servers.<br />

Solution: N/A<br />

Invision Power Board <<br />

CVE Not available<br />

<strong>PVS</strong> ID: 4640 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Invision Board, a CGI suite designed to set up a bulletin board system on the<br />

remote web server. This version of Invision Board is vulnerable to several SQL injection<br />

attacks due to a lack of parsing on the 'act' and 'name' variables of the index.php script.<br />

There is an information disclosure flaw where authentication materials can be retrieved<br />

from 'ipb_stronghold' cookies. There is a vulnerability that allows attackers to hijack<br />

administrative sessions. There is a denial of service vulnerability due to a lack of parsing to<br />

the 'clean_globals()' function. There is a flaw in the 'source/action_admin/languages.php'<br />

where an attacker can inject code that is later executed via an 'eval()' function. Finally,<br />

there is a flaw in the way that the application handles data sent to the 'INFO[base_url]'<br />

parameter of the 'admin.php' script. A remote attacker can invoke arbitrary PHP script code.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

eDirectory < 8.8 SP3 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4641 FAMILY: Generic RISK: HIGH NESSUS ID:34221<br />

Description: Synopsis :\n\nThe remote directory service is affected by multiple vulnerabilities.\n\nThe<br />

remote host is running eDirectory, a directory service software from Novell. The installed<br />

version of Novell eDirectory is affected by multiple issues :\n\n - NDS module is affected<br />

by a heap overflow vulnerability (Bugs 396819 and 396817).\n - Windows installs of<br />

eDirectory are affected by a remote memory corruption vulnerability (Bug 373852).\n -<br />

LDAP module is affected by a buffer overflow vulnerability (Bug 373853).\n - HTTPSTK<br />

is affected by two heap overflow vulnerabilities affecting 'Language' and 'Content Length'<br />

headers in HTTPSTK (Bugs 379882 and 379880).\n - HTTPSTK is also affected by a<br />

cross-site scripting vulnerability (Bug 387429).<br />

Family Internet Services 1216


Solution: Upgrade to version 8.8 SP3 or higher.<br />

CVE Not available<br />

ClamAV < 0.93.1 memcpy() .chm File Handling DoS<br />

<strong>PVS</strong> ID: 4642 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running ClamAV version: %L\n\nThis version of ClamAV is vulnerable to a<br />

flaw within the 'libclamav/chmunpack.c' file. Specifically, when handling malformed '.chm'<br />

files, the application fails to adequately parse the file. An attacker sending a malformed<br />

.chm file to a server running ClamAV would be able to crash the service.<br />

Solution: Upgrade to version 0.93.1 or higher.<br />

MicroTik Router <<br />

CVE-2008-3914<br />

<strong>PVS</strong> ID: 4643 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running a MicroTik router. The reported version is:<br />

%L\n\nThis version of MicroTik router is vulnerable to a flaw within its SNMP module.<br />

An attacker exploiting this vulnerability would send the MicroTik router malformed SNMP<br />

queries. These queries would bypass any local 'read-only' restrictions and be executed by<br />

the router.<br />

Solution: If possible, disable SNMP or only allow queries from trusted hosts. When available,<br />

upgrade to a version higher than 2.9.51 or 3.13.<br />

MicroTik Router <<br />

CVE-2008-6976<br />

<strong>PVS</strong> ID: 4644 FAMILY: Generic<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running a MicroTik router. The reported version is:<br />

%L\n\nThis version of MicroTik router is vulnerable to a flaw within its SNMP module.<br />

An attacker exploiting this vulnerability would send the MicroTik router malformed SNMP<br />

queries. These queries would bypass any local 'read-only' restrictions and be executed by<br />

the router.<br />

Solution: If possible, disable SNMP or only allow queries from trusted hosts. When available,<br />

upgrade to a version higher than 2.9.51 or 3.13.<br />

Family Internet Services 1217


CVE-2008-6976<br />

Google Chrome Version Detection<br />

<strong>PVS</strong> ID: 4645 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Google Chrome web browser version: %L<br />

Solution: N/A<br />

CVE Not available<br />

Simple Machines Forum < 1.1.6 Random Number Generator Credentials Disclosure<br />

<strong>PVS</strong> ID: 4646 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is is vulnerable to a security-bypass flaw.\n\nThe remote<br />

host is running the Simple Machines Forum (SMF), a web forum. This version of SMF is<br />

vulnerable to a flaw where it will leak the state of the random number generator. As<br />

authentication materials are created using the random number generator, an attacker can use<br />

the leaked state to determine authentication codes of other users. Note that this<br />

vulnerability only affects the Windows versions of SMF that use a simple, linear,<br />

feed-forward design for generating random numbers. The reported version of SMF is: \n<br />

%L \n<br />

Solution: Upgrade to version 1.1.6 or higher.<br />

CVE-2008-6971<br />

Novell iPrint Client nipplib.dll IppCreateServerRef Function Buffer Overflow<br />

<strong>PVS</strong> ID: 4647 FAMILY: Web Clients RISK: HIGH NESSUS ID:34085<br />

Description: Synopsis :\n\nThe remote Windows host has an application that is affected by a buffer<br />

overflow vulnerability.\n\nThe installed version of Novell iPrint Client is affected by a<br />

buffer overflow vulnerability. By passing very long arguments to either<br />

'GetPrinterURLList()', 'GetPrinterURLList2()', or 'GetFileList2()' functions available in<br />

ActiveX control 'ienipp.ocx', it may be possible to cause a heap-based buffer overflow in<br />

function 'IppCreateServerRef()' provided by 'nipplib.dll'. Successful exploitation of this<br />

issue may result in arbitrary code execution on the remote system.<br />

Solution: Upgrade to Novell iPrint Client version 5.08 or Novell iPrint Client for Windows 4.38 or<br />

higher.<br />

CVE-2008-2436<br />

WordPress < 2.6.2 Administrative Password Reset<br />

<strong>PVS</strong> ID: 4648 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 1218


Description: Synopsis :\n\nThe remote host can be tricked into modifying administrative<br />

credentials.\n\nThe version of WordPress installed on the remote host is vulnerable to a<br />

flaw that would allow any user to reset the password of any other user account. After<br />

resetting the password, the newly reset password would be sent to the email address linked<br />

to the account.<br />

Solution: Upgrade to version 2.6.2 or higher.<br />

Trac Version Detection<br />

CVE-2008-4107<br />

<strong>PVS</strong> ID: 4649 FAMILY: CGI RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Trac, a web-based software management application that<br />

supports bug-tracking and source code browsing. The version of Trac is: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Microsoft Office OneNote Client Detection<br />

<strong>PVS</strong> ID: 4650 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Microsoft OneNote on Office version '%L'<br />

Solution: N/A<br />

CVE Not available<br />

QuickTime < 7.5.5 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4651 FAMILY: Web Clients RISK: HIGH NESSUS ID:34118<br />

Description: Synopsis :\n\nThe remote host contains an application that is affected by multiple<br />

vulnerabilities.\n\n The version of QuickTime installed on the remote host is older than<br />

7.5.5. Such versions contain several vulnerabilities :\n\n - Heap and stack buffer overflows<br />

in the handling of panorama atoms in QTVR (QuickTime Virtual Reality) movie files could<br />

lead to an application crash or arbitrary code execution (CVE-2008-3624 and<br />

CVE-2008-3625).\n - A memory corruption issue in QuickTime's handling of STSZ atoms<br />

in movie files could lead to an application crash or arbitrary code execution<br />

(CVE-2008-3626).\n - Multiple memory corruption issues in QuickTime's handling of<br />

H.264-encoded movie files could lead to an application crash or arbitrary code execution<br />

(CVE-2008-3627).\n - An out-of-bounds read issue in QuickTime's handling of PICT<br />

images could lead to an application crash (CVE-2008-3629).<br />

Solution: Either use QuickTime's Software Update preference to upgrade to the latest version or<br />

manually upgrade to version 7.5.5 or higher.<br />

Family Internet Services 1219


CVE-2008-3629<br />

MySQL Empty Binary String DoS<br />

<strong>PVS</strong> ID: 4652 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running MySQL database version: %L\n\nThis version of MySQL is<br />

vulnerable to a remote Denial of Service (DoS) attack when it processes empty binary<br />

strings. An attacker exploiting this flaw would need some way of injecting data into a<br />

MySQL query. Successful exploitation would result in the database crashing.<br />

Solution: Upgrade to version 5.0.66, 5.1.26, 6.0.6 or higher.<br />

CVE-2008-3963<br />

iTunes < 8.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4653 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running iTunes, an application for managing and listening to music media files. The<br />

version of iTunes is '%L'.\n\nThis version of iTunes is vulnerable to a several local flaws.<br />

The first involves an integer overflow and would result in the local attacker executing<br />

arbitrary code with the privileges of the iTunes program. The second flaw involves<br />

misleading firewall messages that may lead to a false sense of security.<br />

Solution: Upgrade to version 8.0 or higher.<br />

CVE-2008-3636<br />

Apple iPod Device Detection<br />

<strong>PVS</strong> ID: 4654 FAMILY: Mobile Devices RISK: INFO NESSUS ID:Not Available<br />

Description: The remote device is an Apple iPod. iPod is a multimedia hardware application that allows<br />

users to store files of various formats on the device.<br />

Solution: Ensure that such devices are authorized according to corporate policies and guidelines.<br />

CVE Not available<br />

MyBB < 1.4.1 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4655 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

MyBB installed on the remote host is vulnerable to a number of vulnerabilities. The<br />

application fails to properly parse and sanitize data sent to the 'misc.php', 'usercp2.php',<br />

'inc/functions_online.php', and 'moderation.php' scripts. The details of these flaws are<br />

Family Internet Services 1220


currently unknown; however, the vendor has released a fix. The reported version of MyBB<br />

is: \n %L<br />

Solution: Upgrade to version 1.4.1 or higher.<br />

CVE-2008-3966<br />

Database Connection Configuration Information Disclosure<br />

<strong>PVS</strong> ID: 4656 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web application server may be prone to a policy<br />

violation.\n\n<strong>PVS</strong> has just noted a web transaction that included database connection<br />

information. This includes database name, user ID, password and more. The information<br />

resides at the following location: \n%P\n\nThe information that is hosted on the remote web<br />

server includes the following: \n %L >\n\n<br />

Solution: Ensure that such information is not stored or sent in plaintext. Note: <strong>PVS</strong> only reports on<br />

the first occurence of this item on a web server. Parse your entire web source for similar<br />

occurrences.<br />

CVE Not available<br />

Dns2TCP Service Detection<br />

<strong>PVS</strong> ID: 4657 FAMILY: Backdoors RISK: NONE NESSUS ID:Not Available<br />

Description: The remote service supports the DNS-to-TCP protocol. This protocol hides network traffic<br />

protocols by embedding the traffic within seemingly innocuous DNS queries. This service<br />

can be used to bypass firewalls or proxies by obfuscating the true protocol within the DNS<br />

protocol. The configured 'zone' for the Dns2TCP server is '%P'<br />

Solution: Ensure that such services are allowed according to network policies and guidelines. Limit<br />

incoming traffic to this port if desired.<br />

CVE Not available<br />

Database Connection Configuration Information Disclosure<br />

<strong>PVS</strong> ID: 4658 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web application server may be prone to a policy<br />

violation.\n\n<strong>PVS</strong> has just noted a web transaction that included database connection<br />

information. This includes database name, user ID, password and more. The information<br />

resides at the following location: \n%P\n\nThe information that is hosted on the remote web<br />

server includes the following: \n %L >\n\n<br />

Solution:<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1221


Ensure that such information is not stored or sent in plaintext. Note: <strong>PVS</strong> only reports on<br />

the first occurence of this item on a web server. Parse your entire web source for similar<br />

occurrences.<br />

CVE Not available<br />

Database Connection Configuration Information Disclosure<br />

<strong>PVS</strong> ID: 4659 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web application server may be prone to a policy<br />

violation.\n\n<strong>PVS</strong> has just noted a web transaction that included database connection<br />

information. This includes database name, user ID, password and more. The information<br />

resides at the following location: \n%P\n\nThe information that is hosted on the remote web<br />

server includes the following: \n %L >\n\n<br />

Solution: Ensure that such information is not stored or sent in plaintext. Note: <strong>PVS</strong> only reports on<br />

the first occurence of this item on a web server. Parse your entire web source for similar<br />

occurrences.<br />

CVE Not available<br />

Database Connection Configuration Information Disclosure<br />

<strong>PVS</strong> ID: 4660 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web application server may be prone to a policy<br />

violation.\n\n<strong>PVS</strong> has just noted a web transaction that included database connection<br />

information. This includes database name, user ID, password and more. The information<br />

resides at the following location: \n%P\n\nThe information that is hosted on the remote web<br />

server includes the following: \n %L >\n\n<br />

Solution: Ensure that such information is not stored or sent in plaintext. Note: <strong>PVS</strong> only reports on<br />

the first occurence of this item on a web server. Parse your entire web source for similar<br />

occurrences.<br />

CVE Not available<br />

Java '.class' File Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4661 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server is hosting .class files. As an example, consider the following file<br />

%P\nDistributing such files over the web can be done, but the webmaster should make sure<br />

that they to not contain confidential data. Java '.class' files are easily decompiled into<br />

source code using tools such as Jad (/www.kpdus.com/jad.html).<br />

Solution: Ensure that confidential data is not present within the '.class' file. Note: <strong>PVS</strong> only reports<br />

on the first occurence of this item on a web server. Parse your entire web source for similar<br />

Family Internet Services 1222


'.cnf' File Detection<br />

occurrences.<br />

CVE Not available<br />

<strong>PVS</strong> ID: 4662 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server is hosting .cnf files. As an example, consider the following file<br />

%P\nDistributing such files over the web can be done, but the webmaster should make sure<br />

that they do not contain confidential data. '.cnf' files are typically configuration files that<br />

may contain information regarding application version, physical path and more.<br />

Solution: Ensure that confidential data is not present within the '.cnf' file. Note: <strong>PVS</strong> only reports on<br />

the first occurence of this item on a web server. Parse your entire web source for similar<br />

occurrences.<br />

CVE Not available<br />

Possible Social <strong>Security</strong> Number in Cookie<br />

<strong>PVS</strong> ID: 4663 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web client sent a cookie with what appears to be an embedded Social<br />

<strong>Security</strong> Number. You should manually verify that confidential data is not being<br />

leaked from the network. The observed cookie was: \n %L<br />

Solution: Ensure that confidential data is not passed within plaintext cookies. Note: <strong>PVS</strong> only reports<br />

on the first occurence of this item on a web server. Parse your entire web source for similar<br />

occurrences.<br />

'.log' File Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 4664 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server is hosting .log files. As an example, consider the following file<br />

%P\nDistributing such files over the web can be done, but the webmaster should make sure<br />

that they do not contain confidential data. '.log' files are typically log files that may contain<br />

information regarding local applications and settings.<br />

Solution: Ensure that confidential data is not present within the '.log' file. Note: <strong>PVS</strong> only reports on<br />

the first occurence of this item on a web server. Parse your entire web source for similar<br />

occurrences.<br />

'.conf' File Detection<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4665 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1223


Description: The remote web server is hosting .conf files. As an example, consider the following file<br />

%P\nDistributing such files over the web can be done, but the webmaster should make sure<br />

that they do not contain confidential data. '.conf' files are typically configuration files that<br />

may contain information regarding local applications and settings.<br />

Solution: Ensure that confidential data is not present within the '.conf' file. Note: <strong>PVS</strong> only reports on<br />

the first occurence of this item on a web server. Parse your entire web source for similar<br />

occurrences.<br />

CVE Not available<br />

Internal IP Address Disclosure<br />

<strong>PVS</strong> ID: 4666 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: The remote web server has not properly configured its 'Host' settings. The server discloses<br />

its internal IP addresses within HTTP headers. Such information can give an attacker useful<br />

information regarding the IP address scheme of the internal network. This may aid the<br />

attacker in future attacks. The leaked information was: \n %L \n\nThe request that triggered<br />

this response was: \n%P<br />

Solution: Ensure that the server has a properly configured hostname. Note: <strong>PVS</strong> only reports on the<br />

first occurence of this item on a web server. Parse your entire web source for similar<br />

occurrences.<br />

CVE Not available<br />

Persistent Cookie Utilization<br />

<strong>PVS</strong> ID: 4667 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server utilizes persistent cookies. Persistent cookies are stored on the hard<br />

drive by the user browser. If there is confidential data within the cookies (such as user ID,<br />

authentication tokens, etc.), an attacker with access to the hard drive can view this data. The<br />

application that generated this cookie was: \n%P\n\nThe cookie that was passed was: \n %L<br />

Solution: Ensure that persistent cookies are not used for any sort of confidential data. Note: <strong>PVS</strong> only<br />

reports on the first occurence of this item on a web server. Parse your entire web source for<br />

similar occurrences.<br />

CVE Not available<br />

ActiveX Control Detection<br />

<strong>PVS</strong> ID: 4668 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server is hosting content that includes an embedded call to ActiveX. The<br />

CLSID of the ActiveX control is: \n %L \n\nThe control is referenced at the following<br />

location: \n%P<br />

realtimeonly<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1224


Solution: N/A<br />

CVE Not available<br />

ActiveX Control Detection<br />

<strong>PVS</strong> ID: 4669 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server is hosting content that includes an embedded call to ActiveX. The<br />

CLSID of the ActiveX control is: \n %L >\n\nThe control is referenced at the following<br />

location: \n%P<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Trojan/Backdoor - Potential Malicious Microsoft Executable Being Served<br />

<strong>PVS</strong> ID: 4670 FAMILY: Generic RISK: HIGH NESSUS ID:33950<br />

Description: Synopsis :\n\nThe remote host may be compromised.\n\nThis service appears to send a<br />

Microsoft Windows executable when a connection to it is established. This may be<br />

evidence of a type of malware that is known to propagate in this manner.<br />

realtime<br />

Solution: Check the host and disinfect or reinstall if necessary.<br />

CVE Not available<br />

Possible Social <strong>Security</strong> Number in Cookie<br />

<strong>PVS</strong> ID: 4671 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server sent a cookie with what appears to be an embedded Social<br />

<strong>Security</strong> Number. You should manually verify that confidential data is not being<br />

leaked from the network. The observed cookie was set to: \n %L \n\nThe request that<br />

generated the cookie was: \n%P<br />

Solution: Ensure that confidential data is not passed within plaintext cookies. Note: <strong>PVS</strong> only reports<br />

on the first occurence of this item on a web server. Parse your entire web source for similar<br />

occurrences.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Possible User ID and Password Sent Within a Web Form (POST)<br />

<strong>PVS</strong> ID: 4672 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1225


Description: The remote web client posted a form with what appears to be an embedded user ID<br />

and password. You should manually verify that confidential data is not being leaked<br />

from the network. The observed POST request was: \n %L<br />

Solution: Ensure that confidential data is not passed via plaintext form fields. Note: <strong>PVS</strong> only reports<br />

on the first occurence of this item on a web server. Parse your entire web source for similar<br />

occurrences.<br />

CVE Not available<br />

Possible User ID and Password Sent Within a Web Form (GET)<br />

<strong>PVS</strong> ID: 4673 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web client posted a form with what appears to be an embedded user ID<br />

and password. You should manually verify that confidential data is not being leaked<br />

from the network. The observed POST request was: \n %L<br />

Solution: Ensure that confidential data is not passed via plaintext form fields. Use SSL for any type<br />

of authentication. Also, you should consider forcing the use of POST versus GET on web<br />

forms. Note: <strong>PVS</strong> only reports on the first occurence of this item on a web server. Parse<br />

your entire web source for similar occurrences.<br />

CVE Not available<br />

Flash '.swf' File Detection<br />

<strong>PVS</strong> ID: 4674 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server is hosting .swf files. As an example, consider the following file<br />

%P\nDistributing such files over the web can be done, but the webmaster should make sure<br />

that they do not contain confidential data. Flash '.swf' files are easily decompiled into<br />

source code using tools such as Flare (www.nowrap.de/flare.html).<br />

Solution: Ensure that confidential data is not present within the '.swf' file. Note: <strong>PVS</strong> only reports on<br />

the first occurence of this item on a web server. Parse your entire web source for similar<br />

occurrences.<br />

CVE Not available<br />

SOAP '.wsdl' File Detection<br />

<strong>PVS</strong> ID: 4675 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server is running a SOAP service that is enumerated via a '.wsdl'<br />

configuration file. As an example, consider the following file %P\nDistributing such files<br />

over the web can be done, but the webmaster should make sure that they do not contain<br />

confidential data.<br />

Solution:<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1226


Ensure that confidential data is not present within the '.wsdl' file. Note: <strong>PVS</strong> only reports on<br />

the first occurence of this item on a web server. Parse your entire web source for similar<br />

occurrences.<br />

CVE Not available<br />

SOAP '.disco' File Detection<br />

<strong>PVS</strong> ID: 4676 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server is running a SOAP service that is enumerated via a '.disco'<br />

configuration file. As an example, consider the following file %P\nDistributing<br />

such files over the web can be done, but the webmaster should make sure that they<br />

do not contain confidential data.<br />

Solution: Ensure that confidential data is not present within the '.disco' file. Note: <strong>PVS</strong> only reports<br />

on the first occurence of this item on a web server. Parse your entire web source for similar<br />

occurrences.<br />

CVE Not available<br />

User Credentials Stored in Cookie<br />

<strong>PVS</strong> ID: 4677 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server was just observed passing a 'Set-Cookie' directive with what<br />

appears to be user ID or password information. Examine the following cookie to ensure that<br />

confidential data is not being passed via a plain text cookie: %L\n\nThe requested URI that<br />

prompted this cookie was:\n%P<br />

Solution: Ensure that confidential data is not present within the cookie.<br />

CVE Not available<br />

Virus / Backdoor Client Detection<br />

<strong>PVS</strong> ID: 4678 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be infected with a backdoor. This strain of<br />

backdoor malware is known to change the browser 'User-Agent' string in order to identify<br />

itself to server machines. The observed network traffic from this machine was: \n %L<br />

Solution: Manually examine and clean the host.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Ruby on Rails < 2.1.1 Active Record Multiple Parameter SQL Injection<br />

<strong>PVS</strong> ID: 4679 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1227


Description: Synopsis :\n\nThe remote host is vulnerable to a SQL injection attack.\n\nThe remote<br />

server is running the Ruby on Rails web application. The reported version is '%L'\nThis<br />

version of Rails is reported to be vulnerable to a flaw in the way that it handles ':offset' and<br />

':limit' parameters. An attacker exploiting these flaws would only require the ability to send<br />

malformed requests to the application. Successful exploitation would result in the attacker<br />

executing arbitrary SQL commands on the database used by Ruby on Rails.<br />

Solution: Upgrade to version 2.1.1 or higher.<br />

CVE-2008-4094<br />

DB2 < 8 FixPak 17 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4680 FAMILY: Database RISK: HIGH NESSUS ID:34195<br />

Description: Synopsis :\n\nThe remote database server is affected by multiple issues.\n\nAccording to its<br />

version, the installation of DB2 on the remote host is affected by multiple issues :\n\n - By<br />

sending a malicious DB2 UDB v7 client CONNECT/DETACH requests it may be possible<br />

to crash the remote DB2 server (IZ08134).\n\n - An unspecified vulnerability related to<br />

'DB2FMP' exists in DB2 (IZ20350).\n\n - By sending malicious packets to 'DB2JDS', it<br />

may be possible to crash the remote DB2 server (JR29274).\n\n - While running on<br />

Windows 'DB2FMP' runs with OS privileges (JR30228).\n\n - DAS server code is affected<br />

by a buffer overflow vulnerability (IZ22004).\n\n - Using INSTALL_JAR it may be<br />

possible to create and overwrite critical files on the system (IZ22142).<br />

Solution: Apply DB2 UDB Version 8 FixPak 17 or higher.<br />

CVE-2008-3960<br />

Google Chrome < 0.2.149.29 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4681 FAMILY: Web Clients RISK: HIGH NESSUS ID:34197<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is affected by multiple<br />

vulnerabilities.\n\nThe version of Google Chrome installed on the remote host is earlier<br />

than 0.2.149.29. Such versions are reportedly are affected by several issues : \n\n - A buffer<br />

overflow involving long filenames that display in the 'Save As...' dialog could lead to<br />

arbitrary code execution (Issue number 1414).\n - A buffer overflow in handling of link<br />

targets displayed in the status area when a user hovers over a link could lead to arbitrary<br />

code execution (Fix number 1797).\n - An out-of-bounds memory read when parsing URLs<br />

ending in ': %' could cause the application itself to crash (Issue number 122).\n - The<br />

default Downloads directory is set to Desktop, which could lead to malicious cluttering of<br />

the desktop with unwanted downloads and even execution of arbitrary programs (Fix<br />

number 17933).\nThe exact browser version is: \n %L<br />

Solution: Upgrade to version 0.2.149.29 or higher.<br />

CVE-2008-6998<br />

Mac OS X < 10.5.5 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1228


<strong>PVS</strong> ID: 4682 FAMILY: Generic RISK: HIGH NESSUS ID:34211<br />

Description: Synopsis :\n\nThe remote host is missing a Mac OS X update that fixes various security<br />

issues.\n\nThe remote host is running a version of Mac OS X 10.5 that is older than version<br />

10.5.5. Mac OS X 10.5.5 contains security fixes for a number of programs.\nIAVA<br />

Reference : 2008-A-0045\nIAVB Reference : 2008-B-0078\nSTIG Finding Severity :<br />

Category I<br />

Solution: Upgrade to version 10.5.5 or higher.<br />

CVE-2008-3622<br />

Hitachi IP Phone Detection<br />

<strong>PVS</strong> ID: 4683 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is a Hitachi WIP5000 IP Phone terminal.<br />

Solution: N/A<br />

CVE Not available<br />

Trend Micro OfficeScan 'cgiRecvFile.exe' Buffer Overflow<br />

<strong>PVS</strong> ID: 4684 FAMILY: Generic RISK: HIGH NESSUS ID:34216<br />

Description: Synopsis :\n\nThe remote host contains an application that is affected by a buffer overflow<br />

vulnerability.\n\nTrend Micro OfficeScan or Client Server Messaging <strong>Security</strong> is installed<br />

on the remote host. The installed version is affected by a buffer overflow vulnerability. By<br />

setting the parameter 'ComputerName' to a very long string in a specially crafted HTTP<br />

request, a malicious user within the local network may be able to trigger a stack-based<br />

overflow in 'cgiRecvFile.exe'. Exploitation of this issue requires manipulation of the<br />

parameters 'TempFileName', 'NewFileSize', and 'Verify' and, if successful, would result in<br />

arbitrary code execution on the remote system.<br />

Solution: Upgrade to : \n\n - Trend Micro OfficeScan 8.0 Build 1361/2424 or 3060 depending on the<br />

current OfficeScan patch level.\n - Trend Micro Client Server Messaging <strong>Security</strong> 3.6<br />

Build 1195.\n - Trend Micro OfficeScan 7.3 Build 3167.<br />

CVE-2008-2437<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

IBM WebSphere Application Server 6.1 < Fix Pack 19 Unspecified Vulnerability<br />

<strong>PVS</strong> ID: 4685 FAMILY: Web Servers RISK: HIGH NESSUS ID:34219<br />

Description: Synopsis :\n\nThe remote application server is affected by an unspecified vulnerability.\n\n<br />

IBM WebSphere Application Server 6.1 before Fix Pack 19 appears to be running on the<br />

remote host. Such versions reportedly have an as-yet unspecified security exposure when<br />

the 'FileServing' feature in the Servlet Engine / Web Container component is enabled.<br />

(PK64302).<br />

Family Internet Services 1229


Solution: Apply Fix Pack 19 (6.1.0.19) or higher.<br />

CVE-2008-4111<br />

Invision Power Board < 2.3.6 index.php name Parameter SQL Injection<br />

<strong>PVS</strong> ID: 4686 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a SQL injection attack.\n\nThe remote host<br />

is running Invision Board, a CGI suite designed to set up a bulletin board system on the<br />

remote web server. This version of Invision Board is vulnerable to a SQL injection attack<br />

due to a lack of parsing on the 'name' parameter of the index.php script. An attacker<br />

exploiting this flaw would be able to execute arbitrary commands against the remote<br />

database server. The reported version of Invision was: \n %L<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2008-4171<br />

ProFTPD Command Truncation Cross-Site Request Forgery<br />

<strong>PVS</strong> ID: 4687 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:34265<br />

Description: Synopsis :\n\nThe remote FTP server is prone to a cross-site request forgery attack.\n\nThe<br />

remote host is using ProFTPD, a free FTP server for Unix and Linux. The version of<br />

ProFTPD running on the remote host splits an overly long FTP command into a series of<br />

shorter ones and executes each in turn. If an attacker can trick a ProFTPD administrator<br />

into accessing a specially-formatted HTML link, he may be able to cause arbitrary FTP<br />

commands to be executed in the context of the affected application with the administrator's<br />

privileges.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-5815<br />

MyBB < 1.4.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4688 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

MyBB installed on the remote host is vulnerable to a number of vulnerabilities. The<br />

application fails to properly parse and sanitize data sent to the following scripts: global.php,<br />

announcements.php, admin/inc/class_page.php, inc/functions.php,<br />

inc/datahandlers/post.php, inc/class_error.php, polls.php, moderation.php,<br />

inc/class_moderation.php, usercp.php, and attachments.php. The details of these flaws is<br />

currently unknown; however, the vendor has released a fix. The reported version of MyBB<br />

is: \n %L<br />

Solution: Upgrade to version 1.4.2 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1230


CVE Not available<br />

JBoss EAP < 4.2.0.CP04 / 4.3.0.CP02 Status Servlet Information Disclosure<br />

<strong>PVS</strong> ID: 4689 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe version of JBoss Enterprise Application Platform (EAP)<br />

running on the remote host allows attackers to download '.class' files. These files can be<br />

easily decompiled using a tool such as 'jad'. The attacker would then have access to the<br />

source code which could lead to more sophisticated attacks. The reported version of JBOSS<br />

is: \n %L<br />

Solution: Upgrade to version 4.2.0.CP04, 4.3.0.CP02 or higher.<br />

CVE-2008-3519<br />

PHP iCalendar < 2.25 Administrative Bypass<br />

<strong>PVS</strong> ID: 4690 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a flaw that allows for the<br />

bypassing of authentication.\n\nThe remote host is running PHP iCalendar, an<br />

open-source PHP blog. This version of iCalendar is vulnerable to a flaw where<br />

a remote user can, by manually changing their cookie, gain administrative<br />

access to the application. The reported version of PHP iCalendar is: \n %L \n<br />

Solution: When available, upgrade to version 2.25 or higher.<br />

CVE-2006-1292<br />

Firefox < 3.0.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4691 FAMILY: Web Clients RISK: HIGH NESSUS ID:34267<br />

Description: Synopsis : \n\nThe remote Windows host contains a web browser that is affected by<br />

multiple vulnerabilities.\n\nThe installed version of Firefox is affected by various security<br />

issues : \n\n- An attacker can cause the content window to move while the mouse is being<br />

clicked, causing an item to be dragged rather than clicked-on (MFSA 2008-40).\n -<br />

Privilege escalation is possible via 'XPCnativeWrapper' pollution (MFSA 2008-41).\n -<br />

There are several stability bugs in the browser engine that may lead to crashes with<br />

evidence of memory corruption (MFSA 2008-42).\n - Certain BOM characters and low<br />

surrogate characters, if HTML-escaped, are stripped from JavaScript code before it is<br />

executed, which could allow for cross-site scripting attacks (MFSA 2008-43).\n - The<br />

'resource: ' protocol allows directory traversal on Linux when using URL-encoded slashes,<br />

and it can by used to bypass restrictions on local HTML files (MFSA 2008-44).\nThe<br />

reported browser version was: \n %L<br />

Solution: Upgrade to version 3.0.2 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1231


CVE-2008-4068<br />

Firefox < 2.0.0.17 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4692 FAMILY: Web Clients RISK: HIGH NESSUS ID:34268<br />

Description: Synopsis : \n\nThe remote Windows host contains a web browser that is affected by<br />

multiple vulnerabilities.\n\nThe installed version of Firefox is affected by various security<br />

issues : \n\n - Using a specially crafted UTF-8 URL in a hyperlink, an attacker might be<br />

able to exploit a stack buffer overflow in the Mozilla URL parsing routes to execute<br />

arbitrary code (MFSA 2008-37).\n - It is possible to bypass the same-origin check in<br />

'nsXMLDocument: : OnChannelRedirect()' (MFSA 2008-38).\n - There are a series of<br />

vulnerabilities in 'feedWriter' that allow scripts from page content to run with chrome<br />

privileges (MFSA 2008-39).\n - An attacker can cause the content window to move while<br />

the mouse is being clicked, causing an item to be dragged rather than clicked-on (MFSA<br />

2008-40).\n - Privilege escalation is possible via 'XPCnativeWrapper' pollution (MFSA<br />

2008-41).\n - There are several stability bugs in the browser engine that may lead to crashes<br />

with evidence of memory corruption (MFSA 2008-42).\n - Certain BOM characters and<br />

low surrogate characters, if HTML-escaped, are stripped from JavaScript code before it is<br />

executed, which could allow for cross-site scripting attacks (MFSA 2008-43).\n - The<br />

'resource: ' protocol allows directory traversal on Linux when using URL-encoded slashes,<br />

and it can be used to bypass restrictions on local HTML files (MFSA 2008-44).\n - A bug<br />

in the XBM decoder allows random small chunks of uninitialized memory to be read<br />

(MFSA 2008-45).\nThe reported browser version was: \n %L<br />

Solution: Upgrade to version 2.0.0.17 or higher.<br />

CVE-2008-4069<br />

SeaMonkey < 1.1.12 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4693 FAMILY: Web Clients RISK: HIGH NESSUS ID:34269<br />

Description: Synopsis : \n\nA web browser on the remote host is affected by multiple vulnerabilities.\n\n<br />

The installed version of SeaMonkey is affected by various security issues : \n\n - Using a<br />

specially crafted UTF-8 URL in a hyperlink, an attacker might be able to exploit a stack<br />

buffer overflow in the Mozilla URL parsing routes to execute arbitrary code (MFSA<br />

2008-37).\n - It is possible to bypass the same-origin check in 'nsXMLDocument: :<br />

OnChannelRedirect()' (MFSA 2008-38).\n - An attacker can cause the content window to<br />

move while the mouse is being clicked, causing an item to be dragged rather than<br />

clicked-on (MFSA 2008-40).\n - Privilege escalation is possible via 'XPCnativeWrapper'<br />

pollution (MFSA 2008-41).\n - There are several stability bugs in the browser engine that<br />

may lead to crashes with evidence of memory corruption (MFSA 2008-42).\n - Certain<br />

BOM characters and low surrogate characters, if HTML-escaped, are stripped from<br />

JavaScript code before it is executed, which could allow for cross-site scripting attacks<br />

(MFSA 2008-43).\n - The 'resource: ' protocol allows directory traversal on Linux when<br />

using URL-encoded slashes, and it can by used to bypass restrictions on local HTML files<br />

(MFSA 2008-44).\n - A bug in the XBM decoder allows random small chunks of<br />

uninitialized memory to be read (MFSA 2008-45).\nThe reported browser version was: \n<br />

%L<br />

Family Internet Services 1232


Solution: Upgrade to version 1.1.12 or higher.<br />

CVE-2008-3836<br />

Mantis < 1.1.4 HTTPS Session Cookie Secure Flag Weakness<br />

<strong>PVS</strong> ID: 4694 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote server is running Mantis, a bug-tracking software. The reported version is '%L'.<br />

This version of Mantis is vulnerable to a flaw where cookies passed over SSL are not<br />

marked as 'Secure'. Given this, the cookie can be requested over HTTP and sent via<br />

plaintext.<br />

Solution: Upgrade to version 1.1.4 or higher.<br />

Postfix Detection<br />

CVE-2008-3102<br />

<strong>PVS</strong> ID: 4695 FAMILY: SMTP Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote mail server is running Postfix, an open source SMTP server. The observed<br />

banner was: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Thunderbird < 2.0.0.17 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4696 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:34294<br />

Description: Synopsis :\n\nThe remote Windows host contains a mail client that is affected by multiple<br />

vulnerabilities.\n\nThe installed version of Thunderbird is affected by various security<br />

issues :\n\n - Using a specially crafted UTF-8 URL in a hyperlink, an attacker might be able<br />

to exploit a stack buffer overflow in the Mozilla URL parsing routes to execute arbitrary<br />

code (MFSA 2008-37).\n - It is possible to bypass the same-origin check in<br />

'nsXMLDocument::OnChannelRedirect()' (MFSA 2008-38).\n - Privilege escalation is<br />

possible via 'XPCnativeWrapper' pollution (MFSA 2008-41).\n - There are several stability<br />

bugs in the browser engine that may lead to crashes with evidence of memory corruption<br />

(MFSA 2008-42).\n - Certain BOM characters and low surrogate characters, if<br />

HTML-escaped, are stripped from JavaScript code before it is executed, which could allow<br />

for cross-site scripting attacks (MFSA 2008-43).\n - The 'resource:' protocol allows<br />

directory traversal on Linux when using URL-encoded slashes, and it can by used to bypass<br />

restrictions on local HTML files (MFSA 2008-44).\n - There is a heap buffer overflow that<br />

can be triggered when canceling a newsgroup message (MFSA 2008-46).<br />

Solution: Upgrade to version 2.0.0.17 or higher.<br />

Family Internet Services 1233


CVE-2008-4070<br />

MailMarshal < 6.4 Spam Quarantine Management XSS<br />

<strong>PVS</strong> ID: 4697 FAMILY: SMTP Servers RISK: LOW NESSUS ID:34336<br />

Description: Synopsis :\n\nThe remote host has an application that is affected by a cross-site scripting<br />

vulnerability.\n\nThe remote host is running MailMarshal SMTP, a mail server for<br />

Windows version '%L'. The Spam Quarantine Management web component included with<br />

the version of MailMarshal SMTP installed on the remote host is affected by a persistent<br />

cross-site scripting vulnerability in its 'delegated spam management' feature. By exploiting<br />

this issue, it may be possible for an internal user to install a malicious program on another<br />

internal user's (victim) computer, steal session cookies or launch similar attacks. Successful<br />

exploitation would require a victim to accept an email invitation for delegated spam<br />

management from an attacker.<br />

Solution: Upgrade to version 6.4 or higher.<br />

CVE-2008-2831<br />

lighttpd < 1.4.20 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4698 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:34332<br />

Description: Synopsis :\n\nThe remote web server may be affected by several<br />

issues.\n\nAccording to its banner, the version of lighttpd installed on the<br />

remote host is older than 1.4.20. Such versions may be affected by<br />

several issues, including :\n\n - SSL connections could be shut down by a<br />

remote attacker.\n - URL rewrite and redirect patterns can be<br />

circumvented by encoding.\n - mod_userdir does not sanitize URLs,<br />

which could lead to an information disclosure on case insensitive file<br />

systems e.g. http://example.com/~user/file.PHP would get the source<br />

code of file.php, instead of running the script.\n - The server leaks<br />

memory when it processes duplicate headers. This could lead to a denial<br />

of service by resource exhaustion.<br />

Solution: Upgrade to version 1.4.20 or higher.<br />

CVE-2008-4298<br />

Serv-U < 7.3.0.1 Multiple Remote Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4699 FAMILY: FTP Servers RISK: HIGH NESSUS ID:34398<br />

Description: Synopsis :\n\nThe remote FTP server is affected by several vulnerabilities.\n\nThe remote<br />

host is running Serv-U File Server, an FTP server for Windows. The reported version<br />

number is: '%L'\n\nThe installed version of Serv-U is earlier than 7.3.0.1 and thus is<br />

reportedly affected by the following issues :\n - An authenticated remote attacker can cause<br />

the service to consume all CPU time on the remote host by specifying a Windows port (eg,<br />

Family Internet Services 1234


'CON:') when using the STOU command provided he has write access to a directory.\n - An<br />

authenticated remote attacker can overwrite or create arbitrary files via a directory traversal<br />

attack in theRNTO command.\n - An authenticated remote attacker may be able to upload a<br />

file to the current Windows directory with rename by placing the destination in '\' (ie, 'My<br />

Computer').<br />

Solution: Upgrade to version 7.3.0.1 or higher.<br />

CVE-2008-4501<br />

Blue Coat Reporter Detection<br />

<strong>PVS</strong> ID: 4700 FAMILY: Web Servers RISK: INFO NESSUS ID:34334<br />

Description: Synopsis : \n\nThe remote web server is used to monitor web traffic.\n\nThe remote host is<br />

running Blue Coat Reporter, a web reporting system for monitoring centralized logs from<br />

Blue Coat appliances. This web service is used to access the application. The reported<br />

version is: \n %L<br />

Solution: Filter incoming traffic to this port if desired.<br />

CVE Not available<br />

Blue Coat Reporter Default admin Credentials<br />

<strong>PVS</strong> ID: 4701 FAMILY: Web Servers RISK: HIGH NESSUS ID:34346<br />

Description: Synopsis :\n\nThe administrative password for the remote web service can be<br />

guessed.\n\nThe remote Blue Coat Reporter is using the default credentials of 'admin' for<br />

both the username and password.<br />

Solution: Change the admin password.<br />

CVE Not available<br />

OpenNMS Server Detection<br />

<strong>PVS</strong> ID: 4702 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server is used to monitor network devices.\n\nThe remote<br />

host is running OpenNMS, an open source network management application. This web<br />

interface is used to manage the server.<br />

Solution: Filter incoming traffic to this port if desired.<br />

CVE Not available<br />

Simple Machines Forum < 1.1.7 Incomplete BBcode Block <strong>Security</strong> Bypass<br />

<strong>PVS</strong> ID: 4703 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 1235


Description: Synopsis : \n\nThe remote host is vulnerable to a security bypass flaw.\n\nThe remote host<br />

is running Simple Machines Forum (SMF), a web forum. This version of SMF is<br />

vulnerable to a flaw where attackers can bypass security filtering by surrounding the<br />

content with an incomplete BBcode block. Successful exploitation would result in the<br />

attacker posting banned content within the web content. The reported version of SMF is: \n<br />

%L \n<br />

Solution: Upgrade to version 1.1.7 or higher.<br />

CVE Not available<br />

eDirectory < 8.7.3 SP10 FTF1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4704 FAMILY: Generic RISK: HIGH NESSUS ID:34349<br />

Description: Synopsis :\n\nThe remote directory service is affected by multiple vulnerabilities.\n\n The<br />

remote host is running eDirectory, a directory service software from Novell. The installed<br />

version of Novell eDirectory is affected by multiple heap overflows and denial of service<br />

vulnerabilities :\n\n - DS module is affected by two heap overflow vulnerabilities (Bugs<br />

407275, 407256).\n - EMBOX module is affected by two denial of service vulnerabilities<br />

(Bugs 407243, 407245).<br />

Solution: Upgrade to eDirectory 8.7.3 SP10 FTF1 or higher.<br />

CVE-2008-5038<br />

Trend Micro OfficeScan < 7.3 Build 3172 Client Traversal Arbitrary File Access<br />

<strong>PVS</strong> ID: 4705 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:34362<br />

Description: Synopsis : \n\nThe remote web server is affected by a directory traversal issue.\n\n The<br />

version of Trend Micro OfficeScan client running on the remote host is affected by a<br />

directory traversal issue, which can be leveraged by an unauthenticated remote attacker to<br />

read arbitrary files on the remote host. Note that successful exploitation requires that<br />

'Tmlisten.exe' be configured to receive updates from other clients. The reported version of<br />

OfficeScan is: \n %L<br />

Solution: Upgrade to version 7.3 Build 3172 or higher.<br />

CVE-2008-2439<br />

Opera < 9.60 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4706 FAMILY: Web Clients RISK: HIGH NESSUS ID:34368<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by several<br />

issues.\n\nThe version of Opera installed on the remote host is earlier than 9.60 and is<br />

reportedly affected by several issues :\n - Specially crafted URLs can cause Opera to crash<br />

or allow arbitrary code execution.\n - Once a Java applet has been cached, a page that can<br />

predict the cache path for that applet can load it from cache thereby causing it to run in the<br />

Family Internet Services 1236


security context of the local machine, allowing for reading of other files from the cache.<br />

Solution: Upgrade to version 9.60 or higher.<br />

CVE-2008-4695<br />

CUPS < 1.3.9 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4707 FAMILY: Web Servers RISK: HIGH NESSUS ID:34385<br />

Description: Synopsis :\n\nThe remote printer service is affected by multiple<br />

vulnerabilities.\n\nAccording to its banner, the version of CUPS installed on the remote<br />

host is earlier than 1.3.9. Such versions are affected by several issues :\n\n - The HP-GL/2<br />

filter does not adequately check the ranges on the pen width and pen color opcodes, which<br />

allows an attacker to overwrite memory addresses with arbitrary data and which may result<br />

in execution of arbitrary code (STR #2911).\n - There is a heap-based buffer overflow in<br />

the SGI file format parsing module that can be triggered with malformed Run Length<br />

Encoded (RLE) data to execute arbitrary code (STR #2918).\n - There is an integer<br />

overflow vulnerability in the 'WriteProlog()' function in the 'texttops' application that can<br />

be triggered when calculating the page size used for storing PostScript data to execute<br />

arbitrary code (STR #2919).<br />

Solution: Upgrade to version 1.3.9 or higher.<br />

CVE-2008-3641<br />

VLC Media Player < 0.9.3 XSPF Playlist Memory Corruption<br />

<strong>PVS</strong> ID: 4708 FAMILY: Web Clients RISK: HIGH NESSUS ID:34400<br />

Description: Synopsis : \n\nThe remote Windows host contains an application that is affected by a<br />

memory corruption vulnerability.\n\nThe version of VLC Media Player installed on the<br />

remote host is earlier than 0.9.3. Such versions do not properly bounds-check an identifier<br />

tag in XSPF files in the 'demux/playlist/xspf.c' library before using it to index into an array<br />

on the heap. By tricking a user into opening a malicious XSPF file, it may be possible to<br />

execute arbitrary code within the context of the affected application.\nThe reported version<br />

of VLC is: \n %L<br />

Solution: Upgrade to version 0.9.4 or higher (there are no official binaries for Windows of version<br />

0.9.3).<br />

CVE-2008-4558<br />

Copyright Information Within HTML Comments<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4709 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server was observed responding to a web request with HTML code that<br />

consisted of copyright information within the HTML comments. The copyright information<br />

observed was: \n %L \n\nThe request which generated this response was: \n%P<br />

Family Internet Services 1237


Solution: Ensure that there is code coverage within the corporate SDL.<br />

CVE Not available<br />

Email Address Obfuscated Within HTML Comments<br />

<strong>PVS</strong> ID: 4710 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server was observed responding to a web request with HTML code that<br />

consisted of an email address obfuscated within the HTML comments. The email address<br />

observed was: \n %L \n\nThe request which generated this response was: \n%P<br />

Solution: Whenever possible, remove information that attackers may find useful for future attacks.<br />

'.dll' File Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 4711 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server is hosting and allowing the download of '.dll' files. As an<br />

example, consider the following file %P\nThe webmaster should make sure that they<br />

do not contain confidential data.<br />

Solution: N/A<br />

CVE Not available<br />

Apache < 2.2.10 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4712 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:34433<br />

Description: Synopsis :\n\nThe remote web server is vulnerable to multiple attack vectors.\n\nThe<br />

observed version of Apache HTTP Server is %L.\n\nVersions of Apache HTTP Server<br />

earlier than 2.2.10 are potentially affected by multiple vulnerabilities :\n\n - An information<br />

disclosure vulnerability in mod_proxy_http. Note that this only affects Apache on Unix<br />

systems. (CVE-2010-2791)\n\n - The mod_proxy_ftp module in the version of Apache<br />

installed on the remote host fails to properly sanitize user-supplied URL input before using<br />

it to generate dynamic HTML output. Using specially crafted requests for FTP URLs with<br />

globbing characters (such as asterisk, tilde, opening square bracket, etc.), an attacker may<br />

be able to leverage this issue to inject arbitrary HTML and script code into a user's browser<br />

to be executed within the security context of the affected site. (CVE-2008-2939)<br />

Solution: Either disable the affected module or upgrade to version 2.2.10 or higher.<br />

CVE-2010-2791<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Titan FTP Server < 6.26 Build 631 SITE WHO Command DoS<br />

Family Internet Services 1238


<strong>PVS</strong> ID: 4713 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:34434<br />

Description: Synopsis : \n\nThe remote FTP server is prone to a denial of service attack.\n\nThe version<br />

of Titan FTP Server installed on the remote host goes into an unstable state when it<br />

receives a 'SITE WHO' command. An unauthenticated remote attacker can leverage this<br />

issue to deny service to legitimate users. The reported version of Titan is: \n %L<br />

Solution: Upgrade to version 6.26 build 631 or higher.<br />

CVE-2008-6082<br />

<strong>Security</strong> Center < 3.4 Multiple Unspecified Traversals<br />

<strong>PVS</strong> ID: 4714 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:34443<br />

Description: Synopsis : \n\nThe remote web server contains a PHP application that is prone to directory<br />

traversal attacks.\n\nThe version of <strong>Tenable</strong> <strong>Security</strong> Center installed on the remote host<br />

appears to be earlier than 3.4.2.1. Such versions contain two vulnerabilities that allow a<br />

user who was logged into the <strong>Security</strong> Center to obtain system files. The reported version<br />

of <strong>Security</strong> Center is: \n %L<br />

Solution: Upgrade to version 3.4.2.1 or higher.<br />

CVE Not available<br />

Opera < 9.61 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4715 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:34459<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is affected by several<br />

issues.\n\nThe version of Opera installed on the remote host is earlier than 9.61 and is<br />

reportedly affected by several issues : \n\n - It may be possible to reveal a user's browsing<br />

history by exploiting certain constructs in Opera's History Search results (903).\n - Opera's<br />

Fast Forward feature is affected by a cross-site scripting vulnerability (904). \n - While<br />

previewing certain news feeds, it may be possible for certain scripts to subscribe a user to<br />

arbitrary feeds, and also view contents of user subscribed feeds (905). The reported version<br />

of Opera is: \n %L<br />

Solution: Upgrade to version 9.61 or higher.<br />

DHCP Client Detection<br />

CVE-2008-4725<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4716 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 1239


Description: A DHCP client is running on this host.<br />

Solution: N/A<br />

CVE Not available<br />

Mac Software Update DNS Query Detection<br />

<strong>PVS</strong> ID: 4717 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote system was just observed making a DNS query for an apple.com update<br />

service. It is highly probable that this machine is running a Mac operating system.<br />

Solution: N/A<br />

CVE Not available<br />

Mac Software Update DNS Query Detection<br />

<strong>PVS</strong> ID: 4718 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote system was just observed making a DNS query for an apple.com update<br />

service. It is highly probable that this machine is running a Mac operating system.<br />

Solution: N/A<br />

CVE Not available<br />

Mac Software Update DNS Query Detection<br />

<strong>PVS</strong> ID: 4719 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote system was just observed making a DNS query for an apple.com update<br />

service. It is highly probable that this machine is running a Mac operating system.<br />

Solution: N/A<br />

CVE Not available<br />

Microsoft Software Update DNS Query Detection<br />

<strong>PVS</strong> ID: 4720 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Microsoft computer. <strong>PVS</strong> just observed the host making a DNS<br />

query for a Microsoft update server.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1240


DB2 9.1 < Fix Pack 6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4721 FAMILY: Database RISK: HIGH NESSUS ID:34475<br />

Description: Synopsis : \n\nThe remote database server is affected by multiple issues.\n\nAccording to<br />

its version, the installation of DB2 9.1 on the remote host is affected by one or more of the<br />

following issues : \n\n - An unspecified error in 'SQLNLS_UNPADDEDCHARLEN()' may<br />

lead to a segmentation fault in DB2 server (LI73364).\n - DB2 does not mark inoperative or<br />

drop views and triggers if the definer cannot maintain the objects (IZ22306).\n -<br />

Password-related connection string keyword values may appear in trace output (IZ23915).<br />

The observed version of DB2 was: \n %L<br />

Solution: Apply DB2 Version 9.1 Fix Pack 6 or higher.<br />

CVE Not available<br />

Microsoft Software Update DNS Query Detection<br />

<strong>PVS</strong> ID: 4722 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Microsoft computer.<br />

Solution: N/A<br />

CVE Not available<br />

Microsoft Software Update DNS Query Detection<br />

<strong>PVS</strong> ID: 4723 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Microsoft computer.<br />

Solution: N/A<br />

CVE Not available<br />

Trend Micro OfficeScan HTTP Request Buffer Overflow<br />

<strong>PVS</strong> ID: 4724 FAMILY: Generic RISK: HIGH NESSUS ID:34490<br />

Description: Synopsis : \n\nThe remote host contains an application that is affected by a buffer overflow<br />

vulnerability.\n\nTrend Micro OfficeScan is installed on the remote host. The installed<br />

version is affected by a buffer overflow vulnerability. By sending a specially crafted HTTP<br />

request to Trend Micro OfficeScan server CGI modules, it may be possible to trigger a<br />

stack based buffer overflow. Successful exploitation of this issue may result in arbitrary<br />

code execution on the remote system. The reported version of Trend Micro is: \n %L<br />

Solution: Upgrade to :\n\n - Trend Micro OfficeScan 7.3 Build 1374 or higher\n - Trend Micro<br />

OfficeScan 8.0 Build 3110 or higher<br />

CVE-2008-3862<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1241


IBM WebSphere Application Server < 6.0.2.31 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4725 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:34501<br />

Description: Synopsis : \n\nThe remote application server is affected by multiple vulnerabilities.\n\nIBM<br />

WebSphere Application Server 6.0.2 before Fix Pack 31 appears to be running on the<br />

remote host. Such versions are reportedly affected by multiple vulnerabilities.\n\n - By<br />

sending a specially crafted HTTP request with the 'Host' header field set to more than 256<br />

bytes, it may be possible to crash the remote application server (PK69371).\n - An<br />

unspecified security exposure vulnerability exists if the 'fileServing' feature is enabled<br />

(PK64302).\n - Web services security fails to honor Certificate Revocation Lists (CRL)<br />

configured in Certificate Store Collections (PK61258). The reported version of WebSphere<br />

is: \n %L<br />

Solution: Apply Fix Pack 31 (6.0.2.31) or higher.<br />

CVE-2008-4111<br />

VLC Media Player < 0.9.5 TY Media File Handling Memory Curruption<br />

<strong>PVS</strong> ID: 4726 FAMILY: Web Clients RISK: HIGH NESSUS ID:34400<br />

Description: Synopsis : \n\nThe remote Windows host contains an application that is affected by a<br />

memory corruption vulnerability.\n\nThe version of VLC Media Player installed on the<br />

remote host is earlier than 0.9.5. Such versions do not properly parse TY media files. By<br />

sending a specially formatted TY file and tricking a user into opening the file, arbitrary<br />

code may be executed within the context of the affected application.\nThe reported version<br />

of VLC is: \n %L<br />

Solution: Upgrade to version 0.9.5 or higher.<br />

CVE-2008-4558<br />

OpenOffice < 2.4.2 WMF and EMF File Handling Buffer Overflows<br />

<strong>PVS</strong> ID: 4727 FAMILY: Generic RISK: HIGH NESSUS ID:34510<br />

Description: Synopsis : \n\nThe remote Windows host has a program affected by multiple buffer<br />

overflows.\n\n The version of OpenOffice 2.x installed on the remote host is earlier than<br />

2.4.2. Such versions are affected by several issues : \n\n - Specially crafted WMF files can<br />

lead to heap-based overflows and arbitrary code execution (CVE-2008-2237).\n - Specially<br />

crafted EMF files can lead to heap-based overflows and arbitrary code execution<br />

(CVE-2008-2238). The reported version/build of OpenOffice is: \n %L<br />

Solution: Upgrade to version 2.4.2 or higher.<br />

CVE-2008-2238<br />

IBM Tivoli Storage Manager Version Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1242


<strong>PVS</strong> ID: 4728 FAMILY: CGI RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the IBM Tivoli Storage Manager version: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Opera < 9.62 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4729 FAMILY: Web Clients RISK: HIGH NESSUS ID:34680<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is affected by several<br />

issues.\n\nThe version of Opera installed on the remote host is earlier than 9.62 and thus<br />

reportedly affected by several issues : \n\n - Opera fails to sanitize certain parameters<br />

passed to the 'History Search' (906).\n - The browser's same-origin policy may be violated<br />

because scripts running in the 'Links Panel' always run in the outermost frame of the page<br />

(907).\n\nSuccessful exploitation would result in the attacker being able to execute<br />

arbitrary script code in the unsuspecting user's browser and may also lead to cookie-based<br />

credential theft, browser setting modifications and other attacks. These attacks require that<br />

the attacker is able to trick a user into browsing to a malicious URI with the affected<br />

application. The reported version of Opera browser is: \n %L<br />

Solution: Upgrade to version 9.62 or higher.<br />

CVE-2008-4795<br />

UW-IMAP < 2007d.404 Multiple Utility Mailbox Name Overflow<br />

<strong>PVS</strong> ID: 4730 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a buffer overflow.\n\nThere is a flaw in the<br />

remote UW-IMAP server that allows a local user to execute arbitrary code on the server.<br />

The flaw is in the way that UW-IMAP handles malformed data sent to the 'tmail' and<br />

'dmail' local executables. An attacker exploiting this flaw would need local access as well<br />

as the ability to execute the aforementioned binaries. Successful exploiation would result in<br />

the attacker executing arbitrary code as the 'root' user. The observed banner (with version<br />

info) was: \n %L<br />

Solution: Upgrade to version 2007d.404 or higher.<br />

CVE-2008-5006<br />

Obsolete Web Server Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4731 FAMILY: Web Servers RISK: HIGH NESSUS ID:34460<br />

Description: Synopsis : \n\nThe remote web server is obsolete.\n\nAccording to its version, the remote<br />

web server is obsolete and no longer maintained by its vendor or provider. A lack of<br />

support implies that no new security patches are being released for it. The remote version<br />

of the web server was: \n %L<br />

Family Internet Services 1243


Solution: Upgrade to a newer version or switch to another server.<br />

CVE Not available<br />

Windows Unsupported Operating system<br />

<strong>PVS</strong> ID: 4732 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a Windows operating system that is no longer supported. The<br />

version of the host operating system is: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Windows 2000 < SP4 Detection<br />

<strong>PVS</strong> ID: 4733 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Windows 2000 prior to SP4. The full reported version was: \n<br />

%L<br />

Solution: N/A<br />

CVE Not available<br />

Windows 2000 SP4 Detection<br />

<strong>PVS</strong> ID: 4734 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Windows 2000 SP4. The full reported version was: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Windows XP < SP2 Detection<br />

<strong>PVS</strong> ID: 4735 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Windows XP prior to SP2. The full reported version was: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Windows XP SP2 Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4736 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1244


Description: The remote host is running Windows XP SP2. The full reported version was: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Windows 2003 SP1 Detection<br />

<strong>PVS</strong> ID: 4737 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Windows 2003 SP1. The full reported version was: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Windows 2003 (No Service Pack) Detection<br />

<strong>PVS</strong> ID: 4738 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Windows 2003 prior to Service Pack 1. The full reported<br />

version was: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Windows Vista (No Service Pack) Detection<br />

<strong>PVS</strong> ID: 4739 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Windows Vista prior to Service Pack 1. The full reported<br />

version was: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Windows Vista SP 1 Detection<br />

<strong>PVS</strong> ID: 4740 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Windows Vista Service Pack 1. The full reported version was:<br />

\n %L<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

System Requirements Lab Software Client Detection<br />

Family Internet Services 1245


<strong>PVS</strong> ID: 4741 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web browser has enabled an ActiveX / Java program that operates within the<br />

browser. The software, System Requirements Lab (SRL), is used to benchmark the<br />

capabilities of the client machine.<br />

Solution: Ensure that you are running the latest version of SRL.<br />

CVE Not available<br />

Bugzilla quips.cgi Unspecified Crafted Variable <strong>Security</strong> Bypass<br />

<strong>PVS</strong> ID: 4742 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe security controls on the remote host can be bypassed.\n\nThe remote<br />

host is running Bugzilla, a bug-tracking software with a web interface. The version of<br />

Bugzilla on the remote host suffers from a flaw where an authenticated user can bypass<br />

security controls and modify quips. The reported version of Bugzilla is: \n %L \n<br />

Solution: Upgrade to version 2.20.7, 2.22.6, 3.0.6 or higher.<br />

CVE-2008-6098<br />

MySQL Enterprise Server 5.0 < 5.0.70 Privilege Bypass<br />

<strong>PVS</strong> ID: 4743 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:34727<br />

Description: Synopsis : \n\nThe remote database server is susceptible to a privilege bypass<br />

attack.\n\nThe version of MySQL Enterprise Server 5.0 installed on the remote host is<br />

earlier than 5.0.70. In such versions, it is possible for a local user to circumvent privileges<br />

through the creation of MyISAM tables employing the 'DATA DIRECTORY' and 'INDEX<br />

DIRECTORY' options to overwrite existing table files in the application's data directory.<br />

Note that this issue was supposed to have been addressed in version 5.0.60, but the fix was<br />

incomplete. The reported version of MySQL server is: \n %L<br />

Solution: Upgrade to version 5.0.70 or higher.<br />

CVE-2008-4098<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

ClamAV < 0.94.1 get_unicode_name() Function Off-by-One Buffer Overflow<br />

<strong>PVS</strong> ID: 4744 FAMILY: Web Clients RISK: HIGH NESSUS ID:34729<br />

Description: Synopsis : \n\nThe remote antivirus service is affected by a buffer overflow vulnerability.<br />

\n\nAccording to its version, the clamd antivirus daemon on the remote host is earlier than<br />

0.94.1. Such versions have an off-by-one heap overflow vulnerability in the code<br />

responsible for parsing VBA project files, specifically in the 'get_unicode_name()' function<br />

of 'libclamav/vba_extract.c', when a specific 'name' buffer is passed to it. Using a specially<br />

crafted VBA project file embedded in an OLE2 Office document, a remote attacker can<br />

Family Internet Services 1246


trigger this vulnerability and execute arbitrary code on the remote host with the privileges<br />

of the 'clamd' process. The reported version of ClamAV is: \n %L<br />

Solution: Upgrade to version 0.94.1 or later.<br />

CVE-2008-5050<br />

Mozilla Browser Plugin Detection<br />

<strong>PVS</strong> ID: 4745 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Firefox web browser is configured to use browser plugins. A browser plugin<br />

adds functionality to the browser and often extends its attack surface. Many Firefox<br />

browser plugins are created and maintained by third-party software vendors or enthusiasts.<br />

<strong>PVS</strong> observed the following plugin: \n %L<br />

Solution: You should manually inspect the following plugin to ensure that it is allowed according to<br />

corporate policies and guidelines.<br />

CVE Not available<br />

Flash Player APSB08-18 / APSB08-20 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4746 FAMILY: Web Clients RISK: HIGH NESSUS ID:34741<br />

Description: Synopsis : \n\nThe remote Windows host contains a browser plugin that is affected by<br />

multiple vulnerabilities.\n\nAccording to its version number, an instance of Flash Player on<br />

the remote Windows host is 9.0.124.0 or earlier. Such versions are potentially affected by<br />

several vulnerabilities : \n\n - A potential port-scanning issue. (CVE-2007-4324)\n -<br />

Possible privilege escalation attacks against web servers hosting Flash content and<br />

cross-domain policy files. (CVE-2007-6243)\n - Potential Clipboard attacks.<br />

(CVE-2008-3873)\n - FileReference upload and download APIs that don't require user<br />

interaction. (CVE-2008-4401)\n - A 'Clickjacking' issue that could be abused by an attacker<br />

to lure a web browser user into unknowingly clicking on a link or dialog.<br />

(CVE-2008-4503)\n - A potential cross-site scripting vulnerability. (CVE-2008-4818)\n - A<br />

potential issue that could be leveraged to conduct a DNS rebinding attack.<br />

(CVE-2008-4819)\n - An information disclosure issue affecting only the ActiveX control.<br />

(CVE-2008-4820)\n - An information disclosure issue involving interpretation of the 'jar: '<br />

protocol and affecting only the plugin for Mozilla browsers. (CVE-2008-4821)\n - An issue<br />

with policy file interpretation could potentially lead to bypass of a non-root domain policy.<br />

(CVE-2008-4822)\n - A potential HTML injection issue involving an ActionScript<br />

attribute. (CVE-2008-4823)\n\nThe reported version of Flash is: \n %L<br />

Solution: Upgrade to Flash Player version 10.0.12.36 / 9.0.151.0 or higher.<br />

CVE-2008-4823<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

VLC Media Player 0.5.0 to 0.9.5 Stack-Based Buffer Overflows<br />

<strong>PVS</strong> ID: 4747 FAMILY: Web Clients RISK: HIGH NESSUS ID:34730<br />

Family Internet Services 1247


Description: Synopsis : \n\nThe remote Windows host contains an application that is affected by<br />

multiple buffer overflow vulnerabilities.\n\nA version of VLC between 0.5.0 and 0.9.5 is<br />

installed on the remote host. Such versions are affected by the following vulnerabilities :<br />

\n\n - RealText subtitle file (modules\demux\subtitle.c) processing is susceptible to a buffer<br />

overflow caused by user-supplied data from a malicious subtitle file being copied into static<br />

buffers without proper validation.\n - CUE image file (modules\access\vcd\cdrom.c)<br />

processing is susceptible to a stack-based buffer overflow because data supplied by the<br />

CUE file is supplied as an array index without proper validation.\n\nAn attacker may be<br />

able to leverage these issues to execute arbitrary code on the remote host by tricking a user<br />

into opening a specially crafted video file using the affected application. The reported<br />

version of VLC is: \n %L<br />

Solution: Upgrade to version 0.9.6 or higher.<br />

CVE-2008-5036<br />

Google Chrome < 0.3.154.9 Address Spoofing<br />

<strong>PVS</strong> ID: 4748 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:34742<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is affected by an address<br />

spoofing vulnerability.\n\nThe version of Google Chrome installed on the remote host is<br />

earlier than 0.3.154.9. Such versions are reportedly are affected by an address spoofing<br />

vulnerability in pop-ups. An attacker can leverage this issue to manipulate a window's<br />

address bar to show a different address than the actual origin of the content. The reported<br />

version of Chrome is: \n %L<br />

Solution: Upgrade to version 0.3.154.9 or higher.<br />

CVE Not available<br />

Zope < 2.11.3 PythonScript Handling DoS<br />

<strong>PVS</strong> ID: 4749 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote Zope server is vulnerable to a flaw in the way that it handles PythonScript code.<br />

Specifically, code may be executed that causes the remote server to use excessive<br />

resources. To be successful, an attacker would require the ability to access the application<br />

and create or modify PythonScript code. Successful exploitation would result in the<br />

attacker running arbitrary code with the permissions of the Zope server and consuming all<br />

system resources. The reported version of the Zope server is: \n %L<br />

Solution: Update to version 2.11.3 or higher.<br />

CVE Not available<br />

Yosemite Backup Service Driver Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1248


<strong>PVS</strong> ID: 4750 FAMILY: Generic RISK: INFO NESSUS ID:34756<br />

Description: Synopsis :\n\nA database service is listening on the remote host.\n\n The remote host is<br />

running Yosemite Backup, a commercial backup solution for Windows, Linux and Novell<br />

NetWare and targeting small-to-medium sized businesses.<br />

Solution: N/A<br />

CVE Not available<br />

Firefox < 2.0.0.18 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4751 FAMILY: Web Clients RISK: HIGH NESSUS ID:34766<br />

Description: Synopsis : \n\nThe remote Windows host contains a web browser that is affected by<br />

multiple vulnerabilities.\n\nThe installed version of Firefox is earlier than 2.0.0.18. Such<br />

versions are potentially affected by the following security issues : \n\n - Locally saved '.url'<br />

shortcut files can be used to read information stored in the local cache. (MFSA 2008-47)\n<br />

- The canvas element can be used in conjunction with an HTTP redirect to bypass<br />

same-origin restrictions and gain access to the content in arbitrary images from other<br />

domains. (MFSA 2008-48)\n - Arbitrary code execution is possible via Flash Player<br />

dynamic module unloading. (MFSA 2008-49)\n - By tampering with the<br />

window.__proto__.__proto__ object, one can cause the browser to place a lock on a<br />

non-native object, leading to a crash and possible code execution. (MFSA 2008-50)\n -<br />

There are several stability bugs in the browser engine that may lead to crashes with<br />

evidence of memory corruption. (MFSA 2008-52)\n - The browser's session restore feature<br />

can be used to violate the same-origin policy and run JavaScript in the context of another<br />

site. (MFSA 2008-53)\n - There is a buffer overflow that can be triggered by sending a<br />

specially crafted 200 header line in the HTTP index response. (MFSA 2008-54)\n - Crashes<br />

and remote code execution in nsFrameManager are possible by modifying certain<br />

properties of a file input element before it has finished initializing. (MFSA 2008-55)\n -<br />

The same-origin check in 'nsXMLHttpRequest: : NotifyEventListeners()' can be bypassed.<br />

(MFSA 2008-56)\n - The '-moz-binding' CSS property can be used to bypass security<br />

checks that validate codebase principals. (MFSA 2008-57)\n - There is an error in the<br />

method used to parse the default namespace in an E4X document caused by quote<br />

characters in the namespace not being properly escaped. (MFSA 2008-58)\n\nThe reported<br />

version of Firefox is: \n %L<br />

Solution: Upgrade to version 2.0.0.18 or higher.<br />

CVE-2008-5024<br />

Firefox 3.x < 3.0.4 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4752 FAMILY: Web Clients RISK: HIGH NESSUS ID:34767<br />

Description: Synopsis : \n\nThe remote Windows host contains a web browser that is affected by<br />

multiple vulnerabilities.\n\nThe installed version of Firefox 3.0 is earlier than 3.0.4. Such<br />

versions are potentially affected by the following security issues : \n\n - Locally saved '.url'<br />

shortcut files can be used to read information stored in the local cache. (MFSA 2008-47)\n<br />

- By tampering with the window.__proto__.__proto__ object, one can cause the browser to<br />

Family Internet Services 1249


place a lock on a non-native object, leading to a crash and possible code execution. (MFSA<br />

2008-50)\n - 'file: ' URIs are given chrome privileges when opened in the same tab as a<br />

chrome page or privileged 'about: ' page, which could allow an attacker to run arbitrary<br />

JavaScript with chrome privileges. (MFSA 2008-51)\n - There are several stability bugs in<br />

the browser engine that may lead to crashes with evidence of memory corruption. (MFSA<br />

2008-52)\n - The browser's session restore feature can be used to violate the same-origin<br />

policy and run JavaScript in the context of another site. (MFSA 2008-53)\n - There is a<br />

buffer overflow that can be triggered by sending a specially crafted 200 header line in the<br />

HTTP index response. (MFSA 2008-54)\n - Crashes and remote code execution in<br />

nsFrameManager are possible by modifying certain properties of a file input element before<br />

it has finished initializing. (MFSA 2008-55)\n - The same-origin check in<br />

'nsXMLHttpRequest: : NotifyEventListeners()' can be bypassed. (MFSA 2008-56)\n - The<br />

'-moz-binding' CSS property can be used to bypass security checks that validate codebase<br />

principals. (MFSA 2008-57)\n - There is an error in the method used to parse the default<br />

namespace in an E4X document caused by quote characters in the namespace not being<br />

properly escaped. (MFSA 2008-58)\nThe reported version of Firefox is: \n %L<br />

Solution: Upgrade to version 3.0.4 or higher.<br />

CVE-2008-5024<br />

SeaMonkey < 1.1.13 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4753 FAMILY: Web Clients RISK: HIGH NESSUS ID:34768<br />

Description: Synopsis : \n\nA web browser on the remote host is affected by multiple<br />

vulnerabilities.\n\nThe installed version of SeaMonkey is earlier than 1.1.13. Such versions<br />

are potentially affected by the following security issues : \n\n - Locally saved '.url' shortcut<br />

files can be used to read information stored in the local cache. (MFSA 2008-47)\n - By<br />

tampering with the window.__proto__.__proto__ object, one can cause the browser to<br />

place a lock on a non-native object, leading to a crash and possible code execution. (MFSA<br />

2008-50)\n - 'file: ' URIs are given chrome privileges when opened in the same tab as a<br />

chrome page or privileged 'about: ' page, which could allow an attacker to run arbitrary<br />

JavaScript with chrome privileges. (MFSA 2008-51)\n - There are several stability bugs in<br />

the browser engine that may lead to crashes with evidence of memory corruption. (MFSA<br />

2008-52)\n - The browser's session restore feature can be used to violate the same-origin<br />

policy and run JavaScript in the context of another site. (MFSA 2008-53)\n - There is a<br />

buffer overflow that can be triggered by sending a specially crafted 200 header line in the<br />

HTTP index response. (MFSA 2008-54)\n - Crashes and remote code execution in<br />

nsFrameManager are possible by modifying certain properties of a file input element before<br />

it has finished initializing. (MFSA 2008-55)\n - The same-origin check in<br />

'nsXMLHttpRequest: : NotifyEventListeners()' can be bypassed. (MFSA 2008-56)\n - The<br />

'-moz-binding' CSS property can be used to bypass security checks that validate codebase<br />

principals. (MFSA 2008-57)\n - There is an error in the method used to parse the default<br />

namespace in an E4X document caused by quote characters in the namespace not being<br />

properly escaped. (MFSA 2008-58)\nThe reported version of SeaMonkey is: \n %L<br />

Solution: Upgrade to version 1.1.13 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1250


CVE-2008-5024<br />

Safari < 3.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4754 FAMILY: Web Clients RISK: HIGH NESSUS ID:34772<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is affected by several<br />

issues.\n\nThe version of Safari installed on the remote Windows host is earlier than 3.2.<br />

Such versions are potentially affected by several issues : \n\n\n - Safari includes a version<br />

of zlib that is affected by multiple vulnerabilities. (CVE-2005-2096)\n - A heap buffer<br />

overflow issue in the libxslt library could lead to a crash or arbitrary code execution.<br />

(CVE-2008-1767)\n - A signedness issue in Safari's handling of JavaScript array indices<br />

could lead to a crash or arbitrary code execution. (CVE-2008-2303)\n - A memory<br />

corruption issue in WebCore's handling of style sheet elements could lead to a crash or<br />

arbitrary code execution. (CVE-2008-2317)\n - Multiple uninitialized memory access<br />

issues in libTIFF's handling of LZW-encoded TIFF images could lead to a crash or<br />

arbitrary code execution. (CVE-2008-2327)\n - A memory corruption issue in ImageIO's<br />

handling of TIFF images could lead to a crash or arbitrary code execution.<br />

(CVE-2008-2332).\n - A memory corruption issue in ImageIO's handling of embedded ICC<br />

profiles in JPEG images could lead to a crash or arbitrary code execution.<br />

(CVE-2008-3608)\n - A heap buffer overflow in CoreGraphics' handling of color spaces<br />

could lead to a crash or arbitrary code execution. (CVE-2008-3623)\n - A buffer overflow<br />

in the handling of images with an embedded ICC profile could lead to a crash or arbitrary<br />

code execution. (CVE-2008-3642)\n - Disabling autocomplete on a form field may not<br />

prevent the data in the field from being stored in the browser page cache.<br />

(CVE-2008-3644)\n - WebKit's plug-in interface does not block plug-ins from launching<br />

local URLs, which could allow a remote attacker to launch local files in Safari and lead to<br />

the disclosure of sensitive information. (CVE-2008-4216)\n\nThe reported version of Safari<br />

is: \n %L \nIAVB Reference : 2008-B-0078\nSTIG Finding Severity : Category I<br />

Solution: Upgrade to version 3.2 or higher.<br />

CVE-2008-4216<br />

Sun Java System Identity Manager Version Detection<br />

<strong>PVS</strong> ID: 4755 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Sun Java System Identity Manager. This system is used to<br />

manage and audit user rights across an enterprise. <strong>PVS</strong> has observed version: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Microsoft Web Service client Version Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4756 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1251


Description: The remote host is a Microsoft Web Services SOAP client. The reported version of the<br />

client is: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

SOAP/XML Plaintext Credentials Disclosure<br />

<strong>PVS</strong> ID: 4757 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nThe remote SOAP client was just observed sending what appears to be<br />

login information. Review the following: \n %L<br />

Solution: Ensure that confidential data is only passed over encrypted protocols.<br />

CVE Not available<br />

SOAP/XML Plaintext Credentials Disclosure<br />

<strong>PVS</strong> ID: 4758 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nThe remote SOAP server was just observed receiving what appears to be<br />

login information over unencrypted HTTP. Review the following:\n%P<br />

Solution: Ensure that confidential data is only passed over an encryped protocol.<br />

CVE Not available<br />

Adobe AIR Version Detection<br />

<strong>PVS</strong> ID: 4759 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Adobe AIR version: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Adobe AIR APSB08-23 / APSB08-22 / APSB08-20 / APSB08-18 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4760 FAMILY: Web Clients RISK: HIGH NESSUS ID:34815<br />

Description: Synopsis : \n\nThe remote Windows host contains a runtime environment that is affected<br />

by multiple issues.\n\nAccording to its version number, an instance of Adobe AIR on the<br />

remote Windows host is 1.5 or earlier. Such versions are potentially affected by several<br />

vulnerabilities : \n\n - A potential port-scanning issue. (CVE-2007-4324)\n\n - Possible<br />

Family Internet Services 1252


privilege escalation attacks against web servers hosting Flash content and cross-domain<br />

policy files. (CVE-2007-6243)\n\n - Potential Clipboard attacks. (CVE-2008-3873)\n\n -<br />

FileReference upload and download APIs that don't require user interaction.<br />

(CVE-2008-4401)\n\n - A potential cross-site scripting vulnerability. (CVE-2008-4818)\n\n<br />

- A potential issue that could be leveraged to conduct a DNS rebinding attack.<br />

(CVE-2008-4819)\n\n - An information disclosure issue affecting only the ActiveX control.<br />

(CVE-2008-4820)\n\n - An information disclosure issue involving interpretation of the 'jar:<br />

' protocol and affecting only the plugin for Mozilla browsers. (CVE-2008-4821)\n\n - An<br />

issue with policy file interpretation could potentially lead to bypass of a non-root domain<br />

policy. (CVE-2008-4822)\n\n - A potential HTML injection issue involving an<br />

ActionScript attribute. (CVE-2008-4823)\n\n - Multiple input validation errors could<br />

potentially lead to execution of arbitrary code. (CVE-2008-4824)\n\n - An Adobe AIR<br />

application that loads data from an untrusted source could allow an attacker to execute<br />

untrusted JavaScript with elevated privileges. (CVE-2008-5108)\n\nThe reported version of<br />

Adobe AIR is: \n %L<br />

Solution: Upgrade to version 1.5.0.7220 or higher.<br />

CVE-2008-5108<br />

SSH Tectia CBC Information Disclosure<br />

<strong>PVS</strong> ID: 4761 FAMILY: SSH RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote Tectia SSH server is vulnerable to a flaw within its Cipher-Block<br />

Chaining (CBC) mode. An attacker exploiting this flaw would be able to obtain four (4)<br />

plaintext bytes of the encrypted session. Note: successful attack will result in the SSH<br />

session terminating.<br />

Solution: Upgrade to version 4.4.12, 5.2.5, 5.3.9, 6.0.5 or higher.<br />

CVE-2008-5161<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Thunderbird < 2.0.0.18 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4762 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:34819<br />

Description: Synopsis : \n\nThe remote Windows host contains a mail client that is affected by multiple<br />

vulnerabilities.\n\nThe installed version of Thunderbird is earlier than 2.0.0.18. Such<br />

versions are potentially affected by the following security issues : \n\n\n - The canvas<br />

element can be used in conjunction with an HTTP redirect to bypass same-origin<br />

restrictions and gain access to the content in arbitrary images from other domains. (MFSA<br />

2008-48)\n - By tampering with the window.__proto__.__proto__ object, one can cause the<br />

browser to place a lock on a non-native object, leading to a crash and possible code<br />

execution. (MFSA 2008-50)\n - There are several stability bugs in the browser engine that<br />

may lead to crashes with evidence of memory corruption. (MFSA 2008-52)\n - Crashes and<br />

remote code execution in nsFrameManager are possible by modifying certain properties of<br />

a file input element before it has finished initializing. (MFSA 2008-55)\n - The same-origin<br />

check in 'nsXMLHttpRequest: : NotifyEventListeners()' can be bypassed. (MFSA<br />

Family Internet Services 1253


2008-56)\n - There is an error in the method used to parse the default namespace in an E4X<br />

document caused by quote characters in the namespace not being properly escaped. (MFSA<br />

2008-58)\n - Scripts in a malicious mail message can access the .document URI and<br />

.textContext DOM properties. (MFSA 2008-59)\n\nThe reported version of Thunderbird is:<br />

\n %L<br />

Solution: Upgrade to version 2.0.0.18 or higher.<br />

CVE-2008-5052<br />

Symantec Backup Exec Detection<br />

<strong>PVS</strong> ID: 4763 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Symantec Backup Exec, an enterprise solution for managing<br />

archived data. The reported version is: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Ruby on Rails < 2.0.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4764 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote<br />

server is running the Ruby on Rails web application. The reported version is '%L'\nThis<br />

version of Rails is reported to be vulnerable to a flaw in the way that it handles<br />

user-supplied input to the 'redirect_to()' function in the 'ActionController::Base' class. An<br />

attacker exploiting this flaw would be able to inject arbitrary HTTP headers that could lead<br />

to cross-site request forgery (CSRF), cross-site scripting (XSS) and other attacks.<br />

Solution: Upgrade to version 2.0.5 or higher.<br />

CVE-2008-5189<br />

MDaemon WorldClient < 10.0.2 Script Injection<br />

<strong>PVS</strong> ID: 4765 FAMILY: POP Server<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:34849<br />

Description: Synopsis : \n\nThe remote mail server is prone to a script injection vulnerability.\n\nThe<br />

remote host is running Alt-N MDaemon, a mail server for Windows. According to its<br />

banner, a version of MDaemon mail server older than 10.0.2 is installed on the remote host.<br />

Such versions ship with a version of WorldClient (a webmail client) that is affected by a<br />

script injection vulnerability. By tricking a user into opening a specially crafted email, an<br />

attacker can exploit this issue to execute script code in the user's browser in the security<br />

context of the affected application and thereby steal cookie based credentials or launch<br />

other attacks. The reported version of MDaemon is: \n %L<br />

Family Internet Services 1254


Solution: Upgrade to version 10.0.2 or higher.<br />

CVE-2008-6967<br />

vBulletin < 3.7.4 Visitor Messages Add-on HTML Injection<br />

<strong>PVS</strong> ID: 4766 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to an HTML injection attack.\n\nThe version<br />

of vBulletin installed on the remote host fails to properly sanitize user-supplied input.<br />

Specifically, the 'Visitor Messages' addon can be used by an attacker to inject script code<br />

into a public section of the bulletin board. An attacker exploiting this flaw would only need<br />

the ability to post data to the server. When an unsuspecting user browses the site, the script<br />

code would be executed within the client browser. The reported version of vBulletin is: \n<br />

%L<br />

Solution: Upgrade to version 3.7.4 or higher.<br />

MyBB < 1.4.4 CSRF<br />

CVE Not available<br />

<strong>PVS</strong> ID: 4767 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a cross-site request forgery (CSRF)<br />

attack.\n\nThe version of MyBB installed on the remote host is vulnerable to an<br />

information-disclosure flaw. Specifically, the 'my_post_key' variable of the<br />

'moderation.php' script can be harvested by malicious third party sites. An attacker can use<br />

this information to generate cross-site request forgery (CSRF) attacks. The reported version<br />

of MyBB is: \n %L \n<br />

Solution: Upgrade to version 1.4.4 or higher.<br />

CVE-2008-7082<br />

Apple Error Reporting DNS Lookup<br />

<strong>PVS</strong> ID: 4768 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is an Apple computer. <strong>PVS</strong> just observed the host making a query to<br />

an Apple server that handles error reports.<br />

Solution: N/A<br />

CVE Not available<br />

Apple iPhone Web Utility Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1255


<strong>PVS</strong> ID: 4769 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Apple iPhone web utility.<br />

Solution: N/A<br />

CVE Not available<br />

NetWitness Version Detection<br />

<strong>PVS</strong> ID: 4770 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the NetWitness network investigator tool version: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

CUPS < 1.3.10 Multiple Overflows<br />

<strong>PVS</strong> ID: 4771 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to an integer overflow.\n\nAccording to its<br />

banner, the version of CUPS installed on the remote host is earlier than 1.3.10. Such<br />

versions are affected by multiple integer overflow vulnerabilities : \n\n - A potential integer<br />

overflow in the PNG image validation code in '_cupsImageReadPNG()'. (STR #2974)\n\n -<br />

A heap-based integer overflow in '_cupsImageReadTIFF()'. (STR #3031)\n\n - The web<br />

interface may be vulnerable to DNS rebinding attacks due to a failure to validate the HTTP<br />

Host header in incoming requests. (STR #3118)\n\n - A heap-based buffer overflow in<br />

pdftops. (CVE-2009-0195)\n\n - Flawed 'ip' structure initialization in the function<br />

'ippReadIO()' could allow an attacker to crash the application.\n\n The reported version of<br />

CUPS is: \n %L \n<br />

Solution: Upgrade to version 1.3.10 or higher.<br />

CVE-2009-0195<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Altiris Deployment Solution Server < 6.9.355 Password Disclosure (SYM08-020)<br />

<strong>PVS</strong> ID: 4772 FAMILY: Generic RISK: LOW NESSUS ID:34964<br />

Description: Synopsis : \n\nThe remote Windows host has a program that is affected by a password<br />

disclosure vulnerability.\n\nThe version of the Altiris Deployment Solution installed on the<br />

remote host is reportedly affected by a password disclosure vulnerability. Altiris<br />

Deployment Solution Server reportedly stores 'Application Identity Account password' in<br />

the system memory in plaintext. It may be possible for an authorized non-privileged user to<br />

retrieve this password and make unauthorized modifications to the client systems. The level<br />

of unauthorized access depends on the user group under which Application Identity<br />

Account was registered during installation. The reported version number is: \n %L<br />

Family Internet Services 1256


Solution: Upgrade to version 6.9 Build 355 or higher.<br />

CVE-2008-6828<br />

CMS Made Simple admin/login.php cms_language Cookie Local File Inclusion<br />

<strong>PVS</strong> ID: 4773 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:34992<br />

Description: Synopsis : \n\nThe remote web server contains a PHP application that is susceptible to a<br />

local file inclusion attack.\n\nThe remote host is running CMS Made Simple, a content<br />

management system written in PHP. The version of CMS Made Simple installed on the<br />

remote host fails to sanitize user-supplied input to the 'cms_language' cookie when passed<br />

to the 'admin/login.php' script before using it to include PHP code. Regardless of PHP's<br />

'register_globals' and 'magic_quotes_gpc' settings, an unauthenticated attacker may be able<br />

to leverage this issue to view arbitrary files or possibly to execute arbitrary PHP code on<br />

the remote host, subject to the privileges of the web server user ID. The reported version of<br />

CMS Made Simple is: \n %L<br />

Solution: No solution is known at this time.<br />

CVE-2008-5642<br />

Samba 3.0.29 - 3.2.4 Potential Memory Disclosure<br />

<strong>PVS</strong> ID: 4774 FAMILY: Samba<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:34993<br />

Description: Synopsis : \n\nThe remote Samba server may be affected by an information disclosure<br />

vulnerability.\n\nAccording to its banner, the version of the Samba server on the remote<br />

host is between 3.0.29 and 3.2.4 inclusive. Such versions reportedly can potentially leak<br />

arbitrary memory contents of the 'smbd' process due to a missing bounds check on<br />

client-generated offsets of secondary 'trans', 'trans2', and 'nttrans' requests. The reported<br />

version is: \n %L<br />

Solution: Upgrade to version 3.2.5 / 3.0.33 or higher or apply the appropriate patch referenced in the<br />

project's advisory.<br />

CVE-2008-4314<br />

WordPress wp-includes/feed.php self_link() Function Host Header RSS Feed XSS<br />

<strong>PVS</strong> ID: 4775 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:34994<br />

Description: Synopsis : \n\nThe remote web server contains a PHP application that is affected by a<br />

cross-site scripting vulnerability.\n\nThe version of WordPress installed on the remote host<br />

fails to completely sanitize input to the the 'Host' request header before using it in the<br />

'self_link()' function in 'wp-includes/feed.php' to generate dynamic HTML output. An<br />

attacker may be able to leverage this to inject arbitrary HTML and script code into a user's<br />

browser to be executed within the security context of the affected site. The reported version<br />

Family Internet Services 1257


of WordPress is: \n %L<br />

Solution: Upgrade to version 2.6.5 or higher.<br />

CVE-2008-5278<br />

ClamAV < 0.94.2 cli_check_jpeg_exploit() Malformed JPEG File DoS<br />

<strong>PVS</strong> ID: 4776 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:35009<br />

Description: Synopsis : \n\nThe remote antivirus service is vulnerable to a denial of service<br />

attack.\n\nAccording to its version, the clamd antivirus daemon on the remote host is earlier<br />

than 0.94.2. There is a recursive stack overflow involving the JPEG parsing code in such<br />

versions. A remote attacker may be able to leverage this issue to cause the application to<br />

recursively scan a specially crafted JPEG, which will eventually cause it to crash. The<br />

remote version of ClamAV is: \n %L<br />

Solution: Upgrade to version 0.94.2 or higher.<br />

CVE-2008-5314<br />

PowerDNS Version Detection<br />

<strong>PVS</strong> ID: 4777 FAMILY: DNS Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running PowerDNS version: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Trillian < 3.1.12.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4778 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:35042<br />

Description: Synopsis : \n\nThe remote host contains an instant messaging application that is affected by<br />

several vulnerabilities.\n\nThe version of Trillian installed on the remote host reportedly<br />

contains several vulnerabilities : \n\n - A stack buffer overflow in the tool tip processing<br />

code could allow an unauthenticated attacker to execute arbitrary code with client<br />

privileges on the remote system. (ZDI-08-077)\n\n - A vulnerability in the XML processing<br />

code responsible for handling specially formulated XML could lead to arbitrary code<br />

execution on the remote system. (ZDI-08-078)\n\n - A vulnerability in XML processing<br />

code responsible for handling malformed XML tags could lead to arbitrary code execution<br />

on the remote system. (ZDI-08-079)\n\n The reported version of Trillian is: \n %L<br />

Solution: Upgrade to version 3.1.12.0 or higher.<br />

CVE-2008-5403<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1258


PHP 5 < 5.2.7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4779 FAMILY: Web Servers RISK: HIGH NESSUS ID:35043<br />

Description: Synopsis : \n\nThe remote web server uses a version of PHP that is affected by multiple<br />

flaws.\n\nAccording to its banner, the version of PHP installed on the remote host is older<br />

than 5.2.7. Such versions may be affected by several security issues : \n\n - Missing<br />

initialization of 'BG(page_uid)' and 'BG(page_gid)' when PHP is used as an Apache<br />

module may allow for bypassing security restrictions due to SAPI 'php_getuid()'<br />

overloading.\n\n - Incorrect 'php_value' order for Apache configuration may allow<br />

bypassing PHP's 'safe_mode' setting.\n\n - File truncation can occur when calling<br />

'dba_replace()' with an invalid argument.\n\n - The ZipArchive: extractTo() method in the<br />

ZipArchive extension fails to filter directory traversal sequences from file names.\n\n -<br />

There is a buffer overflow in the bundled PCRE library fixed by 7.8. (CVE-2008-2371)\n\n<br />

- A buffer overflow in the 'imageloadfont()' function in 'ext/gd/gd.c' can be triggered when<br />

a specially crafted font is given. (CVE-2008-3658)\n\n - There is a buffer overflow in<br />

PHP's internal function 'memnstr()', which is exposed to userspace as 'explode()'.<br />

(CVE-2008-3659)\n\n - When used as a FastCGI module, PHP segfaults when opening a<br />

file whose name contains two dots (eg, 'file..php'). (CVE-2008-3660)\n\n - Multiple<br />

directory traversal vulnerabilities in functions such as 'posix_access()', 'chdir()', 'ftok()' may<br />

allow a remote attacker to bypass 'safe_mode' restrictions. (CVE-2008-2665 and<br />

CVE-2008-2666).\n\n - A buffer overflow may be triggered when processing long message<br />

headers in 'php_imap.c' due to use of an obsolete API call. (CVE-2008-2829)\n\nThe<br />

reported version of PHP is: \n %L<br />

Solution: Upgrade to version 5.2.7 or higher.<br />

CVE-2008-5557<br />

Twiki < 4.2.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4780 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the TWiki web application. This version of TWiki is vulnerable to a<br />

content-parsing flaw. An attacker exploiting this flaw would send commands to the TWiki<br />

application within backticks. Upon being parsed, the commands would be executed on the<br />

remote server with the permissions of the web process. This version of TWiki is also<br />

vulnerable to a flaw where users can execute a cross-site scripting (XSS) attack. The<br />

reported version of TWiki is: \n %L \n<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2008-5305<br />

Web Server Allows Download of .ini Files<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4781 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1259


Description: The remote web server is hosting .ini files. As an example, consider the following<br />

file %P\nThe webmaster should make sure that they do not contain confidential data.<br />

Solution: N/A<br />

CVE Not available<br />

Dovecot ManageSieve Server Detection<br />

<strong>PVS</strong> ID: 4782 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Dovecot mail server with the Dovecot ManageSieve<br />

management application.<br />

Solution: N/A<br />

CVE Not available<br />

IBM WebSphere Application Server 7.0 < Fix Pack 1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4783 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:35082<br />

Description: Synopsis : \n\nThe remote application server is affected by multiple vulnerabilities.\n\nIBM<br />

WebSphere Application Server 7.0 before Fix Pack 1 appears to be running on the remote<br />

host. Such versions are reportedly affected by multiple vulnerabilities.\n\n - A vulnerability<br />

in feature pack for web services could lead to information disclosure due to<br />

'userNameToken' (PK67282).\n\n - A user locked by the underlying OS may be able to<br />

authenticate via the administrative console (PK67909).\n\n - Web authentication options<br />

'Authenticate when any URI is accessed' and 'Use available authentication data when an<br />

unprotected URI is accessed' are ignored. Servlets with no security constraints are not<br />

authenticated and usernames with the '@' symbol fail to authenticate (PK71826).\n\n -<br />

WS-<strong>Security</strong> in JAX-WS does not remove UsernameTokens from client cache on failed<br />

logins (PK72435).\n\n - SSL traffic is routed over unencrypted TCP routes (PK74777). The<br />

reported version is: \n %L<br />

Solution: Apply Fix Pack 1 (7.0.0.1) or higher.<br />

CVE-2008-5414<br />

PHP < 5.2.8 magic_quotes_gpc <strong>Security</strong> Bypass<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4784 FAMILY: Web Servers RISK: HIGH NESSUS ID:35067<br />

Description: Synopsis : \n\nThe remote web server uses a version of PHP that is affected by a security<br />

bypass weakness.\n\nAccording to its banner, the version of PHP installed on the remote<br />

host is 5.2.7. This version introduced a regression with regard to 'magic_quotes'<br />

functionality due to an incorrect fix to the filter extension. As a result, the<br />

'magic_quotes_gpc' setting remains off even if it is set to on. The reported version of PHP<br />

is: \n %L<br />

Family Internet Services 1260


Solution: Upgrade to version 5.2.8 or higher.<br />

CVE-2008-5844<br />

VLC Media Player < 0.9.8a RealMedia Processing Remote Integer Overflow<br />

<strong>PVS</strong> ID: 4785 FAMILY: Web Clients RISK: HIGH NESSUS ID:35068<br />

Description: Synopsis : \n\nThe remote Windows host contains an application that is affected by an<br />

integer overflow vulnerability.\n\nThe version of VLC Media Player 0.9 installed on the<br />

remote host is earlier than 0.9.8a. Such versions contain a heap-based integer buffer<br />

overflow in the Real demuxer plugin (libreal_plugin.*'). If an attacker can trick a user into<br />

opening a specially crafted RealMedia (.rm) file, he may be able to execute arbitrary code<br />

within the context of the affected application. The reported version of VLC is: \n %L<br />

Solution: Upgrade to version 0.9.8a or higher.<br />

CVE-2008-5276<br />

PHPMyAdmin < 2.11.9.4 / 3.1.1.0 tbl_structure.php table Parameter SQL Injection<br />

<strong>PVS</strong> ID: 4786 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL injection attack.\n\nThe remote host<br />

is running phpMyAdmin, a web interface for administering MySQL database servers. This<br />

version of phpMyAdmin is vulnerable to a SQL injection attack via the 'table' parameter of<br />

the 'tbl_structure.php script. An attacker exploiting this flaw would need to send a specially<br />

formatted HTTP request containing the attackers SQL commands. An attacker exploiting<br />

this flaw would be able to execute arbitrary SQL commands on the database server utilized<br />

by phpMyAdmin.<br />

Solution: Upgrade to version 2.11.9.4, 3.1.1.0 or higher.<br />

CVE-2008-5621<br />

ClamAV < 0.94 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4787 FAMILY: Web Clients RISK: HIGH NESSUS ID:35087<br />

Description: Synopsis : \n\nThe remote antivirus service is affected by multiple issues.\n\nAccording to<br />

its version, the clamd antivirus daemon on the remote host is earlier than 0.94. Such<br />

versions are affected by one or more of the following issues : \n\n - A segmentation fault<br />

can occur when processing corrupted LZH files. (Bug #1052)\n\n - Invalid memory access<br />

errors in 'libclamav/chmunpack.c' when processing malformed CHM files may lead to a<br />

crash. (Bug #1089)\n\n - An out-of-memory null dereference issue exists in<br />

'libclamav/message.c' / 'libclamav/mbox.c'. (Bug #1141)\n\n - Possible error path memory<br />

leaks exist in 'freshclam/manager.c'. (Bug #1141)\n\n - There is an invalid close on error<br />

path in 'shared/tar.c'. (Bug #1141)\n\n - There are multiple file descriptor leaks involving<br />

the 'error path' in 'libclamav/others.c' and 'libclamav/sis.c'. (Bug #1141).\n\nThe reported<br />

Family Internet Services 1261


version of ClamAV is: \n %L<br />

Solution: Upgrade to version 0.94 or higher.<br />

CVE-2008-3914<br />

Moodle < 1.9.4 filter/tex/texed.php pathname Parameter Remote Command Execution<br />

<strong>PVS</strong> ID: 4788 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:35090<br />

Description: Synopsis : \n\nThe remote web server contains a PHP application that allows arbitrary<br />

command execution.\n\nThe version of Moodle installed on the remote host fails to sanitize<br />

user-supplied input to the 'pathname' parameter before using it in the 'filter/tex/texed.php'<br />

script in a commandline that is passed to the shell. Provided PHP's 'register_globals' setting<br />

and the TeX Notation filter has both been enabled and PHP's 'magic_quotes_gpc' setting is<br />

disabled, an unauthenticated attacker can leverage these issues to execute arbitrary code on<br />

the remote host subject to the privileges of the web server user ID. The reported version of<br />

Moodle is: \n %L<br />

Solution: Disable PHP's 'register_globals' or upgrade to version 1.9.4 or higher.<br />

CVE Not available<br />

Mac OS X < 10.5.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4789 FAMILY: Generic RISK: HIGH NESSUS ID:35111<br />

Description: Synopsis : \n\nThe remote host is missing a Mac OS X update that fixes various security<br />

issues.\n\nThe remote host is running a version of Mac OS X 10.5 that is older than version<br />

10.5.6. Mac OS X 10.5.6 contains security fixes for the following products : \n\n - ATS\n -<br />

BOM\n - CoreGraphics\n - CoreServices\n - CoreTypes\n - Flash Player Plug-in\n -<br />

Kernel\n - Libsystem\n - Managed Client\n - network_cmds\n - Podcast Producer\n -<br />

UDF\n\nThe reported version of Mac OS X is: \n %L<br />

Solution: Upgrade to version 10.5.6 or higher.<br />

CVE-2008-4824<br />

Mac OS X < 10.5.6 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4790 FAMILY: Generic RISK: HIGH NESSUS ID:35111<br />

Description: Synopsis : \n\nThe remote host is missing a Mac OS X update that fixes various security<br />

issues.\n\nThe remote host is running a version of Mac OS X 10.5 that is older than version<br />

10.5.6. Mac OS X 10.5.6 contains security fixes for the following products : \n\n - ATS\n -<br />

BOM\n - CoreGraphics\n - CoreServices\n - CoreTypes\n - Flash Player Plug-in\n -<br />

Kernel\n - Libsystem\n - Managed Client\n - network_cmds\n - Podcast Producer\n -<br />

UDF\n\nThe reported version of Mac OS X is: \n %L<br />

Family Internet Services 1262


Solution: Upgrade to version 10.5.6 or higher.<br />

CVE-2008-4824<br />

Opera < 9.63 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4791 FAMILY: Web Clients RISK: HIGH NESSUS ID:35185<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is affected by several<br />

issues.\n\nThe version of Opera installed on the remote host is earlier than 9.63 and is<br />

reportedly affected by several issues : \n\n - It may be possible to execute arbitrary code on<br />

the remote system by manipulating certain text-area contents. (920)\n\n - It may be possible<br />

to crash the remote browser using certain HTML constructs or inject code under certain<br />

conditions. (921)\n\n - While previewing news feeds, Opera does not correctly block<br />

certain scripted URLs. Such scripts, if not blocked, may be able to subscribe a user to other<br />

arbitrary feeds and view contents of the feeds to which the user is currently subscribed.<br />

(923)\n\n - By displaying content using XSLT as escaped strings, it may be possible for a<br />

website to inject scripted markup. (924)\n\nThe reported version of Opera browser is: \n<br />

%L<br />

Solution: Upgrade to version 9.63 or higher.<br />

CVE Not available<br />

Firefox < 2.0.0.19 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4792 FAMILY: Web Clients RISK: HIGH NESSUS ID:35218<br />

Description: Synopsis : \n\nThe remote Windows host contains a web browser that is affected by<br />

multiple vulnerabilities.\n\nThe installed version of Firefox is earlier than 2.0.0.19. Such<br />

versions are potentially affected by the following security issues : \n\n - There are several<br />

stability bugs in the browser engine that may lead to crashes with evidence of memory<br />

corruption. (MFSA 2008-60)\n\n - XBL bindings can be used to read data from other<br />

domains. (MFSA 2008-61)\n\n - The feed preview still allows for JavaScript privilege<br />

escalation. (MFSA 2008-62)\n\n - Sensitive data may be disclosed in an XHR response<br />

when an XMLHttpRequest is made to a same-origin resource, which 302 redirects to a<br />

resource in a different domain. (MFSA 2008-64)\n\n - A website may be able to access a<br />

limited amount of data from a different domain by loading a same-domain JavaScript URL<br />

which redirects to an off-domain target resource containing data that is not parsable as<br />

JavaScript. (MFSA 2008-65)\n\n - Errors arise when parsing URLs with leading<br />

whitespace and control characters. (MFSA 2008-66)\n\n - An escaped null byte is ignored<br />

by the CSS parser and treated as if it was not present in the CSS input string. (MFSA<br />

2008-67)\n\n - XSS and JavaScript privilege escalation are possible. (MFSA 2008-68)\n\n -<br />

XSS vulnerabilities in SessionStore may allow for violating the browser's same-origin<br />

policy and performing an XSS attack or running arbitrary JavaScript with chrome<br />

privileges. (MFSA 2008-69)\n\nNote that Mozilla is not planning further security / stability<br />

updates for Firefox 2.x.\n\n - A denial of service issue when the application handles a<br />

maliciously crafted webpage containing a 'HTMLSelectElement' object with a large length<br />

attribute.\n\nThe reported version of Firefox is: \n %L<br />

Family Internet Services 1263


Solution: Upgrade to version 2.0.0.19, 3.0.5 or higher.<br />

CVE-2008-5513<br />

Firefox < 3.0.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4793 FAMILY: Web Clients RISK: HIGH NESSUS ID:35219<br />

Description: Synopsis : \n\nThe remote Windows host contains a web browser that is affected by<br />

multiple vulnerabilities.\n\nThe installed version of Firefox 3.0 is earlier than 3.0.5. Such<br />

versions are potentially affected by the following security issues : \n\n - There are several<br />

stability bugs in the browser engine that may lead to crashes with evidence of memory<br />

corruption. (MFSA 2008-60)\n\n - XBL bindings can be used to read data from other<br />

domains. (MFSA 2008-61)\n\n - The feed preview still allows for JavaScript privilege<br />

escalation. (MFSA 2008-62)\n\n - Sensitive data may be disclosed in an XHR response<br />

when an XMLHttpRequest is made to a same-origin resource, which 302 redirects to a<br />

resource in a different domain. (MFSA 2008-64)\n\n - A website may be able to access a<br />

limited amount of data from a different domain by loading a same-domain JavaScript URL<br />

which redirects to an off-domain target resource containing data that is not parsable as<br />

JavaScript. (MFSA 2008-65)\n\n - Errors arise when parsing URLs with leading<br />

whitespace and control characters. (MFSA 2008-66)\n\n - An escaped null byte is ignored<br />

by the CSS parser and treated as if it was not present in the CSS input string. (MFSA<br />

2008-67)\n\n - XSS and JavaScript privilege escalation are possible. (MFSA 2008-68)\n\n -<br />

XSS vulnerabilities in SessionStore may allow for violating the browser's same-origin<br />

policy and performing an XSS attack or running arbitrary JavaScript with chrome<br />

privileges. (MFSA 2008-69)\n\n - A denial of service issue when the application handles a<br />

maliciously crafted webpage containing a 'HTMLSelectElement' object with a large length<br />

attribute.\n\nThe reported version of Firefox is: \n %L<br />

Solution: Upgrade to version 3.0.5 or higher.<br />

CVE-2009-2535<br />

SeaMonkey < 1.1.14 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4794 FAMILY: Web Clients RISK: HIGH NESSUS ID:35220<br />

Description: Synopsis : \n\nA web browser on the remote host is affected by multiple<br />

vulnerabilities.\n\nThe installed version of SeaMonkey is earlier than 1.1.14. Such versions<br />

are potentially affected by the following security issues : \n\n - There are several stability<br />

bugs in the browser engine that may lead to crashes with evidence of memory corruption.<br />

(MFSA 2008-60)\n\n - XBL bindings can be used to read data from other domains. (MFSA<br />

2008-61)\n\n - The feed preview still allows for JavaScript privilege escalation. (MFSA<br />

2008-62)\n\n - Sensitive data may be disclosed in an XHR response when an<br />

XMLHttpRequest is made to a same-origin resource, which 302 redirects to a resource in a<br />

different domain. (MFSA 2008-64)\n\n - A website may be able to access a limited amount<br />

of data from a different domain by loading a same-domain JavaScript URL which redirects<br />

to an off-domain target resource containing data that is not parsable as JavaScript. (MFSA<br />

2008-65)\n\n - Errors arise when parsing URLs with leading whitespace and control<br />

characters. (MFSA 2008-66)\n\n - An escaped null byte is ignored by the CSS parser and<br />

treated as if it was not present in the CSS input string. (MFSA 2008-67)\n\n - XSS and<br />

Family Internet Services 1264


JavaScript privilege escalation are possible. (MFSA 2008-68)\n\n - XSS vulnerabilities in<br />

SessionStore may allow for violating the browser's same-origin policy and performing an<br />

XSS attack or running arbitrary JavaScript with chrome privileges. (MFSA<br />

2008-69)\n\nThe reported version of SeaMonkey is: \n %L<br />

Solution: Upgrade to version 1.1.14 or higher.<br />

CVE-2008-5513<br />

Barracuda Spam Firewall < 3.5.12.007 Multiple Vulnerabilities (SQLi, XSS)<br />

<strong>PVS</strong> ID: 4795 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:35224<br />

Description: Synopsis : \n\nThe remote web server contains CGI scripts that are affected by several<br />

issues.\n\nThe remote Barracuda Spam Firewall device is using a firmware version earlier<br />

than 3.5.12.007. Such versions reportedly are affected by several issues : \n\n - There is a<br />

SQL injection vulnerability involving the 'pattern_x' parameter (where x<br />

Solution: Update to firmware version 3.5.12.007 or higher.<br />

CVE-2008-1094<br />

Firefox < 2.0.0.20 Cross-Domain Data Theft<br />

<strong>PVS</strong> ID: 4796 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:35251<br />

Description: Synopsis : \n\nThe remote Windows host contains a web browser that is affected by a<br />

cross-domain data theft vulnerability.\n\nThe installed version of Firefox is earlier than<br />

2.0.0.20. Such versions shipped without a fix for a security issue that was reportedly fixed<br />

in version 2.0.0.19. Specifically : \n\n - A website may be able to access a limited amount<br />

of data from a different domain by loading a same-domain JavaScript URL which redirects<br />

to an off-domain target resource containing data that is not parsable as JavaScript. (MFSA<br />

2008-65)\n\nNote that Mozilla is not planning further security / stability updates for Firefox<br />

2.x.\n\nThe reported version of Firefox is: \n %L<br />

Solution: Upgrade to version 2.0.0.20 or higher.<br />

CVE-2008-5507<br />

Kerio MailServer < 6.6.2 (KSEC-2008-12-16-01) Multiple XSS<br />

<strong>PVS</strong> ID: 4797 FAMILY: SMTP Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:35258<br />

Description: Synopsis : \n\nThe remote mail server is affected by several cross-site scripting<br />

vulnerabilities.\n\nAccording to its banner, the remote host is running a version of Kerio<br />

MailServer prior to 6.6.2. Multiple files in such versions are reportedly affected by<br />

cross-site scripting vulnerabilities.\n\n - The application fails to sanitize input to the 'folder'<br />

parameter of the 'mailCompose.php' script as well as the 'daytime' parameter of the<br />

Family Internet Services 1265


'calendarEdit.php' script before using it to generate dynamic HTML.\n\n - Content passed<br />

to 'sent' parameter of the 'error413.php' script is not sanitized before being returned to the<br />

user.\n\nSuccessful exploitation of these issues could lead to execution of arbitrary HTML<br />

and script code in a user's browser within the security context of the affected site.\n\nThe<br />

reported version of Kerio Mailserver is: \n %L<br />

Solution: Upgrade to versaion 6.6.2 or higher.<br />

CVE-2008-5769<br />

UW-IMAP < 2007e c-client Library Overflow<br />

<strong>PVS</strong> ID: 4798 FAMILY: IMAP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a buffer overflow.\n\nThere is a flaw in the<br />

remote UW-IMAP server that allows a remote user to execute arbitrary code on the server.<br />

The flaw is in the way that UW-IMAP handles malformed data sent to the<br />

'rfc822_output_char' function of the 'c-client' library. An attacker exploiting this flaw<br />

would only need the ability to send malformed data to the server process. The observed<br />

banner (with version info) was: \n %L \n<br />

Solution: Upgrade to version 2007e or higher.<br />

CVE-2008-5514<br />

McAfee ePO Version Detection<br />

<strong>PVS</strong> ID: 4799 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running McAfee ePO version: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

IceWarp Merak Mail Server < 9.4.0 IMG Tag XSS<br />

<strong>PVS</strong> ID: 4800 FAMILY: SMTP Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:35281<br />

Description: Synopsis : \n\nThe remote webmail server is affected by a cross-site scripting<br />

vulnerability.\n\nThe remote host is running IceWarp Merak Mail Server, a webmail server<br />

for Windows and Linux. According to its banner, the version of IceWarp installed on the<br />

remote host is older than 9.4.0. Such versions reportedly fail to sanitize input passed to<br />

'IMG' HTML tags in an e-mail message before displaying them. A remote attacker could<br />

leverage this issue to inject arbitrary HTML and script code into a user's browser to be<br />

executed within the security context of the affected application. The reported version of<br />

Merak is: \n %L<br />

Family Internet Services 1266


Solution: Upgrade to version 9.4.0 or higher.<br />

CVE-2008-5734<br />

OneOrZero Helpdesk tinfo.php Arbitrary File Upload<br />

<strong>PVS</strong> ID: 4801 FAMILY: CGI RISK: HIGH NESSUS ID:35261<br />

Description: Synopsis : \n\nThe remote web server contains a PHP application that is affected by an<br />

arbitrary file upload vulnerability.\n\nThe remote host is running OneOrZero Helpdesk, a<br />

web-based helpdesk application written in PHP. The version of OneOrZero HelpDesk<br />

installed on the remote host allows uploads of arbitrary files via the 'tinfo.php' script<br />

provided the 'send_email' POST parameter is set. By uploading a file with arbitrary PHP<br />

code, an unauthenticated remote attacker can likely leverage this issue to execute code<br />

subject to the privileges of the web server user ID. In addition, there is a flaw in the<br />

login.php script when handling the 'default_language' parameter. An attacker would be able<br />

to view or execute arbitrary local files. Note that successful exploitation of this issue<br />

requires that 'Task Attachments' is enabled, which is true by default. Further, note that there<br />

is also reportedly a SQL injection issue involving the Content_Type for uploaded files and<br />

affecting this version of OneOrZero Helpdesk. If "Task Attachments' have been disabled,<br />

you are not vulnerable to this flaw.\n\nThe reported version of OneOrZero is: \n %L<br />

Solution: Log into the application's control panel as the administrator and disable 'Task Attachments'<br />

(under 'OneOrZero Settings'). When released, upgrade to version 1.6.5.8 or higher.<br />

CVE-2009-0886<br />

SPIP Version Detection<br />

<strong>PVS</strong> ID: 4802 FAMILY: CGI RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running SPIP, an application used to rapidly create web content. The<br />

version of SPIP is: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

SSL Certificate Signed Using Weak Hashing Algorithm<br />

<strong>PVS</strong> ID: 4803 FAMILY: Generic RISK: LOW NESSUS ID:35291<br />

Description: Synopsis :\n\nThe SSL certificate has been signed using a weak hash algorithm -<br />

MD5\n\nThe remote service uses an SSL certificate that has been signed using a<br />

cryptographically weak hashing algorithm - MD5. These algorithms are known to be<br />

vulnerable to collision attacks. In theory, a determined attacker may be able to leverage this<br />

weakness to generate another certificate with the same digital signature, which could allow<br />

him to masquerade as the affected service.<br />

Solution: Contact the Certificate Authority to have the certificate reissued.<br />

Family Internet Services 1267


CVE-2004-2761<br />

SSL Certificate Signed Using Weak Hashing Algorithm<br />

<strong>PVS</strong> ID: 4804 FAMILY: Generic RISK: LOW NESSUS ID:35291<br />

Description: Synopsis :\n\nThe SSL certificate has been signed using a weak hash algorithm -<br />

MD4\n\nThe remote service uses an SSL certificate that has been signed using a<br />

cryptographically weak hashing algorithm - MD4. These algorithms are known to be<br />

vulnerable to collision attacks. In theory, a determined attacker may be able to leverage this<br />

weakness to generate another certificate with the same digital signature, which could allow<br />

him to masquerade as the affected service.<br />

Solution: Contact the Certificate Authority to have the certificate reissued.<br />

CVE-2004-2761<br />

SSL Certificate Signed Using Weak Hashing Algorithm<br />

<strong>PVS</strong> ID: 4805 FAMILY: Generic RISK: LOW NESSUS ID:35291<br />

Description: Synopsis :\n\nThe SSL certificate has been signed using a weak hash algorithm -<br />

MD2\n\nThe remote service uses an SSL certificate that has been signed using a<br />

cryptographically weak hashing algorithm - MD2. These algorithms are known to be<br />

vulnerable to collision attacks. In theory, a determined attacker may be able to leverage this<br />

weakness to generate another certificate with the same digital signature, which could allow<br />

him to masquerade as the affected service.<br />

Solution: Contact the Certificate Authority to have the certificate reissued.<br />

CVE-2004-2761<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Thunderbird < 2.0.0.19 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4806 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:35287<br />

Description: Synopsis : \n\nThe remote Windows host contains a mail client that is affected by multiple<br />

vulnerabilities.\n\nThe installed version of Thunderbird is earlier than 2.0.0.19. Such<br />

versions are potentially affected by the following security issues : \n\n - There are several<br />

stability bugs in the browser engine that may lead to crashes with evidence of memory<br />

corruption. (MFSA 2008-60)\n\n - XBL bindings can be used to read data from other<br />

domains. (MFSA 2008-61)\n\n - Sensitive data may be disclosed in an XHR response when<br />

an XMLHttpRequest is made to a same-origin resource, which 302 redirects to a resource<br />

in a different domain. (MFSA 2008-64)\n\n - A website may be able to access a limited<br />

amount of data from a different domain by loading a same-domain JavaScript URL that<br />

redirects to an off-domain target resource containing data that is not parsable as JavaScript.<br />

(MFSA 2008-65)\n\n - Errors arise when parsing URLs with leading whitespace and<br />

control characters. (MFSA 2008-66)\n\n - An escaped null byte is ignored by the CSS<br />

parser and treated as if it was not present in the CSS input string. (MFSA 2008-67)\n\n -<br />

XSS and JavaScript privilege escalation are possible. (MFSA 2008-68)\n\nThe reported<br />

Family Internet Services 1268


version of Thunderbird is: \n %L<br />

Solution: Upgrade to version 2.0.0.19 or higher.<br />

CVE-2008-5512<br />

Samba 3.2.0 - 3.2.6 Unauthorized Access<br />

<strong>PVS</strong> ID: 4807 FAMILY: Samba<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:35298<br />

Description: Synopsis : \n\nThe remote Samba server may be affected by an unauthorized access<br />

vulnerability.\n\nAccording to its banner, the version of the Samba server on the remote<br />

host is between 3.2.0 and 3.2.6 inclusive. Such versions reportedly allow an authenticated<br />

remote user to gain access to the root filesystem, subject to his or her privileges, by making<br />

a request for a share called '' (empty string) from a version of smbclient prior to 3.0.28.<br />

Successful exploitation of this issue requires 'registry shares' to be enabled, which is not<br />

enabled by default.\n\nThe reported version of Samba is: \n %L<br />

Solution: Upgrade to version 3.2.7 or higher or apply the appropriate patch referenced in the project's<br />

advisory.<br />

CVE-2009-0022<br />

Hamachi VPN Detection<br />

<strong>PVS</strong> ID: 4808 FAMILY: Policy RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running a client VPN application that allows remote users to connect to<br />

the computer and use it as a tunnel into the internal network. Hamachi works by connecting<br />

to an Internet server (a 'frontend' server) from inside a firewalled network. The connection<br />

is then held open and can be accessed by users outside the network. Once connected to<br />

Hamachi, remote users would have the ability to access internal services as if they were<br />

directly attached to the network.<br />

Solution: Ensure that such usage is in alignment with corporate policies regarding remote access.<br />

CVE Not available<br />

Hamachi VPN Version Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4809 FAMILY: Policy RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running a client VPN application that allows remote users to connect to<br />

the computer and use it as a tunnel into the internal network. Hamachi works by connecting<br />

to an internet server (a 'frontend' server) from inside a firewalled network. The connection<br />

is then held open and can be accessed by users outside the network. Once connected to<br />

Hamachi, remote users would have the ability to access internal services as if they were<br />

directly attached to the network. The version of Hamachi is: \n %L<br />

Family Internet Services 1269


Solution: Ensure that such usage is in alignment with corporate policies regarding remote access.<br />

CVE Not available<br />

Serv-U < 7.4.0.0 Multiple Command Argument Handling DoS<br />

<strong>PVS</strong> ID: 4810 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:35328<br />

Description: Synopsis : \n\nThe remote FTP server is affected by a denial of service<br />

vulnerability.\n\nThe remote host is running Serv-U File Server, an FTP server for<br />

Windows. The installed version of Serv-U 7.x is earlier than 7.4.0.0, and is affected by a<br />

denial of service vulnerability. By using a specially crafted command such as XCRC,<br />

STOU, DSIZ, AVBL, RNTO, or RMDA, it may be possible for an authenticated attacker to<br />

render the FTP server temporarily unresponsive. The reported version of Serv-U is: \n %L<br />

Solution: Upgrade to version 7.4.0.0 or higher.<br />

CVE Not available<br />

HDHomerun Server Detection<br />

<strong>PVS</strong> ID: 4811 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running HDHomerun, an application used to stream digital media.<br />

Ensure that such applications are authorized according to existing policies.<br />

Solution: N/A<br />

CVE Not available<br />

Comersus Cart < 7.099 Remote Password Disclosure<br />

<strong>PVS</strong> ID: 4812 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web application allows unauthorized access to other user<br />

accounts.\n\nThe installed version of Comersus Cart on the remote host suffers from a flaw<br />

where registered users can modify the email address and password of other users. The root<br />

cause is a failure of the 'comersus_customerModifyExec.asp' script to sanitize<br />

user-supplied input. An attacker exploiting this flaw would be able to change the<br />

credentials of other users. The reported version of Comersus Cart is: \n %L \n<br />

Solution: Upgrade to version 7.099 or higher.<br />

CVE Not available<br />

Simple Machines Forum < 1.1.8 Password Reset Function Bypass<br />

<strong>PVS</strong> ID: 4813 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 1270


Description: Synopsis : \n\nThe remote host is vulnerable to a security bypass flaw.\n\nThe remote host<br />

is running the Simple Machines Forum (SMF), a web forum. This version of SMF is<br />

vulnerable to a flaw where attackers can bypass security filtering related to the password<br />

reset function. The root cause of this flaw is reported to be the 'action' and 'reminder'<br />

parameters of index.php. An attacker exploiting this flaw would be able to reset the<br />

administrative password and gain full access to the application. In order for this attack to be<br />

successful, the attacker would need prior knowledge of the administrator nickname and<br />

numerical ID. Successful exploitation would result in the attacker gaining administrative<br />

access. The reported version of SMF is: \n %L \n<br />

Solution: Upgrade to version 1.1.8 or higher.<br />

CVE Not available<br />

Twitter Client Usage Detection<br />

<strong>PVS</strong> ID: 4814 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Twitter social network. Twitter is a social tool that<br />

allows users to rapidly communicate their current tasks with other users.<br />

realtime<br />

Solution: N/A<br />

CVE Not available<br />

Ganglia Web Backend Version Detection<br />

<strong>PVS</strong> ID: 4815 FAMILY: CGI RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Ganglia Web Backend (gmetad) version "%L"<br />

Solution: N/A<br />

CVE Not available<br />

Ganglia Web Backend < 3.0.7 process_path Function Overflow<br />

<strong>PVS</strong> ID: 4816 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the Ganglia Web Backend (gmetad) version "%L".\n\nThis version of Ganglia is<br />

vulnerable to a remote buffer overflow within the process_path() function. An attacker<br />

exploiting this flaw would need the ability to send malformed data to the Ganglia gmetad<br />

process. Successful exploitation would result in the attacker gaining control of the remote<br />

system.<br />

Solution: Upgrade to version 3.0.7 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1271


CVE-2009-0241<br />

QuickTime < 7.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4817 FAMILY: Web Clients RISK: HIGH NESSUS ID:35437<br />

Description: Synopsis : \n\nThe remote host contains an application that is affected by multiple<br />

vulnerabilities.\n\nThe version of QuickTime installed on the remote host is older than 7.6.<br />

Such versions contain several vulnerabilities : \n\n - A heap buffer overflow in QuickTime's<br />

handling of RTSP URLs may lead to an application crash or arbitrary code execution.<br />

(CVE-2009-0001)\n\n - A heap buffer overflow in QuickTime's handling of THKD atoms<br />

in QTVR (QuickTime Virtual Reality) movie files may lead to an application crash or<br />

arbitrary code execution. (CVE-2009-0002)\n\n - A heap buffer overflow while processing<br />

an AVI movie file may lead to an application crash or arbitrary code execution.<br />

(CVE-2009-0003)\n\n - A buffer overflow in the handling of MPEG-2 video files with<br />

MP3 audio content may lead to an application crash or arbitrary code execution.<br />

(CVE-2009-0004)\n\n - A memory corruption in QuickTime's handling of H.263 encoded<br />

movie files may lead to an application crash or arbitrary code execution.<br />

(CVE-2009-0005)\n\n - A signedness issue in QuickTime's handling of Cinepak encoded<br />

movie files may result in a heap buffer overflow. (CVE-2009-0006)\n\n - A heap buffer<br />

overflow in QuickTime's handling of JPEG atoms in QuickTime movie files may lead to an<br />

application crash or arbitrary code execution. (CVE-2009-0007)\n\nThe reported version of<br />

Quicktime is: \n %L<br />

Solution: Upgrade to version 7.6 or higher.<br />

CVE-2009-0007<br />

Fujitsu Systemcast Deployment Server Detection<br />

<strong>PVS</strong> ID: 4818 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Fujitsu Systemcast Deployment Server.<br />

Solution: N/A<br />

CVE Not available<br />

OpenX Version Detection<br />

<strong>PVS</strong> ID: 4819 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running OpenX, an open-source ad generator. OpenX integrates<br />

with a web server to auto-generate HTML ads. The reported version is: %L<br />

Solution: N/A<br />

CVE Not available<br />

3COM CellPlex Default Password<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1272


<strong>PVS</strong> ID: 4820 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a 3COM CellPlex server with the default login<br />

and password set ('admin'/'synnet').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

3COM Netbuilder Default Password<br />

<strong>PVS</strong> ID: 4821 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a 3COM Netbuilder server with the default login<br />

and password set ('Root'/'').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Web Server 'admin' Default Password<br />

<strong>PVS</strong> ID: 4822 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a web server with the default login and<br />

password set to NULL/admin\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Web Server 'admin/password' Default Credentials<br />

<strong>PVS</strong> ID: 4823 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a web server with the default login and password<br />

set to admin/password\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

3Com Shark Fin Comcast-supplied Default Password<br />

<strong>PVS</strong> ID: 4824 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1273


Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a 3Com Shark Fin Comcast-supplied server with<br />

the default login and password set ('User'/'Password').\nThe affected web application<br />

is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Web Server 'Administrator/admin' Default Password<br />

<strong>PVS</strong> ID: 4825 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a web server with the default login and password<br />

set to 'Administrator/admin'.\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

3ware Default Password<br />

CVE Not available<br />

<strong>PVS</strong> ID: 4826 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a 3ware web server with the default login and<br />

password set to Administrator/3ware\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

ACCTON Wirelessrouter T-online Default Password<br />

<strong>PVS</strong> ID: 4827 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a ACCTON Wirelessrouter T-online server with<br />

the default login and password set (''/'0').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

ADIC Scalar 100/1000 Default Password<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4828 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1274


Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a ADIC Scalar 100/1000 server with the default<br />

login and password set ('admin'/'secure').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Web Server 'admin/admin' Default Password<br />

<strong>PVS</strong> ID: 4829 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a web server with the default login and password<br />

set to admin/admin\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

APC UPSes (Web/SNMP Mgmt Card) Default Password<br />

<strong>PVS</strong> ID: 4830 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a APC UPSes (Web/SNMP Mgmt Card) server<br />

with the default login and password set ('device'/'device').\nThe affected web application<br />

is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

ASMAX Web Server Default Password<br />

<strong>PVS</strong> ID: 4831 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a ASMAX web server with the<br />

default login and password set to admin/epicrouter\nThe affected web<br />

application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Web Server 'admin/NULL' Default Password<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4832 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1275


Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a web server with the default login and<br />

password set to admin/NULL\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Allied Telesyn AT-8024(GB) Default Password<br />

<strong>PVS</strong> ID: 4833 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Allied Telesyn AT-8024(GB) server with the<br />

default login and password set ('manager'/'admin').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

GigaTribe Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 4834 FAMILY: Web Servers RISK: INFO NESSUS ID:35468<br />

Description: Synopsis :\n\nThe remote web server appears to be used for peer-to-peer file<br />

sharing.\n\nAccording to its banner, the remote web server is from GigaTribe, a private<br />

peer-to-peer file sharing application. The reported version number is: %L<br />

Solution: Ensure that use of this software is compliant with your organization's acceptable use and<br />

security policies.<br />

CVE Not available<br />

Horde < 3.3.3 / 3.2.4 Horde_Image::factory driver Argument Local File Inclusion<br />

<strong>PVS</strong> ID: 4835 FAMILY: CGI RISK: HIGH NESSUS ID:35554<br />

Description: Synopsis : \n\nThe remote web server contains a PHP application that is susceptible to a<br />

local file inclusion attack.\n\nThe version of Horde, Horde Groupware, or Horde<br />

Groupware Webmail Edition installed on the remote host fails to filter input to the 'driver'<br />

argument of the 'Horde_Image: : factory' method before using it to include PHP code in<br />

'lib/Horde/Image.php'. Regardless of PHP's 'register_globals' and 'magic_quotes_gpc'<br />

settings, an unauthenticated attacker can exploit this issue to view arbitrary files or possibly<br />

to execute arbitrary PHP code on the remote host, subject to the privileges of the web<br />

server user ID.\n\n Note that this install is also likely affected by a cross-site scripting issue<br />

in the 'services/portal/cloud_search.php' script. The reported version of Horde is: \n %L<br />

Solution: Upgrade to version 3.3.3 / 3.2.4 or higher.<br />

CVE-2009-0932<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1276


Allied Telesyn AT Router Default Password<br />

<strong>PVS</strong> ID: 4836 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a web server with the default login and password<br />

set to root/NULL\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Allied Telesyn AT-AR130 (U) -10 Default Password<br />

<strong>PVS</strong> ID: 4837 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Allied Telesyn AT-AR130 (U) -10 server with<br />

the default login and password set ('Manager'/'friend').\nThe affected web application<br />

is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Alteon ACEswitch 180e Default Password<br />

<strong>PVS</strong> ID: 4838 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Alteon ACEswitch 180e server with the<br />

default login and password set ('admin'/'linga').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Ambit Default Password<br />

<strong>PVS</strong> ID: 4839 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an Ambit server with the default login and<br />

password set ('root'/'root').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Aspect ACD 6 Default Password<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1277


<strong>PVS</strong> ID: 4840 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Aspect ACD 6 server with the default login<br />

and password set ('customer'/'').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Axis Webcams Default Password<br />

<strong>PVS</strong> ID: 4841 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Axis Webcams server with the default login<br />

and password set ('root'/'pass').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

HTTP NULL User ID and Password<br />

<strong>PVS</strong> ID: 4842 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a web application with the default login and<br />

password set to NULL/NULL\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Blue Coat Systems ProxySG 3.x Default Password<br />

<strong>PVS</strong> ID: 4843 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Blue Coat Systems ProxySG 3.x server with<br />

the default login and password set ('admin'/'articon').\nThe affected web application<br />

is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Cisco Ciso Aironet 1100 Series Rev. 01 Default Password<br />

<strong>PVS</strong> ID: 4844 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1278


Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Cisco Ciso Aironet 1100 series Rev. 01 server<br />

with the default login and password set (''/'Cisco').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Cisco Aironet 1200 Default Password<br />

<strong>PVS</strong> ID: 4845 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Cisco Aironet 1200 server with the default<br />

login and password set ('root'/'Cisco').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Conexant Router Default Password<br />

<strong>PVS</strong> ID: 4846 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Conexant Router server with the default login<br />

and password set (''/'epicrouter').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Coppermine < 1.4.20 'img_dir' Arbitrary File Upload<br />

<strong>PVS</strong> ID: 4847 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a file upload vulnerability.\n\nThe remote<br />

host is running Coppermine version: \n %L \n\nThis version of Coppermine is vulnerable to<br />

a file upload vulnerability due to a flaw in the way that the program parses data sent to the<br />

'img_dir' parameter of the 'picEditor.php' script. An attacker exploiting this flaw would be<br />

able to upload arbitrary files to the 'album' subdirectory.<br />

Solution: Upgrade to version 1.4.20 or higher.<br />

CVE Not available<br />

Cyclades TS800 Default Password<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4848 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1279


Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Cyclades TS800 server with the default login<br />

and password set ('root'/'tslinux').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

D-Link DI-614+ Default Password<br />

<strong>PVS</strong> ID: 4849 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a D-Link server with the default login and<br />

password set to user/NULL\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

D-Link DI-624 All Default Password<br />

<strong>PVS</strong> ID: 4850 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a D-Link DI-624 all server with the default login<br />

and password set ('User'/'').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Deerfield MDaemon Default Password<br />

<strong>PVS</strong> ID: 4851 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Deerfield MDaemon server with the default<br />

login and password set ('MDaemon'/'MServer').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Dell Remote Access Card Default Password<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4852 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1280


Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Dell Remote Access Card server with the<br />

default login and password set ('root'/'calvin').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Deutsch Telekomm T-Sinus 130 DSL Default Password<br />

<strong>PVS</strong> ID: 4853 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Deutsch Telekomm DSL server with the<br />

default login and password set to NULL/0000\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Enterasys ANG-1105 Unknown Default Password<br />

<strong>PVS</strong> ID: 4854 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Enterasys ANG-1105 server with the default<br />

login and password set ('admin'/'netadmin').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Ericsson BP250 Default Password<br />

<strong>PVS</strong> ID: 4855 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Ericsson BP250 server with the default login<br />

and password set ('admin'/'default').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Fujitsu Siemens Routers Default Password<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4856 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1281


Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Fujitsu Siemens Router with the default login<br />

and password set (''/'connect').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Hewlett-Packard webmin 0.84 Default Password<br />

<strong>PVS</strong> ID: 4857 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Hewlett-Packard webmin 0.84 server with the<br />

default login and password set ('admin'/'hp.com').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

IBM Directory - Web Administration Tool 5.1 Default Password<br />

<strong>PVS</strong> ID: 4858 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a IBM Directory - Web Administration Tool 5.1<br />

server with the default login and password set ('superadmin'/'secret').\nThe affected web<br />

application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

IBM 3583 Tape Library Default Password<br />

<strong>PVS</strong> ID: 4859 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a IBM 3583 Tape Library server with the default<br />

login and password set ('admin'/'secure').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

IBM Web Server Default Password<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4860 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1282


Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a IBM server with the default login and<br />

password set to USERID/PASSWORD\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Infosmart SOHO Router Default Password<br />

<strong>PVS</strong> ID: 4861 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Infosmart SOHO router with the default login<br />

and password set ('admin'/'0000').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Intel Wireless Gateway 3.x Default Password<br />

<strong>PVS</strong> ID: 4862 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Intel Wireless Gateway 3.x server with the<br />

default login and password set ('intel'/'intel').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Intershop Intershop 4 Default Password<br />

<strong>PVS</strong> ID: 4863 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Intershop Intershop 4 server with the default<br />

login and password set ('operator'/'$chwarzepumpe').\nThe affected web application<br />

is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Irongate NetSurvibox 266 1 Default Password<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4864 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1283


Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Irongate NetSurvibox 266 1 server with the<br />

default login and password set ('admin'/'NetSurvibox').\nThe affected web application<br />

is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Konica Minolta Magicolor 5430 DL Default Password<br />

<strong>PVS</strong> ID: 4865 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Konica Minolta Magicolor 5430 DL with the<br />

default login and password set ('admin'/'administrator').\nThe affected web application<br />

is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Konica/ Minolta Di 2010f n/a Default Password<br />

<strong>PVS</strong> ID: 4866 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Konica/ Minolta Di 2010f n/a server with the<br />

default login and password set (''/'00000000').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Kyocera EcoLink 7.2 Default Password<br />

<strong>PVS</strong> ID: 4867 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Kyocera EcoLink 7.2 server with the default<br />

login and password set (''/'PASSWORD').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Linksys Comcast Comcast-supplied Default Password<br />

<strong>PVS</strong> ID: 4868 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1284


Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Linksys Comcast Comcast-supplied server<br />

with the default login and password set ('comcast'/'1234').\nThe affected web application<br />

is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Linksys/ Cisco RTP300 w/2 Phone Ports 1.0 Default Password<br />

<strong>PVS</strong> ID: 4869 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Linksys/ Cisco RTP300 w/2 Phone Ports 1.0<br />

server with the default login and password set ('user'/'tivonpw').\nThe affected web<br />

application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Minolta PagrPro QMS 4100GN PagePro Default Password<br />

<strong>PVS</strong> ID: 4870 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Minolta PagrPro QMS 4100GN PagePro<br />

server with the default login and password set (''/'sysadm').\nThe affected web application<br />

is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Minolta QMS Magicolor 3100 3.0.0 Default Password<br />

<strong>PVS</strong> ID: 4871 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Minolta QMS Magicolor 3100 3.0.0 server<br />

with the default login and password set ('operator'/'').\nThe affected web application<br />

is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Mitel 3300 ICP All Default Password<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4872 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1285


Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a web server with the default login and password<br />

set to system/password\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Motorola Default Password<br />

<strong>PVS</strong> ID: 4873 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Motorola web server with the default login and<br />

password set to admin/motorola\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

NGSec NGSecureWeb Default Password<br />

<strong>PVS</strong> ID: 4874 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a NGSec NGSecureWeb server with<br />

the default login and password set ('admin'/'asd').\nThe affected web application<br />

is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

NRG or RICOH DSc338 Printer 1.19 Default Password<br />

<strong>PVS</strong> ID: 4875 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a web server with the default login and password<br />

set to NULL/password\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

NETGEAR Comcast Comcast-supplied Default Password<br />

<strong>PVS</strong> ID: 4876 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1286


Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a NETGEAR Comcast Comcast-supplied server<br />

with the default login and password set ('comcast'/'1234').\nThe affected web application<br />

is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

NetGenesis NetAnalysis Web Reporting Default Password<br />

<strong>PVS</strong> ID: 4877 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a NetGenesis NetAnalysis Web Reporting server<br />

with the default login and password set ('naadmin'/'naadmin').\nThe affected web<br />

application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

NETGEAR WG602 Firmware Version 1.04.0 Default Password<br />

<strong>PVS</strong> ID: 4878 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a NETGEAR server with the default login and<br />

password set ('super'/'5777364').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

NETGEAR WG602 Firmware Version 1.7.14 Default Password<br />

<strong>PVS</strong> ID: 4879 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a NETGEAR WG602 Firmware Version 1.7.14<br />

with the default login and password set ('superman'/'21241036').\nThe affected web<br />

application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>Network</strong> Associates WebShield <strong>Security</strong> Appliance e500 Default Password<br />

<strong>PVS</strong> ID: 4880 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1287


Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a <strong>Network</strong> Associates WebShield <strong>Security</strong><br />

Appliance e500 server with the default login and password set<br />

('e500'/'e500changeme').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

<strong>Network</strong> Associates WebShield <strong>Security</strong> Appliance e250 Default Password<br />

<strong>PVS</strong> ID: 4881 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a <strong>Network</strong> Associates WebShield <strong>Security</strong><br />

Appliance e250 server with the default login and password set<br />

('e250'/'e250changeme').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Nortel Contivity Extranet/VPN Switches Default Password<br />

<strong>PVS</strong> ID: 4882 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Nortel Contivity Extranet/VPN switch with the<br />

default login and password set ('admin'/'setup').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Nortel Business Communications Manager 3.5 / 3.6 Default Password<br />

<strong>PVS</strong> ID: 4883 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Nortel Business Communications Manager 3.5<br />

/ 3.6 server with the default login and password set ('supervisor'/'PlsChgMe').\nThe affected<br />

web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

OKI C5700 Default Password<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4884 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1288


Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a OKI C5700 server with the default login and<br />

password set ('root'/'the 6 last digit of the MAC adress').\nThe affected web application<br />

is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Openwave WAP Gateway Any Default Password<br />

<strong>PVS</strong> ID: 4885 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Openwave WAP Gateway Any server with the<br />

default login and password set ('sys'/'uplink').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Openwave MSP Any Default Password<br />

<strong>PVS</strong> ID: 4886 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Openwave MSP Any server with the default<br />

login and password set ('cac_admin'/'cacadmin').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Pirelli Pirelli AGE-SB Default Password<br />

<strong>PVS</strong> ID: 4887 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Pirelli Pirelli AGE-SB server with the default<br />

login and password set ('admin'/'smallbusiness').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Polycom Soundpoint VoIP Phones Default Password<br />

<strong>PVS</strong> ID: 4888 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1289


Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Polycom Soundpoint VoIP phones server with<br />

the default login and password set ('Polycom'/'SpIp').\nThe affected web application<br />

is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Psion Teklogix 9150 Default Password<br />

<strong>PVS</strong> ID: 4889 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Psion Teklogix 9150 server with the default<br />

login and password set ('support'/'h179350').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

RedHat 6.2 Default Password<br />

<strong>PVS</strong> ID: 4890 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a RedHat 6.2 server with the default<br />

login and password set ('piranha'/'q').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

RedHat 6.2 Default Password<br />

<strong>PVS</strong> ID: 4891 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a RedHat 6.2 server with the default login and<br />

password set ('piranha'/'piranha').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Ricoh AP410N 1.13 Default Password<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4892 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1290


Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Ricoh AP410N 1.13 server with the default<br />

login and password set ('admin'/'').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

SMC Default Password<br />

CVE Not available<br />

<strong>PVS</strong> ID: 4893 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a SMC web server with the default login and<br />

password set to NULL/smcadmin\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

SMC 7401BRA 1 Default Password<br />

<strong>PVS</strong> ID: 4894 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a SMC 7401BRA 1 server with the default login<br />

and password set ('admin'/'barricade').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

SMC 7401BRA 2 Default Password<br />

<strong>PVS</strong> ID: 4895 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a SMC 7401BRA 2 server with the default login<br />

and password set ('smc'/'smcadmin').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

SMC Barricade7204BRB Default Password<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4896 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1291


Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a SMC Barricade7204BRB server with the<br />

default login and password set ('admin'/'smcadmin').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

SMC Modem/Router Default Password<br />

<strong>PVS</strong> ID: 4897 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a SMC Modem/Router server with the default<br />

login and password set ('cusadmin'/'highspeed').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

SOPHIA (Schweiz) AG Protector Default Password<br />

<strong>PVS</strong> ID: 4898 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a SOPHIA (Schweiz) AG Protector server with<br />

the default login and password set ('admin'/'Protector').\nThe affected web application<br />

is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Samsung MagicLAN SWL-3500RG 2.15 Default Password<br />

<strong>PVS</strong> ID: 4899 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Samsung MagicLAN SWL-3500RG 2.15<br />

server with the default login and password set ('public'/'public').\nThe affected web<br />

application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Scientific Atlanta DPX2100 Comcast-supplied Default Password<br />

<strong>PVS</strong> ID: 4900 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1292


Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Scientific Atlanta DPX2100 Comcast-supplied<br />

server with the default login and password set ('admin'/'w2402').\nThe affected web<br />

application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Sharp AR-M355N Default Password<br />

<strong>PVS</strong> ID: 4901 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Sharp AR-M355N server with the<br />

default login and password set ('admin'/'Sharp').\nThe affected web application<br />

is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Siemens SpeedStream 4100 Default Password<br />

<strong>PVS</strong> ID: 4902 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Siemens SpeedStream 4100 with the default<br />

login and password set ('admin'/'hagpolm1').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Sun Microsystems ILOM of X4100 1.0 Default Password<br />

<strong>PVS</strong> ID: 4903 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Sun Microsystems ILOM of X4100 1.0 server<br />

with the default login and password set ('root'/'changeme').\nThe affected web application<br />

is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Sybase EAServer Default Password<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4904 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1293


Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Sybase EAServer server with the default login<br />

and password set ('jagadmin'/'').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Symbol Spectrum Series 4100-4121 Default Password<br />

<strong>PVS</strong> ID: 4905 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Symbol Spectrum series 4100-4121 server<br />

with the default login and password set (''/'Symbol').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Symbol CB3000 A1 Default Password<br />

<strong>PVS</strong> ID: 4906 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Symbol CB3000 A1 server with the default<br />

login and password set ('admin'/'symbol').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

'Administrator' NULL Password<br />

<strong>PVS</strong> ID: 4907 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a web server with the default login and password<br />

set to Administrator/NULL\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

US ROBOTICS ADSL Ethernet Modem Default Password<br />

<strong>PVS</strong> ID: 4908 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1294


Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a US ROBOTICS ADSL Ethernet Modem with<br />

the default login and password set (''/'12345').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

X-Micro X-Micro WLAN 11b Broadband Router 1.6.0.1 Default Password<br />

<strong>PVS</strong> ID: 4909 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a X-Micro X-Micro WLAN 11b Broadband<br />

Router 1.6.0.1 with the default login and password set ('1502'/'1502').\nThe affected web<br />

application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Xerox DocuCentre 425 Default Password<br />

<strong>PVS</strong> ID: 4910 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Xerox DocuCentre 425 with the default login<br />

and password set ('admin'/'22222').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Xerox 240a Default Password<br />

<strong>PVS</strong> ID: 4911 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Xerox 240a server with the default login and<br />

password set ('admin'/'x-admin').\nThe affected web application is:\n%P \<br />

Solution: Change default passwords.<br />

CVE Not available<br />

ZyXEL Prestige Default Password<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4912 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1295


Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a ZyXEL Prestige server with the default login<br />

and password set (''/'1234').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

apc Smartups 3000 Default Password<br />

<strong>PVS</strong> ID: 4913 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an apc Smartups 3000 server with the default<br />

login and password set ('apc'/'apc').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

iPSTAR iPSTAR Satellite Router/Radio v2 Default Password<br />

<strong>PVS</strong> ID: 4914 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a iPSTAR iPSTAR Satellite Router/Radio v2<br />

server with the default login and password set ('admin'/'operator').\nThe affected web<br />

application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

iPSTAR iPSTAR <strong>Network</strong> Box v.2+ Default Password<br />

<strong>PVS</strong> ID: 4915 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a iPSTAR iPSTAR <strong>Network</strong> Box v.2+ server<br />

with the default login and password set ('admin'/'operator').\nThe affected web application<br />

is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

ihoi oihoh lknlkn Default Password<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4916 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1296


Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a ihoi oihoh lknlkn server with the default login<br />

and password set ('Administrator'/'pilou').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

longshine isscfg Default Password<br />

<strong>PVS</strong> ID: 4917 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a longshine isscfg server with the default login<br />

and password set ('admin'/'0').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

medion Routers Default Password<br />

<strong>PVS</strong> ID: 4918 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a medion Router with the default login and<br />

password set (''/'medion').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Real<strong>Network</strong>s Helix Server < 11.1.8 / 12.0.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4919 FAMILY: Web Servers RISK: HIGH NESSUS ID:35555<br />

Description: Synopsis : \n\nThe remote media streaming server is affected by multiple<br />

vulnerabilities.\n\nThe remote host is running a version of Real<strong>Network</strong>s Helix Server<br />

older than 11.1.8 / 12.0.1. Such versions are reportedly affected by multiple issues : \n\n - A<br />

vulnerability involving an RTSP 'DESCRIBE' request could allow an unauthenticated<br />

attacker to execute arbitrary code on the remote system. (ZDI-CAN-293)\n\n - By sending<br />

three specially crafted RTSP 'SETUP' requests it may be possible to crash the remote RTSP<br />

server. (ZDI-CAN-323)\n\n - A heap overflow vulnerability in 'DataConvertBuffer' could<br />

allow an unauthenticated attacker to execute arbitrary code on the remote system.<br />

(ZDI-CAN-333)\n\n - A heap overflow vulnerability in NTLM authentication could allow<br />

an unauthenticated attacker to execute arbitrary code on the remote system.<br />

(ZDI-CAN-380)\n\nThe reported version of Helix Server is: \n %L<br />

Solution: Update to version 11.1.8 / 12.0.1 or higher.<br />

Family Internet Services 1297


CVE-2008-5911<br />

Google Chrome < 1.0.154.46 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4920 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:35558<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is affected by multiple<br />

vulnerabilities.\n\nThe version of Google Chrome installed on the remote host is earlier<br />

than 1.0.154.46. Such versions are reportedly affected by several issues : \n\n - Cross-site<br />

scripting vulnerabilities in the Adobe Reader Plugin itself could be leveraged using a PDF<br />

document to run scripts on arbitrary sites via Google Chrome. (CVE-2007-0048 and<br />

CVE-2007-0045)\n\n - A cross-domain security bypass vulnerability that could allow an<br />

attacker to bypass the same-origin policy and gain access to potentially sensitive<br />

information. (CVE-2009-0276)\n\nThe reported version of Google Chrome is: \n %L<br />

Solution: Upgrade to version 1.0.154.46 or higher.<br />

CVE-2009-0411<br />

Bugzilla < 3.2.1/3.3.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4921 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors\n\nThe remote<br />

Bugzilla software is vulnerable to several flaws. First, valid users can post content in<br />

HTML or JavaScript. Given this, other users viewing the content may have malicious code<br />

executed within their browser. Second, the 'process_bug.cgi' script is vulnerable to a<br />

cross-site request forgery (CSRF) flaw. An attacker exploiting this flaw would need to be<br />

able to entice a valid user into clicking a link or opening a malicious HTML email.<br />

Successful exploitation would result in the attacker executing commands with the<br />

permissions of the valid user account. The reported version of Bugzilla is: \n %L \n<br />

Solution: Upgrade to version 3.2.1, 3.3.2 or higher.<br />

CVE-2009-0485<br />

Firefox < 3.0.6 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4922 FAMILY: Web Clients RISK: HIGH NESSUS ID:35581<br />

Description: Synopsis : \n\nThe remote Windows host contains a web browser that is affected by<br />

multiple vulnerabilities.\n\nThe installed version of Firefox is earlier than 3.0.6. Such<br />

versions are potentially affected by the following security issues : \n\n - There are several<br />

stability bugs in the browser engine that may lead to crashes with evidence of memory<br />

corruption. (MFSA 2009-01)\n\n - A chrome XBL method can be used in conjunction with<br />

'window.eval' to execute arbitrary JavaScript within the context of another website,<br />

violating the same origin policy. (MFSA 2009-02)\n\n - A form input control's type could<br />

be changed during the restoration of a closed tab to the path of a local file whose location<br />

was known to the attacker. (MFSA 2009-03)\n\n - An attacker may be able to inject<br />

Family Internet Services 1298


arbitrary code into a chrome document and then execute it with chrome privileges if he can<br />

trick a user into downloading a malicious HTML file and a .desktop shortcut file. (MFSA<br />

2009-04)\n\n - Cookies marked HTTPOnly are readable by JavaScript via the<br />

'XMLHttpRequest.getResponseHeader' and 'XMLHttpRequest.getAllResponseHeaders'<br />

APIs. (MFSA 2009-05)\n\n - The 'Cache-Control: no-store' and 'Cache-Control: no-cache'<br />

HTTP directives for HTTPS pages are ignored by Firefox 3, which could lead to exposure<br />

of sensitive information. (MFSA 2009-06).\n\nThe reported version of Firefox is: \n %L<br />

Solution: Upgrade to version 3.0.6 or higher.<br />

CVE-2009-0358<br />

Squid < 2.7.STABLE6 / 3.0.STABLE13 / 3.1.0.5 HTTP Version Numbers DoS<br />

<strong>PVS</strong> ID: 4923 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:35620<br />

Description: Synopsis : \n\nThe remote proxy server is susceptible to a denial of service attack.\n\nThe<br />

version of the Squid proxy caching server installed on the remote host may abort when<br />

parsing requests with an invalid HTTP version. A remote attacker may be able to leverage<br />

this issue to crash the application, thereby denying service to legitimate users.\n\nNote that<br />

successful exploitation of this issue requires that Squid was not built with the 'NODEBUG'<br />

define.\nThe reported version of Squid is: \n %L<br />

Solution: Either apply the appropriate patches referenced in the project's advisory above or upgrade<br />

to version 2.7.STABLE6 / 3.0.STABLE13 / 3.1.0.5 or higher.<br />

CVE-2009-0478<br />

Moodle < 1.9.4 / 1.8.8 / 1.7.7 / 1.6.9 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4924 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

Moodle installed on the remote host is vulnerable to a number of flaws. First, the server is<br />

vulnerable to a cross-site scripting (XSS) flaw. An attacker exploiting this flaw would be<br />

able to execute arbitrary code within the browser of unsuspecting users. The remote host is<br />

vulnerable to a cross-site request forgery (CSRF) flaw that could allow remote users to<br />

execute commands on the behalf of logged in users. Finally, there are several 'information<br />

disclosure' flaws that may allow an attacker the ability to gain access to confidential data.<br />

The reported version of Moodle is: \n %L \n<br />

Solution: Upgrade to version 1.6.9, 1.7.7, 1.8.8, 1.9.4 or higher.<br />

CVE Not available<br />

Openfire < 3.6.3 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4925 FAMILY: CGI NESSUS ID:35628<br />

Family Internet Services 1299


RISK:<br />

MEDIUM<br />

Description: Synopsis : \n\nThe remote host contains an application that is affected by multiple<br />

vulnerabilities.\n\nThe remote host is running Openfire / Wildfire, an instant messaging<br />

server supporting the XMPP protocol. According to its version, the installation of Openfire<br />

or Wildfire is affected by multiple vulnerabilities : \n\n - Multiple .jsp scripts namely,<br />

'logviewer.jsp' (BID 32935), 'group-summary.jsp' (BID 32937), 'user-properties.jsp' (BID<br />

32938), 'audit-policy.jsp' (BID 32939) and 'log.jsp' (BID 32940) fail to sanitize input<br />

supplied by authorized users, and hence are affected by cross-site scripting<br />

vulnerabilities.\n\n - Provided an administrator's browser session is allowed to execute<br />

arbitrary JavaScript and an attacker has managed to steal session cookies, it may be<br />

possible for an attacker to execute arbitrary code on the remote system by uploading a new<br />

server plugin.\n\n - Pages 'security-audit-viewer.jsp', 'server-properties.js' (BID 32943) and<br />

'muc-room-summary.jsp' (BID 32944) are affected by a stored cross-site scripting<br />

vulnerabilities. (BID 32943)\n\n - log.jsp fails to sanitize input passed to the 'log' parameter<br />

by an authorized user, and hence it may be possible for an authenticated attacker to read<br />

arbitrary .log files. (BID 32945).\n\nThe reported version of Openfire is: \n %L<br />

Solution: Upgrade to version 3.6.3 or higher.<br />

CVE-2009-0497<br />

Microsoft SQL Server Version Detection<br />

<strong>PVS</strong> ID: 4926 FAMILY: Database RISK: INFO NESSUS ID:10674<br />

Description: The remote host is running Microsoft SQL Server. The information returned from the<br />

server includes the currently installed version. The information observed was: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Vulnerability in Microsoft SQL Server Could Allow Remote Code Execution (959420)<br />

<strong>PVS</strong> ID: 4927 FAMILY: Database RISK: HIGH NESSUS ID:35635<br />

Description: Synopsis : \n\nArbitrary code can be executed on the remote host through SQL<br />

Server.\n\nThe remote host is running a version of Microsoft SQL Server, Desktop Engine<br />

or Internal Database that suffers from an authenticated remote code execution vulnerability<br />

in the MSSQL extended stored procedure 'sp_replwritetovarbin' due to an invalid parameter<br />

check. Successful exploitation could allow an attacker to take complete control of the<br />

affected system.\n\nThe observed data (to include a version number) passed from the SQL<br />

server was: \n %L \nIAVA Reference : 2009-A-0012\nSTIG Finding Severity : Category I<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2008-5416<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1300


TrendMicro Interscan Web <strong>Security</strong> Suite (IWSS) Default Password<br />

<strong>PVS</strong> ID: 4928 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a TrendMicro Interscan Web <strong>Security</strong> Suite<br />

server with the default login and password set ('admin/adminIWSS85').\nThe affected web<br />

application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

IBM WebSphere Application Server 6.1 < Fix Pack 21 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4929 FAMILY: Web Servers RISK: HIGH NESSUS ID:35659<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nIBM WebSphere<br />

Application Server 6.1 before Fix Pack 21 appears to be running on the remote host. Such<br />

versions are reportedly affected by multiple flaws :\n\n - Provided Performance Monitoring<br />

Infrastructure (PMI) is\n enabled. It may be possible for a local attacker to\n obtain<br />

sensitive information through 'Systemout.log' and\n 'ffdc' files which are written by<br />

PerfServlet.\n - SSL Configuration settings attribute '<strong>Security</strong> Level' \n does not correctly<br />

enforce the level of encryption used\n by the application server. (PK63182)<br />

Solution: Apply Fix Pack 21 (6.1.0.21) or higher.<br />

CVE-2009-0434<br />

ProFTPD Username Variable Substitution SQL Injection<br />

<strong>PVS</strong> ID: 4930 FAMILY: FTP Servers RISK: HIGH NESSUS ID:35690<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is using ProFTPD, a free FTP server for Unix and Linux. The version of ProFTPD running<br />

on the remote host allows the percent character, '%', within the username. This would allow<br />

attackers to inject special SQL characters such as a single quote. An attacker exploiting this<br />

flaw would be able to execute arbitrary SQL commands against the database server. The<br />

reported version of ProFTPD is: \n %L \n<br />

Solution: Upgrade to version 1.3.2rc3 or higher.<br />

CVE-2009-0542<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Media Gateway Control Protocol (MGCP) Server Detection<br />

<strong>PVS</strong> ID: 4931 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Media Gateway Control Protocol (MGCP) server. An MGCP server is<br />

used to create and manage media sessions between multiple clients over multiple protocols.<br />

In particular, it is commonly used with Voice-Over-IP (VoIP) services.<br />

Family Internet Services 1301


Solution: Ensure that such services are authorized.<br />

CVE Not available<br />

Safari < 3.2.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4932 FAMILY: Web Clients RISK: HIGH NESSUS ID:35687<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nThe version of Safari installed on the remote Windows host is earlier than 3.2.2.<br />

Such versions reportedly have multiple vulnerabilities : \n\n - Multiple input validation<br />

issues in their handling of 'feed: ' URLs, which could be abused to execute arbitrary<br />

JavaScript code in the local security zone. (CVE-2009-0137)\n\n - A cached certificate is<br />

not required before displaying a lock icon for a HTTPS web site. This allows a<br />

man-in-the-middle attacker to present the user with spoofed web pages over HTTPS that<br />

appear to be from a legitimate source. (CVE-2009-2072)\n\n - The browser processes a<br />

3xxx HTTP CONNECT before a successful SSL handshake, which could allow a<br />

man-in-the-midddle attacker to execute arbitrary script code in the context of a HTTPS site.<br />

(CVE-2009-2062)\n\nThe reported version of Safari is: \n %L<br />

Solution: Upgrade to version 3.2.2 or higher.<br />

CVE-2009-2072<br />

Media Gateway Control Protocol (MGCP) Client Detection<br />

<strong>PVS</strong> ID: 4933 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Media Gateway Control Protocol (MGCP) client. An MGCP client is<br />

used to create sessions with an MGCP server. In particular, it is commonly used with<br />

Voice-Over-IP (VoIP) services.<br />

Solution: Ensure that such services are authorized.<br />

CVE Not available<br />

Sun Java System Directory Server 6.x < 6.3.1 LDAP JDBC Backend DoS<br />

<strong>PVS</strong> ID: 4934 FAMILY: Generic RISK: HIGH NESSUS ID:35688<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running the Sun Java System Directory Server, an LDAP server from Sun<br />

Microsystems. The reported version number was: \n %L \n\n The installed version is older<br />

than 6.3.1, and the proxy server included with such versions is reportedly affected by a<br />

denial of service vulnerability. By sending a specially crafted request to the JDBC backend<br />

through the proxy server, an unauthenticated remote attacker may be able to trigger a denial<br />

of service condition.<br />

Solution: Upgrade to version 6.3.1 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1302


CVE-2009-0609<br />

Google Chrome < 1.0.154.48 Cross-browser Command Injection<br />

<strong>PVS</strong> ID: 4935 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:35689<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is prone to a cross-browser<br />

scripting attack.\n\nThe version of Google Chrome installed on the remote host is earlier<br />

than 1.0.154.48. Such versions are reportedly affected by a protocol-handler command<br />

injection vulnerability that could allow an attacker to carry out cross-browser scripting<br />

attacks.<br />

Solution: Upgrade to version 1.0.154.48 or higher.<br />

CVE-2007-3670<br />

Dropbox Software Detection<br />

<strong>PVS</strong> ID: 4936 FAMILY: Internet Services RISK: INFO NESSUS ID:35717<br />

Description: Dropbox is installed on the remote host. Dropbox is an application for storing and<br />

synchronizing files between computers, possibly outside the organization.<br />

Solution: Remove this software if its use does not match your organization's security policy.<br />

CVE Not available<br />

Flash Player APSB09-01 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4937 FAMILY: Web Clients RISK: HIGH NESSUS ID:35742<br />

Description: Synopsis :\n\nThe remote Windows host contains a browser plugin that is affected by<br />

multiple vulnerabilities.\n\nThe remote Windows host contains a version of Adobe Flash<br />

Player that is earlier than 10.0.22.87 / 9.0.159.0. Such versions are reportedly affected by<br />

multiple vulnerabilities : \n\n - A buffer overflow issue that could allow an attacker to<br />

execute arbitrary code with the privileges of the user running the application.<br />

(CVE-2009-0520) \n\n - An input validation vulnerability that leads to a denial of service<br />

attack and could possibly allow for an attacker to execute arbitrary code. (CVE-2009-0519)<br />

\n\n - A vulnerability in the Flash Player settings manager that could contribute to a<br />

clickjacking attack. (CVE-2009-0014)\n\n - A vulnerability with the mouse pointer display<br />

that could contribute to a clickjacking attack. (CVE-2009-0522)<br />

Solution: Upgrade to version 10.0.22.87 or higher. If you are unable to upgrade to version 10,<br />

upgrade to version 9.0.159.0 or higher.<br />

CVE-2009-0522<br />

Novell GroupWise MTA Web Console Accessible<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1303


<strong>PVS</strong> ID: 4938 FAMILY: CGI RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server is a Novell GroupWise MTA Web Console, used to monitor and<br />

potentially control a GroupWise MTA via a web browser. The application can be accessed<br />

via the following URI:\n%P<br />

Solution: Ensure that the application only allows authenticated users.<br />

CVE Not available<br />

SMPP Peer-to-Peer Client Detection<br />

<strong>PVS</strong> ID: 4939 FAMILY: Peer-To-Peer File Sharing RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a short message peer-to-peer (SMPP) client application. This<br />

protocol is used to transfer short messages between hosts.<br />

Solution: N/A<br />

CVE Not available<br />

SMPP Peer-to-Peer Server Detection<br />

<strong>PVS</strong> ID: 4940 FAMILY: Peer-To-Peer File Sharing RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a short message peer-to-peer (SMPP) server application. This<br />

protocol is used to transfer short messages between hosts.<br />

Solution: N/A<br />

CVE Not available<br />

Manolito Peer-to-Peer Client Detection<br />

<strong>PVS</strong> ID: 4941 FAMILY: Peer-To-Peer File Sharing RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a Manolito peer-to-peer (or MP2P) client application. Manolito<br />

is a proprietary peer-to-peer file sharing protocol that can be used to share or download<br />

files. The actual client application and version is: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Manolito Peer-to-Peer Server Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4942 FAMILY: Peer-To-Peer File Sharing RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a Manolito peer-to-peer (or MP2P) server application. Manolito<br />

is a proprietary peer-to-peer file sharing protocol that can be used to share or download<br />

files. The server software and version is: \n %L<br />

Family Internet Services 1304


Solution: N/A<br />

CVE Not available<br />

PHP < 5.2.9 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4943 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:35750<br />

Description: Synopsis :\n\nThe remote web server uses a version of PHP that is affected by multiple<br />

flaws.\n\nAccording to its banner, the version of PHP installed on the remote host is older<br />

than 5.2.9. Such versions may be affected by several security issues :\n\n - Background<br />

color is not correctly validated with a non-true color image in function 'imagerotate()'.<br />

(CVE-2008-5498)\n\n - A denial of service condition can be triggered by trying to extract<br />

zip files that contain files with relative paths in file or directory names.\n\n - Function<br />

'explode()' is affected by an unspecified vulnerability.\n\n - It may be possible to trigger a<br />

segfault by passing a specially crafted string to function 'json_decode()'.\n\n - Function<br />

'xml_error_string()' is affected by a flaw that results in messages being off by one." );<br />

Solution: Upgrade to version 5.2.9 or higher.<br />

CVE-2008-5498<br />

eDirectory < 8.8 SP3 FTF3 iMonitor Crafted HTTP Request Overflow<br />

<strong>PVS</strong> ID: 4944 FAMILY: Generic RISK: HIGH NESSUS ID:35760<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running eDirectory, a directory service software from Novell. The iMonitor component<br />

included with the installed version is affected by a buffer overflow vulnerability. By<br />

sending a specially crafted HTTP request to the iMonitor component with a malformed<br />

'Accept-Language' header, it may be possible for a remote attacker to execute arbitrary<br />

code on the remote system. \n\nNOTE: The iMonitor service is an optional package. <strong>PVS</strong><br />

has determined this vulnerability by looking at the vendor version number within LDAP<br />

queries. Given this, if the iMonitor service is not running, then the system is not vulnerable.<br />

The reported version of eDirectory was: %L<br />

Solution: Upgrade to version 8.8 SP3 with FTF3 or higher.<br />

CVE Not available<br />

Opera < 9.64 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4945 FAMILY: Web Clients RISK: HIGH NESSUS ID:35761<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

Opera installed on the remote host is earlier than 9.64 and is reportedly affected by multiple<br />

issues :\n\n - A memory corruption vulnerability when processing specially crafted JPEG<br />

files could allow an attacker to execute arbitrary code with the privileges of the affected<br />

application. (926)\n\n - It may be possible for certain plugins to execute arbitrary code in<br />

Family Internet Services 1305


the context of a different domain. An attacker could exploit this to steal authentication<br />

credentials as well as carry out other attacks. \n\n - A denial of service issue when the<br />

application handles a maliciously crafted web page containing 'HTMLSelectElement'<br />

object with a large length attribute.<br />

Solution: Upgrade to version 9.64 or higher.<br />

CVE-2009-0916<br />

MySQL Community Server 5.1 < 5.1.32 XPath Expression DoS<br />

<strong>PVS</strong> ID: 4946 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:35766<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

version of MySQL 5.1 installed on the remote host is earlier than 5.1.32 and is affected by<br />

a denial of service vulnerability. Specifically, a user can cause an assertion failure leading<br />

to a server crash by calling 'ExtractValue()' or 'UpdateXML()' using an XPath expression<br />

employing a scalar expression as a 'FilterExpr'. The reported version of MySQL is: \n %L<br />

Solution: Upgrade to version 5.1.32 or higher.<br />

CVE-2009-0819<br />

Microsoft Office .docx File Detection<br />

<strong>PVS</strong> ID: 4947 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server is hosting .docx files. These are Microsoft Office 2007<br />

document files. As an example, consider the following file %P\nThe webmaster<br />

should make sure that they do not contain confidential data.<br />

Solution: N/A<br />

CVE Not available<br />

Microsoft Office .xlsx Files Detection<br />

<strong>PVS</strong> ID: 4948 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server is hosting .xlsx files. These are Microsoft Office 2007<br />

document files. As an example, consider the following file %P\nThe webmaster<br />

should make sure that they do not contain confidential data.<br />

Solution: N/A<br />

CVE Not available<br />

Microsoft Office .pptx Files Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4949 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1306


Description: The remote web server is hosting .pptx files. These are Microsoft Office 2007<br />

document files. As an example, consider the following file %P\nThe webmaster<br />

should make sure that they do not contain confidential data.<br />

Solution: N/A<br />

CVE Not available<br />

Firefox < 3.0.7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4950 FAMILY: Web Clients RISK: HIGH NESSUS ID:35778<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe installed<br />

version of Firefox is earlier than 3.0.7. Such versions are potentially affected by the<br />

following security issues : \n\n - By exploiting stability bugs in the browser engine, it might<br />

be possible for an attacker to execute arbitrary code on the remote system under certain<br />

conditions. (MFSA 2009-07)\n\n - A vulnerability in Mozilla's garbage collection process<br />

could be exploited to run arbitrary code on the remote system. (MFSA 2009-08)\n\n - It<br />

may be possible for a website to read arbitrary XML data from another domain by using<br />

nsIRDFService and a cross-domain redirect. (MFSA 2009-09)\n\n - Vulnerabilities in the<br />

PNG libraries used by Mozilla could be exploited to execute arbitrary code on the remote<br />

system. (MFSA 2009-10)\n\n - Certain invisible characters are decoded before being<br />

displayed on the location bar. An attacker may be able to exploit this flaw to spoof the<br />

location bar and display a link to a malicious URL. (MFSA 2009-11).\n\nThe reported<br />

version of Firefox is: \n %L<br />

Solution: Upgrade to version 3.0.7 or higher.<br />

CVE-2009-0777<br />

ZABBIX < 1.6.3 Web Interface locales.php extlang[] Remote Code Execution<br />

<strong>PVS</strong> ID: 4951 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:35787<br />

Description: Synopsis : \n\nThe remote host contains a PHP application that is prone to a remote<br />

command execution attack.\n\nThe remote host is running a version of the ZABBIX web<br />

interface that is affected by a remote code execution vulnerability. The vulnerability exists<br />

in the 'extlang[]' parameter of the 'locales.php' script. Provided PHP's 'magic_quotes_gpc'<br />

setting is disabled, an unauthenticated remote attacker can exploit this to execute arbitrary<br />

code on the remote host subject to the privileges of the web server user ID. Note that this<br />

version of the ZABBIX web interface is also likely affected by a local file inclusion<br />

vulnerability and a cross-site request forgery vulnerability. The reported version of<br />

ZABBIX is: \n %L \n<br />

Solution: Upgrade to version 1.6.3 or higher.<br />

CVE Not available<br />

FileZilla < 0.9.31 SSL/TLS Packet Overflow DoS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1307


<strong>PVS</strong> ID: 4952 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running FileZilla version: \n %L \n\nThis version of FileZilla is reported to<br />

be vulnerable to a Denial of Service (DoS) attack. The nature of the attack seems to take<br />

place within the SSL/TLS code. An attacker exploiting this flaw would be able to crash the<br />

service.<br />

Solution: Upgrade to version 0.9.31 or higher.<br />

CVE-2009-0884<br />

IBM Tivoli Storage Manager < 5.4.2.6 / 5.5.1.8 Overflow<br />

<strong>PVS</strong> ID: 4953 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the IBM Tivoli Storage Manager version: \n %L \n\nThis version of TSM contains<br />

a client that is prone to a remote buffer overflow. An attacker exploiting this flaw would<br />

need the ability to send malicious data to the service. Successful exploitation would result<br />

in the attacker executing arbitrary code on the system.<br />

Solution: Upgrade to version 5.4.2 6, 5.5.1.8 or higher.<br />

CVE-2009-0869<br />

Nucleus CMS < 3.40 Unspecified Traversal Arbitrary File Access<br />

<strong>PVS</strong> ID: 4954 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a directory traversal flaw.\n\nThe remote<br />

host is running Nucleus CMS version: \n %L \n\nNucleus is a content-management system<br />

that runs on PHP web servers. This version of Nucleus is vulnerable to a flaw in the way<br />

that the media manager handles user-supplied data. An attacker can traverse out of the web<br />

directory and gain access to data that may be confidential.<br />

Solution: Upgrade to version 3.40 or higher.<br />

CVE-2009-0929<br />

WINS Server Detection<br />

<strong>PVS</strong> ID: 4955 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Windows Internet Name Server (WINS).<br />

Solution: N/A<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1308


CVE Not available<br />

Apache modsecurity Plugin Detection<br />

<strong>PVS</strong> ID: 4956 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Apache web server with the optional 'modsecurity'<br />

module installed. Modsecurity is an open source web application firewall (WAF).<br />

The reported version of modsecurity was: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

PostgreSQL Error Message Conversion Remote DoS<br />

<strong>PVS</strong> ID: 4957 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running PostgreSQL version '%L'\n\nThis version of PostgreSQL is<br />

vulnerable to a denial of service when processing malformed SQL statements. To exploit<br />

this flaw, an attacker would need a valid account and the ability to execute custom queries.<br />

Successful exploitation would result in the attacker shutting down the database.<br />

Solution: Upgrade to version 7.4.24, 8.0.20, 8.1.16, 8.2.12, 8.3.6 or higher.<br />

CVE-2009-0922<br />

iTunes < 8.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4958 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:35914<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nAccording to its<br />

banner, the version of iTunes installed on the remote host is older than 8.1. The reported<br />

version is: \n %L \n\nSuch versions may be affected by multiple vulnerabilities : \n\n - It<br />

may be possible to cause a denial of service by sending a maliciously crafted DAAP header<br />

to the application. Note that this flaw only affects iTunes running on a Windows host.<br />

(CVE-2009-0016)\n\n - When subscribing to a podcast an authentication dialog may be<br />

presented without clarifying the origin of the authentication request. An attacker could<br />

exploit this flaw in order to steal the user's iTunes credentials. (CVE-2009-0143)");<br />

Solution: Upgrade to version 8.1 or higher.<br />

CVE-2009-0016<br />

IBM Tivoli Storage Manager < 5.4.4.1 Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4959 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1309


Description: Synopsis : \n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the IBM Tivoli Storage Manager version: \n %L \n\nThis version of TSM is<br />

reported vulnerable to a remote buffer overflow. An attacker exploiting this flaw would be<br />

able to execute arbitrary code on the remote system.<br />

Solution: Upgrade to version 5.4.4.1 or higher.<br />

CVE-2008-4563<br />

WebSphere '.ear' File Detection<br />

<strong>PVS</strong> ID: 4960 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server is hosting .ear files. .ear files are compressed source code containers<br />

that contain all of the source code and resource files for a particular web application. An<br />

attacker gaining access to this file can use any common decompression software and gain<br />

access to the source code and resource files. This can lead to the loss of confidential data<br />

and possibly more sophisticated future attacks. The '.ear' file is located at '%P'<br />

Solution: N/A<br />

CVE Not available<br />

WebSphere '.war' File Detection<br />

<strong>PVS</strong> ID: 4961 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server is hosting .war files. .war files are compressed source code<br />

containers that contain all of the source code and resource files for a particular web<br />

application. An attacker gaining access to this file can use any common decompression<br />

software and gain access to the source code and resource files. This can lead to the loss of<br />

confidential data and possibly more sophisticated future attacks. The '.war' file is located at<br />

'%P'<br />

Solution: N/A<br />

CVE Not available<br />

Cisco Phone Client Detection (SCCP)<br />

<strong>PVS</strong> ID: 4962 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote client uses the Skinny protocol.\n\nThe remote client is a phone<br />

that understands the Skinny protocol, also known as SCCP, for 'Skinny Client Control<br />

Protocol'. Skinny is Cisco's proprietary lightweight terminal control protocol used by some<br />

VoIP phones to communicate with Cisco CallManager or Asterisk PBX systems.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1310


Cisco Phone Server Detection (SCCP)<br />

<strong>PVS</strong> ID: 4963 FAMILY: Generic RISK: INFO NESSUS ID:22877<br />

Description: Synopsis :\n\nThe remote server supports the Skinny protocol.\n\nThe remote server is an<br />

H.323 proxy that understands the Skinny protocol, also known as SCCP, for 'Skinny Client<br />

Control Protocol'. Skinny is Cisco's proprietary lightweight terminal control protocol used<br />

by some VoIP phones to communicate with Cisco CallManager or Asterisk PBX systems.<br />

Solution: N/A<br />

CVE Not available<br />

Mozilla Thunderbird < 2.0.0.21 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4964 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:35977<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe installed<br />

version of Thunderbird is earlier than 2.0.0.21. Such versions are potentially affected by the<br />

following security issues : \n\n - There are several stability bugs in the browser engine that<br />

may lead to crashes with evidence of memory corruption. (MFSA 2009-01)\n\n - By<br />

exploiting stability bugs in the browser engine, it might be possible for an attacker to<br />

execute arbitrary code on the remote system under certain conditions. (MFSA 2009-07)\n\n<br />

- It may be possible for a website to read arbitrary XML data from another domain by using<br />

nsIRDFService and a cross-domain redirect. (MFSA 2009-09)\n\n - Vulnerabilities in the<br />

PNG libraries used by Mozilla could be exploited to execute arbitrary code on the remote<br />

system. (MFSA 2009-10)\n\nThe reported version of Thunderbird is: \n %L<br />

Solution: Upgrade to version 2.0.0.21 or higher.<br />

CVE-2009-0776<br />

SeaMonkey < 1.1.15 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4965 FAMILY: Web Clients RISK: HIGH NESSUS ID:35978<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe installed<br />

version of SeaMonkey is earlier than 1.1.15. Such versions are potentially affected by the<br />

following security issues : \n\n - There are several stability bugs in the browser engine that<br />

may lead to crashes with evidence of memory corruption. (MFSA 2009-01)\n\n - Cookies<br />

marked HTTPOnly are readable by JavaScript via the<br />

'XMLHttpRequest.getResponseHeader' and 'XMLHttpRequest.getAllResponseHeaders'<br />

APIs. (MFSA 2009-05)\n\n - By exploiting stability bugs in the browser engine, it might be<br />

possible for an attacker to execute arbitrary code on the remote system under certain<br />

conditions. (MFSA 2009-07)\n\n - It may be possible for a website to read arbitrary XML<br />

data from another domain by using nsIRDFService and a cross-domain redirect. (MFSA<br />

2009-09)\n\n - Vulnerabilities in the PNG libraries used by Mozilla could be exploited to<br />

execute arbitrary code on the remote system. (MFSA 2009-10) \n\nThe reported version of<br />

SeaMonkey is: \n %L<br />

Solution: Upgrade to version 1.1.15 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1311


CVE-2009-0776<br />

Umbraco Version Detection<br />

<strong>PVS</strong> ID: 4966 FAMILY: CGI RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Umbraco, a web content management system. The reported<br />

version information is: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

POLICY - OS X Insecure Software Update Transfer<br />

<strong>PVS</strong> ID: 4967 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client was running software on OS X that performed an insecure software<br />

update over HTTP. The file which was retrieved was: %L<br />

Solution: N/A<br />

Mac .dmg File Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 4968 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server is hosting .dmg files. These are Mac executable files. As an<br />

example, consider the following file %P\nThe webmaster should make sure that they<br />

do not contain confidential data.<br />

Solution: N/A<br />

CVE Not available<br />

DNS Tunneling Client Detection (HTTP)<br />

<strong>PVS</strong> ID: 4969 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client appears to be tunneling traffic over a DNS server. There are a number of<br />

DNS tunneling clients that allow internal hosts to bypass firewall and proxy inspection. As<br />

an example, consider the following observed DNS query: %L<br />

realtime<br />

Solution: Manually inspect both traffic and client to ensure that such usage is in alignment with<br />

existing policies and guidelines.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1312


DNS Tunneling Client Detection (HTTP)<br />

<strong>PVS</strong> ID: 4970 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client appears to be tunneling traffic over a DNS server. There are a number of<br />

DNS tunneling clients that allow internal hosts to bypass firewall and proxy inspection. As<br />

an example, consider the following observed DNS query: %L<br />

realtime<br />

Solution: Manually inspect both traffic and client to ensure that such usage is in alignment with<br />

existing policies and guidelines.<br />

CVE Not available<br />

DNS Tunneling Server Detection (HTTP)<br />

<strong>PVS</strong> ID: 4971 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client appears to be a server that is used to tunnel traffic. There are a number of<br />

DNS tunneling clients that allow internal hosts to bypass firewall and proxy inspection. As<br />

an example, consider the following observed DNS query: %P\n\nFollowed by the<br />

following DNS response: %L<br />

realtime<br />

Solution: Manually inspect both traffic and client to ensure that such usage is in alignment with<br />

existing policies and guidelines.<br />

CVE Not available<br />

DNS Tunneling Server Detection (HTTP)<br />

<strong>PVS</strong> ID: 4972 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client appears to be a server that is used to tunnel traffic. There are a number of<br />

DNS tunneling clients that allow internal hosts to bypass firewall and proxy inspection. As<br />

an example, consider the following observed DNS query: %P\n\nFollowed by the<br />

following DNS response: %L<br />

realtime<br />

Solution: Manually inspect both traffic and client to ensure that such usage is in alignment with<br />

existing policies and guidelines.<br />

CVE Not available<br />

Synergy Protocol Server Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4973 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1313


Description: The remote host is a Synergy server. Synergy is a protocol that allows a single mouse and<br />

keyboard to be shared over multiple systems across a network. Given this, it is often used<br />

within software packages for remote administration.<br />

Solution: N/A<br />

CVE Not available<br />

Synergy Protocol Client Detection<br />

<strong>PVS</strong> ID: 4974 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Synergy client. Synergy is a protocol that allows a single mouse and<br />

keyboard to be shared over multiple systems across a network. Given this, it is often used<br />

within software packages for remote administration.<br />

Solution: N/A<br />

CVE Not available<br />

DNS Tunneling Client Detection (SMTP)<br />

<strong>PVS</strong> ID: 4975 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client appears to be tunneling traffic over a DNS server. There are a number of<br />

DNS tunneling clients that allow internal hosts to bypass firewall and proxy inspection. As<br />

an example, consider the following observed DNS query: %L<br />

realtime<br />

Solution: Manually inspect both traffic and client to ensure that such usage is in alignment with<br />

existing policies and guidelines.<br />

CVE Not available<br />

DNS Tunneling Client Detection (SMTP)<br />

<strong>PVS</strong> ID: 4976 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client appears to be tunneling traffic over a DNS server. There are a number of<br />

DNS tunneling clients that allow internal hosts to bypass firewall and proxy inspection. As<br />

an example, consider the following observed DNS query: %L<br />

realtime<br />

Solution: Manually inspect both the traffic and the client to ensure that such usage is in alignment<br />

with existing policies and guidelines.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1314


Trojan/Backdoor Detection - Conficker Detection<br />

<strong>PVS</strong> ID: 4977 FAMILY: Backdoors RISK: HIGH NESSUS ID:36036<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host seems to be infected by the Conficker worm. This worm has<br />

several capabilities that allow an attacker to execute arbitrary code on the remote operating<br />

system. The remote host might also be attempting to propagate the worm to third-party<br />

hosts.<br />

realtime<br />

Solution: Update your antivirus and perform a full scan of the remote operating system.<br />

CVE Not available<br />

Trojan/Backdoor Detection - Conficker Detection<br />

<strong>PVS</strong> ID: 4978 FAMILY: Backdoors RISK: HIGH NESSUS ID:36036<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host seems to be infected by the Conficker worm. This worm has<br />

several capabilities that allow an attacker to execute arbitrary code on the remote operating<br />

system. The remote host might also be attempting to propagate the worm to third-party<br />

hosts.<br />

realtime<br />

Solution: Update your antivirus and perform a full scan of the remote operating system.<br />

CVE Not available<br />

Serv-U < 8.0.0.1 Multiple Vulnerabilities (DoS, Traversal)<br />

<strong>PVS</strong> ID: 4979 FAMILY: FTP Servers RISK: HIGH NESSUS ID:36035<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Serv-U File Server, an FTP server for Windows. The reported version is: \n %L<br />

\n\nThis version of Serv-U is earlier than 8.0.0.1 and is reportedly affected by the following<br />

issues : \n\n - A directory traversal vulnerability enables an authenticated remote attacker to<br />

create directories outside his or her home directory. (CVE-2009-1031)\n\n - An<br />

authenticated remote attacker can cause the FTP service to become saturated for a long<br />

period of time using a long series of 'SMNT' commands without an argument. During this<br />

time, new connections would not be allowed. (CVE-2009-0967)<br />

Solution: Upgrade to version 8.0.0.1 or higher.<br />

CVE-2009-1031<br />

Firefox < 3.0.8 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1315


<strong>PVS</strong> ID: 4980 FAMILY: Web Clients RISK: HIGH NESSUS ID:36045<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe installed<br />

version of Firefox is earlier than 3.0.8. Such versions are potentially affected by the<br />

following security issues : \n\n - An XSL transformation vulnerability can be leveraged<br />

with a specially crafted stylesheet to crash the browser or to execute arbitrary code. (MFSA<br />

2009-12)\n\n - An error in the XUL tree method '_moveToEdgeShift()' can be leveraged to<br />

trigger garbage collection routines on objects that are still in use, leading to a browser crash<br />

and possibly execution of arbitrary code. (MFSA 2009-13) \n\nThe reported version of<br />

Firefox is: \n %L<br />

Solution: Upgrade to version 3.0.8 or higher.<br />

CVE-2009-1169<br />

Xlight FTP Server Authentication SQL Injection<br />

<strong>PVS</strong> ID: 4981 FAMILY: FTP Servers RISK: HIGH NESSUS ID:36051<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe version of<br />

Xlight FTP installed on the remote host is vulnerable to a SQL injection attack during<br />

login. This allows an attacker to execute arbitrary SQL commands in the context of the FTP<br />

server. Installations that are not using external ODBC authentication are not affected by<br />

this vulnerability. The reported version of Xlight is: \n %L<br />

Solution: Upgrade to version 3.2.1 or higher.<br />

CVE-2009-4795<br />

ClamAV < 0.95 Scan Evasion<br />

<strong>PVS</strong> ID: 4982 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:36075<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nAccording<br />

to its version, the clamd antivirus daemon on the remote host is earlier than 0.95. Such<br />

versions fail to handle certain malformed 'RAR' archive files, and hence it may be possible<br />

for certain archive files to evade detection from the scan engine.<br />

Solution: Upgrade to version 0.95 or higher.<br />

CVE-2009-1241<br />

Atlassian JIRA < 3.13.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4983 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 1316


Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nAtlassian JIRA,<br />

a web-based application for bug tracking, issue tracking and project management, installed<br />

on the remote web server is affected by one or more of the following issues : \n\n - A<br />

cross-site scripting issue due to its failure to sanitize user-supplied input that is then<br />

returned in the HTTP response header.\n\n - A cross-site scripting issue within the 'DWR'<br />

library\n\n - A cross-site scripting issue within the 'Charting' plugin.\n\nThe reported<br />

version of Atlassian is: \n %L \n<br />

Solution: Upgrade to version 3.13.3 or higher.<br />

CVE Not available<br />

Apache TomCat mod_jk < 1.2.27 Cross-user Information Disclosure<br />

<strong>PVS</strong> ID: 4984 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running the Apache Tomcat web server with<br />

mod_jk version %L\n\n. mod_jk is reported vulnerable to an information disclosure flaw<br />

due to the way that it processes 'Content-Length' headers. Allegedly, an attacker supplying<br />

a NULL content-length can view the HTTP responses of other requests. An attacker<br />

exploiting this flaw would be able to possibly gain access to confidential data.<br />

Solution: Upgrade to version 1.2.27 or higher.<br />

CVE-2008-5519<br />

phpMyAdmin file_path Parameter Multiple Vulnerabilities (PMASA-2009-1)<br />

<strong>PVS</strong> ID: 4985 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:36083<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

phpMyAdmin installed on the remote host fails to sanitize user-supplied input to the<br />

'file_path' parameter of the 'bs_disp_as_mime_type.php' script before using it to read a file<br />

and reporting it in dynamically generated HTML. An unauthenticated remote attacker may<br />

be able to leverage this issue to read arbitrary files, possibly from third-party hosts, or to<br />

inject arbitrary HTTP headers in responses sent to third-party users. In addition, the version<br />

of phpMyAdmin is reportedly vulnerable to a number of other flaws. The reported version<br />

of phpMyAdmin is: \n %L \n<br />

Solution: Upgrade to version 3.1.3.1 or apply the patch referenced in the project's advisory.<br />

CVE Not available<br />

ClamAV < 0.95.1 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4986 FAMILY: Web Clients RISK: HIGH NESSUS ID:36131<br />

Family Internet Services 1317


Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nAccording to its<br />

version, the clamd antivirus daemon on the remote host is earlier than 0.95.1. Such versions<br />

are affected by multiple vulnerabilities : \n\n- ClamAV might crash while scanning certain<br />

malicious files packed with UPack. (Bug #1552)\n\n- ClamAV might crash while using<br />

'cli_url_canon'. (Bug #1553)\n\nThe current version of ClamAV on the remote host is: \n<br />

%L \n<br />

Solution: Upgrade to version 0.95.1 or higher.<br />

CVE-2009-1372<br />

Microsoft TMG Proxy Detection<br />

<strong>PVS</strong> ID: 4987 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a proxy server running the Microsoft Threat Management Gateway<br />

(TMG) software.<br />

Solution: N/A<br />

CVE Not available<br />

SeaMonkey < 1.1.16 XSL Transformation Overflow DoS<br />

<strong>PVS</strong> ID: 4988 FAMILY: Web Clients RISK: HIGH NESSUS ID:36130<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe installed version<br />

of SeaMonkey is earlier than 1.1.16. An XSL transformation vulnerability in such versions<br />

can be leveraged with a specially crafted stylesheet to crash the browser or to execute<br />

arbitrary code.<br />

Solution: Upgrade to version 1.1.16 or higher.<br />

CVE-2009-1169<br />

Policy - .divx File Detection<br />

<strong>PVS</strong> ID: 4989 FAMILY: CGI RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server is hosting .divx audio/video files. As an example, consider the<br />

following file %P\nThe webmaster should make sure that they are in compliance with<br />

corporate policies and guidelines.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

IBM WebSphere Application Server < 6.0.2.33 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4990 FAMILY: Web Servers RISK: HIGH NESSUS ID:36132<br />

Family Internet Services 1318


Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nIBM WebSphere<br />

Application Server 6.0.2 before Fix Pack 33 appears to be running on the remote host. Such<br />

versions are reportedly affected by multiple vulnerabilities :\n\n - Provided an attacker has<br />

valid credentials, it may be possible to hijack an authenticated session. (PK66676)\n\n -<br />

The PerfServlet code writes sensitive information in the 'systemout.log' and ffdc files,<br />

provided Performance Monitoring Infrastructure (PMI) is enabled. (PK63886)\n\n - It may<br />

be possible to login to the administrative console using a user account that is locked by the<br />

operating system. (PK67909)\n\n - An unknown vulnerability affects z/OS-based IBM<br />

WebSphere application servers. (PK71143)\n\n - An unspecified vulnerability in the<br />

administrative console could allow arbitrary file retrieval from the remote system.<br />

(PK72036)\n\n - If APAR PK41002 has been applied, an unspecified vulnerability in<br />

JAX-RPC WS-<strong>Security</strong> component could incorrectly validate 'UsernameToken'.<br />

(PK75992)\n\n - Certain files associated with interim fixes for Unix-based versions of IBM<br />

WebSphere Application Server are built with insecure file permissions. (PK78960)\n\nThe<br />

reported version of WebSphere is: %L\n<br />

Solution: Apply Fix Pack 33 (6.0.2.33) or higher.<br />

CVE-2009-0506<br />

IBM WebSphere Application Server 7.0 < Fix Pack 3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4991 FAMILY: Web Servers RISK: HIGH NESSUS ID:36133<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nIBM WebSphere<br />

Application Server 7.0 before Fix Pack 3 appears to be running on the remote host. Such<br />

versions are reportedly affected by multiple vulnerabilities.\n\n - Under certain conditions it<br />

may be possible to access administrative console user sessions. (PK74966)\n\n - The<br />

adminitrative console is affected by a cross-site scripting vulnerability. (PK77505)\n\n - If<br />

APAR PK41002 has been applied, an unspecified vulnerability in JAX-RPC WS-<strong>Security</strong><br />

component could incorrectly validate 'UsernameToken'. (PK75992)\n\n - Sample<br />

applications shipped with IBM WebSphere Application Server are affected by cross-site<br />

scripting vulnerabilities. (PK76720)\n\n - Certain files associated with interim fixes for<br />

Unix-based versions of IBM WebSphere Application Server are built with insecure file<br />

permissions. (PK77590)\n\n - The Web Services <strong>Security</strong> component is affected by an<br />

unspecified security issue in digital-signature specification. (PK80596)\n\n - It may be<br />

possible for an attacker to read arbitrary application-specific war files. (PK81387)\n\n - The<br />

application is prone to a session-highjacking vulnerability related to the 'forced logout'<br />

feature. (PK74966)\n\n - A vulnerability affects the XML Digital Signature Specification in<br />

the web services security component. (PK80596)\n\nThe reported version of WebSphere is:<br />

%L\n<br />

Solution: Apply Fix Pack 3 (7.0.0.3) or higher.<br />

CVE-2009-0903<br />

FTP Server .divx file Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4992 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1319


Description: The remote FTP server is hosting .divx files. As an example, consider the following file<br />

that was detected on the remote FTP server\n%P\n\nDistributing files over FTP is a<br />

common way of distributing information; however, efforts should be taken to ensure that<br />

the hosted files do not contain confidential data.<br />

Solution: N/A<br />

CVE Not available<br />

Oracle Database Version Detection<br />

<strong>PVS</strong> ID: 4993 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running an Oracle database server version %L<br />

Solution: N/A<br />

CVE Not available<br />

Oracle Database Client Detection<br />

<strong>PVS</strong> ID: 4994 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is running Oracle client software used to remotely manage or query an<br />

Oracle server.<br />

Solution: N/A<br />

CVE Not available<br />

Oracle Database Server Detection<br />

<strong>PVS</strong> ID: 4995 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is an Oracle database server.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

IBM WebSphere Application Server < 6.1.0.23 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4996 FAMILY: Web Servers RISK: HIGH NESSUS ID:36161<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nIBM WebSphere<br />

Application Server 6.1 before Fix Pack 23 appears to be running on the remote host. Such<br />

versions are reportedly affected by multiple vulnerabilities :\n\n - Provided an attacker has<br />

valid credentials, it may be possible to hijack an authenticated session. (PK66676)\n\n - It<br />

may be possible for a remote attacker to redirect users to arbitrary sites using<br />

ibm_security_logout servlet. (PK71126) \n\n - Under certain conditions it may be possible<br />

to access administrative console user sessions. (PK74966)\n\n - If APAR PK41002 has<br />

Family Internet Services 1320


een applied, an unspecified vulnerability in JAX-RPC WS-<strong>Security</strong> component could<br />

incorrectly validate 'UsernameToken'. (PK75992)\n\n - Sample applications shipped with<br />

IBM WebSphere Application Server are affected by cross-site scripting vulnerabilities.<br />

(PK76720)\n\n - The adminitrative console is affected by a cross-site scripting<br />

vulnerability. (PK77505)\n\n - It may be possible for an attacker to read arbitrary<br />

application-specific war files. (PK81387)\n\n - A session highjacking vulnerability exists in<br />

the 'forced logout' feature. (PK74966)\n\nThe reported version of WebSphere is: %L\n<br />

Solution: Apply Fix Pack 23 (6.1.0.23) or higher.<br />

CVE-2009-0506<br />

phpMyAdmin < 3.1.3.2 Multiple Code Execution Vulnerabilities (PMASA-2009-4)<br />

<strong>PVS</strong> ID: 4997 FAMILY: CGI RISK: HIGH NESSUS ID:36171<br />

Description: Synopsis :\n\nThe remote web server contains a PHP application that may allow execution<br />

of arbitrary code\n\nThe setup script included with the version of phpMyAdmin installed<br />

on the remote host does not properly sanitize user-supplied input before using it to generate<br />

a config file for the application. This version has the following vulnerabilities : \n\n - The<br />

setup script inserts the unsanitized verbose server name into a C-style comment during<br />

config file generation. \n\n - An attacker can save arbitrary data to the generated config file<br />

by altering the value of the 'textconfig' parameter during a POST request to config.php. An<br />

unauthenticated remote attacker may be able to leverage these issues to execute arbitrary<br />

PHP code.<br />

Solution: Upgrade to version 3.1.3.2 or apply the patches referenced in the project's advisory.<br />

CVE-2009-1285<br />

Firefox < 3.0.9 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4998 FAMILY: Web Clients RISK: HIGH NESSUS ID:36215<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe installed<br />

version of Firefox is earlier than 3.0.9. Such versions are potentially affected by the<br />

following security issues :\n\n - Multiple remote memory corruption vulnerabilities exist<br />

that can be exploited to execute arbitrary code in the context of the user running the<br />

affected application. (MFSA 2009-14)\n\n - A flaw may exist where Unicode box drawing<br />

characters are allowed in Internationalized Domain Names where they could be visually<br />

confused with punctuation used in valid web addresses. An attacker can leverage this to<br />

launch a phishing-type scam against a victim. (MFSA 2009-15)\n\n - A vulnerability exists<br />

when the 'jar:' scheme is used to wrap a URI which serves the content with<br />

'Content-Disposition: attachment'. An attacker can leverage this to subvert sites which use<br />

this mechanism to mitigate content injection attacks. (MFSA 2009-16)\n\n - When an<br />

Adobe Flash file is loaded via the 'view-source:' scheme, the Flash plugin misinterprets the<br />

origin of the content as localhost. An attacker can leverage this to launch cross-site request<br />

forgery attacks. It is also possible to exploit this to place cookie-like objects on victims'<br />

computers. (MFSA 2009-17)\n\n - A vulnerability exists that allows attackers to inject<br />

arbitrary scripts into sites via XBL bindings. This vulnerability requires the attacker to have<br />

Family Internet Services 1321


the ability to embed third-party stylesheets into the site. (MFSA 2009-18)\n\n - Multiple<br />

remote code execution vulnerabilities exist caused by the creation of documents whose URI<br />

does not match the document's principle using XMLHttpRequest, as well as a flaw in the<br />

'XPCNativeWrapper.ToString' '__proto__' coming from the wrong scope. (MFSA<br />

2009-19)\n\n - A malicious MozSearch plugin could be created using a JavaScript: URI in<br />

the SearchForm value. An attacker can leverage this in order to inject code into arbitrary<br />

sites. (MFSA 2009-20)\n\n - An information disclosure vulnerability exists when saving the<br />

inner frame of a web page as a file when the outer page has POST data associated with it.<br />

(MFSA 2009-21)\n\n - A cross site scripting vulnerability exists when handling a Refresh<br />

header containing a JavaScript: URI. (MFSA 2009-22)" );<br />

Solution: Upgrade to version 3.0.9 or higher.<br />

NTOP <<br />

CVE-2009-1312<br />

<strong>PVS</strong> ID: 4999 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a local flaw in the way that it creates log<br />

files.\n\nThe remote host is running NTOP, a tool for viewing network configuration,<br />

usage, statistics, protocols and more via a web interface. This version of NTOP is reported<br />

to be prone to a local exploit. Specifically, a local attacker can overwrite the 'access' log<br />

file. The remote host is only vulnerable if the NTOP service has been started with the<br />

'--access-log-file' and '-d' option. The reported version of NTOP is: \n %L \n<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

BlackBerry Enterprise Server < 4.1.6 MR5 XSS<br />

<strong>PVS</strong> ID: 5000 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running the Blackberry Enterprise Server version: \n %L \n\nThis version is<br />

reportedly vulnerable to a cross-site scripting flaw due to the way that it handles<br />

user-supplied input. An attacker exploiting this flaw would need to be able to convince a<br />

user to click on a link. Successful exploitation would result in the attacker executing<br />

arbitrary script code within the browser of the user. \nIAVT Reference :<br />

2009-T-0023\nSTIG Finding Severity : Category II<br />

Solution: Upgrade to version 4.1.6 MR5 (4.1.6.5) or higher.<br />

CVE-2009-0307<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Thunderbird < 2.0.0.21 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5001 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1322


Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors\n\nThe installed<br />

version of Thunderbird is earlier than 2.0.0.22. Such versions are potentially affected by the<br />

following security issues :\n\n - Multiple remote memory corruption vulnerabilities exist<br />

which can be exploited to execute arbitrary code in the context of the user running the<br />

affected application. (MFSA 2009-14)\n\n - A flaw may exist where Unicode box drawing<br />

characters are allowed in Internationalized Domain Names where they could be visually<br />

confused with punctuation used in valid web addresses. An attacker can leverage this to<br />

launch a phishing-type scam against a victim. (MFSA 2009-15)\n\n - A vulnerability exists<br />

when the 'jar:' scheme is used to wrap a URI which serves the content with<br />

'Content-Disposition: attachment'. An attacker can leverage this to subvert sites which use<br />

this mechanism to mitigate content injection attacks. (MFSA 2009-16)\n\n - When an<br />

Adobe Flash file is loaded via the 'view-source:' scheme, the Flash plugin misinterprets the<br />

origin of the content as localhost. An attacker can leverage this to launch cross-site request<br />

forger attacks. It is also possible to exploit this to place cookie-like objects on victim's<br />

computers. (MFSA 2009-17)\n\n - A vulnerability exists which allows attackers to inject<br />

arbitrary scripts into sites via XBL bindings. This vulnerability requires the attacker to have<br />

the ability to embed third-party stylesheets into the site. (MFSA 2009-18)\n\n - Multiple<br />

remote code execution vulnerabilities exist caused by the creation of documents whose URI<br />

does not match the document's principle using XMLHttpRequest, as well as a flaw in the<br />

'XPCNativeWrapper.ToString' '__proto__' coming from the wrong scope. (MFSA<br />

2009-19)\n\n - A malicious MozSearch plugin could be created using a javascript: URI in<br />

the SearchForm value. An attacker can leverage this in order to inject code into arbitrary<br />

sites. (MFSA 2009-20)\n\n - An information disclosure vulnerability exists when saving the<br />

inner frame of a web page as a file when the outer page has POST data associated with it.<br />

(MFSA 2009-21)\n\n - A cross site scripting vulnerability exists when handling a Refresh<br />

header containing a javascript: URI. (MFSA 2009-22)" );<br />

Solution: Upgrade to Mozilla Thunderbird 2.0.0.22 or later.<br />

CVE-2009-1840<br />

MySQL 6.0 < 6.0.10 XPath Expression DoS<br />

<strong>PVS</strong> ID: 5002 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:36020<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a Denial of Service (DoS) attack\n\nThe<br />

version of MySQL 6.0 installed on the remote host is earlier than 6.0.10 and thus affected<br />

by a denial of service vulnerability. Specifically, a user can cause an assertion failure<br />

leading to a server crash by calling 'ExtractValue()' or 'UpdateXML()' using an XPath<br />

expression employing a scalar expression as a 'FilterExpr'. For your information, the<br />

reported version of MySQL is: \n %L<br />

Solution: Upgrade to MySQL Community Server version 6.0.10 or later.<br />

CVE-2009-0819<br />

MySQL Community Server Version Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5003 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1323


Description: The remote host is running the MySQL Community server (GPL) version: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Google Chrome < 1.0.154.59 Same Origin Policy Bypass Vulnerability<br />

<strong>PVS</strong> ID: 5004 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:38154<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is affected by a same origin<br />

bypass vulnerability.\n\nThe version of Google Chrome installed on the remote host is<br />

earlier than 1.0.154.59. Such versions are reportedly affected by a same origin policy<br />

bypass vulnerability when handling URLS with a 'chromehtml: ' protocol which could<br />

allow an attacker to run scripts of his choosing on any page or enumerate files on the local<br />

disk.\n\nIf a user has Google Chrome installed, visiting an attacker-controlled web page in<br />

another browser could cause Google Chrome to launch, open multiple tabs, and load scripts<br />

that run after navigating to a URL of the attacker's choice (Issue number 9860).\nFor your<br />

information, the exact browser version is: \n %L<br />

Solution: Upgrade to Google Chrome 1.0.154.59.<br />

CVE Not available<br />

OrangeHRM < 2.4.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5005 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors\n\nThe remote host<br />

is running OrangeHRM, a human resource management system written in PHP. The<br />

reported version of OrangeHRM is: \n %L \n\nThe version of OrangeHRM installed on the<br />

remote host fails to sanitize input to the 'Time Mod', 'Benefits Mod', 'Leave Mod', 'PIM<br />

Mod', and 'Admin Mod' parameters. Given this, an authenticated user may be able to<br />

bypass security restrictions and gain access to confidential data. In addition, the version of<br />

OrangeHRM is vulnerable to multiple cross-site scripting (XSS) attacks. An attacker,<br />

exploiting these XSS flaws, would be able to execute script code within the browser of an<br />

unsuspecting OrangeHRM user.<br />

Solution: Upgrade to version 2.4.2 or higher<br />

CVE Not available<br />

DB2 9.1 < Fix Pack 7 Information Disclosure<br />

<strong>PVS</strong> ID: 5006 FAMILY: Database<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:36216<br />

Family Internet Services 1324


Description: Synopsis : \n\nThe remote database server is affected by an information disclosure<br />

vulnerability\n\nAccording to its version, the installed version of DB2 server is older than<br />

9.1 Fix Pack 7. Such versions are reportedly affected by an information disclosure<br />

vulnerability. Specifically, in certain situations an INNER JOIN predicate is applied before<br />

the OUTER JOIN predicate, which could result in disclosure of sensitive information.<br />

(JR31886). The reported versoin of DB2 is: \n %L \n<br />

Solution: Apply DB2 Version 9.1 Fix Pack 7 or later.<br />

CVE-2009-1239<br />

Fortify 360 Web Interface Detection<br />

<strong>PVS</strong> ID: 5007 FAMILY: Web Servers RISK: INFO NESSUS ID:38155<br />

Description: The remote web server is running the web interface for Fortify 360, a web interface to<br />

analyze the results of source code audits. As this interface is likely to contain sensitive<br />

information, make sure only authorized personnel can log into this site. The interface is<br />

available via the following URI: %P<br />

Solution: Make sure the proper access controls are put in place<br />

CVE Not available<br />

Firefox 3.0.9 Memory Corruption<br />

<strong>PVS</strong> ID: 5008 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is affected by a memory<br />

corruption vulnerability.\n\nThe installed version of Firefox is 3.0.9. This version is<br />

potentially affected by a memory corruption vulnerability. Specifically : \n\n - An error in<br />

function '@nsTextFrame: : ClearTextRun()' could corrupt the memory. Successful<br />

exploitation of this issue may allow arbitrary code execution on the remote system. (MFSA<br />

2009-23)\n\nThe reported version of Firefox is: \n %L<br />

Solution: Upgrade to Firefox 3.0.10 or later.<br />

CVE-2009-1313<br />

ESET Anti-Virus Version Detection<br />

<strong>PVS</strong> ID: 5009 FAMILY: Web Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is Missing a critical security patch or upgrade\n\nThe<br />

remote client is running the ESET Anti-virus engine. The version information of the<br />

signature database and the core engine are: \n %L \n\nThis version of ESET is vulnerable to<br />

a flaw wherein attackers can bypass the scan engine by submitting files within specially<br />

formatted 'CAB' archives. An attacker, exploiting this flaw, would be able to pass malicious<br />

code through the scan engine.<br />

Family Internet Services 1325


Solution: Upgrade to ESET update 4036 or higher.<br />

CVE Not available<br />

Citrix Web Interface 4.6/5.0/5.0.1 XSS<br />

<strong>PVS</strong> ID: 5010 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a cross-site scripting attack.\n\nThe remote<br />

host is running Citrix Web Interface, a tool for connecting to Citrix services through a web<br />

browser. The reported version of Citrix Web Interface is: \n%L\n\nThe version of Citrix<br />

Web Interface installed on the remote host is affected by an unspecfied cross-site scripting<br />

vulnerability. An attacker, exploiting this cross-site scripting flaw, would be able to execute<br />

script code within the browser of an unsuspecting Citrix Web Interface user.<br />

Solution: Upgrade to Citrix Web Interface 5.1.0 or later.<br />

CVE-2009-2454<br />

Flash Media < 3.0.4/3.5.2 Privilege Escalation<br />

<strong>PVS</strong> ID: 5011 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a remote 'privilege escalation' flaw\n\nThe<br />

remote host is running Flash Media server version: \n %L \n\nThis version of Flash Media<br />

server is vulnerable to a flaw wherein malicious script code can be injected and executed<br />

via an RPC call. An attacker, exploiting this flaw, would need access to the application port<br />

and the ability to send malformed requests to the service port. An attacker, exploiting this<br />

flaw, would be able to escalate privileges on the remote system.<br />

Solution: Adobe has released Flash Media Server versions 3.04 and 3.5.2 to address these flaws<br />

CVE-2009-1365<br />

MyBB < 1.4.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5012 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors\n\nThe version of<br />

MyBB installed on the remote host is vulnerable to an html-injection flaw. An attacker,<br />

exploiting this flaw, would be able to execute script code within the browser of an<br />

unsuspecting user. Allegedly, the host is also vulnerable to several unspecified<br />

vulnerabilities. While the details are sketchy, the vendor has addressed the issue. The<br />

reported version of MyBB is: \n %L \n<br />

Solution: Upgrade to MyBB 1.4.6 or later.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1326


CVE Not available<br />

ESET Anti-Virus Version Detection<br />

<strong>PVS</strong> ID: 5013 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is running the ESET Anti-virus engine. The version information of the<br />

signature database and the core engine are: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Avira Anti-Virus Version Detection<br />

<strong>PVS</strong> ID: 5014 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is running the Avira Anti-Virus engine. The version information of the<br />

signature database and the core engine are: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Avira Anti-Virus Zip File Scan Evasion<br />

<strong>PVS</strong> ID: 5015 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote client is running the Avira Ant-Virus engine. The version information of the<br />

signature database and the core engine are: \n %L \n\nThis version of the Avira scan engine<br />

is vulnerable to a flaw wherein attackers can bypass the scan engine by submitting files<br />

within specially formatted 'ZIP' archives. An attacker, exploiting this flaw, would be able to<br />

pass malicious code through the scan engine.<br />

Solution: Upgrade to Avira scan engine 8.2.0.148/7.9.0.148<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

IBM Tivoli Storage Manager < 5.2.5.4/5.3.6.6/5.4.2.7/5.5.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5016 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors\n\nThe remote host<br />

is running the IBM Tivoli Storage Manager version: \n %L \n\nThis version of TSM is<br />

reported vulnerable to multiple remote buffer overflows. An attacker, exploiting these<br />

flaws, would be able to execute arbitrary code on the remote system. In addition, the<br />

application is vulnerable to a flaw wherein attackers may be able to access confidential data<br />

on the remote system. Lastly, a vulnerability exists wherein attackers can execute<br />

man-in-the-middle attacks against the Windows and AIX SSL client. \n<br />

Family Internet Services 1327


Solution: The vendor has released versions 5.2.5.4, 5.3.6.6, 5.4.2.7, and 5.5.2 to address these issues<br />

CVE-2008-4828<br />

Mort Bay Jetty < 6.1.17 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5017 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors\n\nThe remote<br />

instance of Mort Bay Jetty is vulnerable to a number of flaws. First, the application is<br />

vulnerable to a cross-site-scripting flaw when displaying web directory listings. Secondly,<br />

the application is prone to an information disclosure flaw which can be used to read files<br />

outside the web root. Note: in order for the second flaw to be executed, Jetty must have<br />

been configured to have DefaultServlet with support for aliases turned on. For your<br />

information, the reported version of Jetty is: \n %L \n<br />

Solution: Upgrade to Mort Bay Jetty 6.1.17 or later.<br />

CVE-2009-1524<br />

Openfire < 3.6.4 Arbitrary Password Manipulation<br />

<strong>PVS</strong> ID: 5018 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote server can be tricked into modifying user credentials\n\nThe<br />

remote host is running Openfire / Wildfire, an instant messaging server supporting the<br />

XMPP protocol. According to its version, the installation of Openfire or Wildfire is<br />

affected by a vulnerability which would allow a remote attacker to change the password of<br />

any users. In particular, input sent to the 'passwd_change' parameter of the jabber: iq: auth<br />

routine is not sufficiently sanitized. An attacker, exploiting this flaw, would be able to gain<br />

access to any user account.\n\nThe reported version of Openfire is: \n %L \n<br />

Solution: Upgrade to Openfire version 3.6.4 or later.<br />

CVE-2009-1596<br />

IceWarp Merak WebMail Server < 9.4.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5019 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote webmail server is vulnerable to multiple attack vectors.\n\nThe<br />

remote host is running IcewWarp WebMail Server - a webmail server for Windows and<br />

Linux. According to its banner, the version of IceWarp installed on the remote host is<br />

earlier 9.4.2. Such versions are reportedly affected by multiple vulnerabilities : \n\n -A SQL<br />

injection vulnerability in the search form of the web-based groupware component.<br />

(CVE-2009-1468)\n\n -A cross-site scripting vulnerability exists because the application<br />

fails to properly sanitize HTML emails. An attacker can exploit this flaw through the<br />

'cleanHTML()' function of the 'html/webmail/server/inc/tools.php' script.<br />

Family Internet Services 1328


(CVE-2009-1467)\n\n - A cross site-scripting vulnerability exists because the applciation<br />

fails to properly sanitize RSS feeds. An attacker can exploit this flaw through the<br />

'cleanHTML()' function of the 'html/webmail/server/inc/rss/rss.php' script.<br />

(CVE-2009-1467)\n\n - An input validation flaw in the 'Forgot Password' function on the<br />

login page. (CVE-2009-1469)\n\nAn attacker could exploit these flaws to steal sensitive<br />

information, upload files, or possibly execute arbitrary code subject to the privileges of the<br />

affected application.\n\nFor your information, the version of IceWarp installed is : \n %L<br />

Solution: Upgrading to IceWarp Merak WebMail Server version 9.4.2 or later reportedly resolves the<br />

issues.<br />

CVE-2009-1469<br />

Google Chrome < 1.0.154.64 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5020 FAMILY: Web Clients RISK: HIGH NESSUS ID:38699<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nThe version of Google Chrome installed on the remote host is earlier than<br />

1.0.154.64. Such versions are reportedly affected by multiple vulnerabilities : \n\n - A<br />

failure to properly validate input from a renderer (tab) process could allow an attacker to<br />

crash the browser and possibly run arbitrary code with the privileges of the logged on user.<br />

(CVE-2009-1441)\n\n - A failure to check the result of integer multiplication when<br />

computing image sizes could allow a specially-crafted image or canvas to cause a tab to<br />

crash and possibly allow an attacker to execute arbitrary code inside the (sandboxed)<br />

renderer process. (CVE-2009-1442)\n\nFor your information, the exact browser version is:<br />

\n %L<br />

Solution: Upgrade to Google Chrome 1.0.154.64 or newer.<br />

CVE-2009-1442<br />

AVG Scanning Engine UPX Parsing Denial of Service Vulnerability<br />

<strong>PVS</strong> ID: 5021 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a flaw which allows malcode to be<br />

passed\n\nAVG Anti-Virus is installed on the remote Windows host. The version of AVG<br />

Anti-Virus installed on the remote host is affected by a flaw wherein remote attackers can<br />

bypass the scanning engine by sending specially formatted 'rar' and 'zip' archive files. An<br />

attacker, exploiting this flaw, would only need the ability to send email to valid recipients<br />

on the target server. Successful exploitation would result in the attacker being able to pass<br />

malware through the AVG server. For your information, the reported version, build, and<br />

license key is: \n %L \n<br />

Solution: Upgrade to AVG 8.5 323 or later.<br />

CVE-2009-1784<br />

A-A-S Server Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1329


<strong>PVS</strong> ID: 5022 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the A-A-S Application Access Server, a web application which<br />

facilitates remote access. The reported version is: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Mac OS X 10.5 < 10.5.7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5023 FAMILY: Generic RISK: HIGH NESSUS ID:38744<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors\n\nThe remote host<br />

is running a version of Mac OS X 10.5 that is older than version 10.5.7. Mac OS X 10.5.7<br />

contains security fixes for the following products : \n\n- Apache\n- ATS\n- BIND\n-<br />

CF<strong>Network</strong>\n- CoreGraphics\n-Cscope\n- CUPS\n- Disk Images\n- enscript\n- Flash<br />

player\n- Help Viewer\n- iChat\n- Internation Components for Unicode\n- IPSec\n-<br />

Kerberos\n- Kernel\n- Launch Services\n- libxml\n- Net-SNMP\n- <strong>Network</strong> Time\n-<br />

<strong>Network</strong>ing\n- OpenSSL\n- PHP\n- QuickDraw Manager\n- ruby\n- Safari\n- Spotlight\nsystem_cmds\n-<br />

telnet\n- WebKit\n- X11\n- Terminal\n\nThe reported version of Mac OS<br />

X is: \n %L \n<br />

Solution: Upgrade to Mac OS X 10.5.7 or later.<br />

CVE-2009-1717<br />

Safari < 3.2.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5024 FAMILY: Web Clients RISK: HIGH NESSUS ID:38745<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors\n\nThe version of<br />

Safari installed on the remote Windows host is earlier than 3.2.3. Such versions are<br />

potentially affected by several issues :\n\n - A heap buffer overflow issue in the libxml<br />

library when handling long entity names could lead to a crash or arbitrary code execution.<br />

(CVE-2008-3529)\n\n - Multiple input validation issues exist in Safari's handling of 'feed:'<br />

URLs, which could be abused to execute arbitrary JavaScript code. (CVE-2009-0162)\n\n -<br />

A memory corruption issue in WebKit's handling of SVGList objects could lead to arbitrary<br />

code execution. (CVE-2009-0945)<br />

Solution: Upgrade to Safari 3.2.3 or later.<br />

CVE-2009-0945<br />

Sendmail < 8.13.2 Remote Overflow<br />

<strong>PVS</strong> ID: 5025 FAMILY: SMTP Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 1330


Description: Synopsis : \n\nThe remote host is vulnerable to a buffer overflow\n\nAccording to it's<br />

banner, the remote Sendmail server is running a version less than 8.13.2. There is a flaw in<br />

versions of Sendmail less than 8.13.2 which would allow a remote attacker to execute<br />

arbitrary code on the Sendmail system through the use of malfored X headers. The reported<br />

version of Sendmail is: \n %L \n<br />

Solution: Upgrade to Sendmail 8.13.2 or newer.<br />

CVE-2009-1490<br />

Google Chrome < 1.0.154.65 Remote Code Execution<br />

<strong>PVS</strong> ID: 5026 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nThe version of Google Chrome installed on the remote host is earlier than<br />

1.0.154.65. Such versions are reportedly affected by a memory corruption issue. An<br />

attacker could exploit this flaw in order to run arbitrary code inside the Google Chrome<br />

sandbox.\n\nFor your information, the exact browser version is: \n %L<br />

Solution: Upgrade to Google Chrome 1.0.154.65 or newer.<br />

CVE-2009-0945<br />

Avira Anti-Virus PDF File Scan Evasion<br />

<strong>PVS</strong> ID: 5027 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote client is running the Avira Anti-Virus engine. The version information of the<br />

signature database and the core engine are: \n %L \n\nThis version of the Avira scan engine<br />

is vulnerable to a flaw wherein attackers can bypass the scan engine by submitting specially<br />

formatted 'PDF' files. An attacker, exploiting this flaw, would be able to pass malicious<br />

code through the scan engine.<br />

Solution: Upgrade to Avira scan engine 8.2.0.168/7.9.0.168<br />

CVE Not available<br />

Coppermine < 1.4.23 injection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5028 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a SQL Injection attack\n\nThe remote host<br />

is running Coppermine version: \n %L \n\nCoppermine is a web-based photo album written<br />

in PHP. This version of Coppermine is vulnerable to a SQL injection vulnerability when<br />

handling malformed data sent to the 'thumbnails.php', 'db_input.php', and<br />

'displayecard.php'. An attacker, exploiting this flaw, would be able to execute arbitrary<br />

SQL commands on the database server used by Coppermine.<br />

Family Internet Services 1331


Solution: When available, upgrade to version 1.4.23 or higher.<br />

CVE Not available<br />

Sun GlassFish Enterprise Server Detection<br />

<strong>PVS</strong> ID: 5029 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Sun GlassFish Enterprise Server. The version is:\n '%L'<br />

Solution: N/A<br />

CVE Not available<br />

Sun GlassFish Enterprise Server Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5030 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the Sun GlassFish Enterprise Server earlier than 2.1 Patch02. Such versions are<br />

reportedly affected by multiple vulnerabilities : \n\n - There are multiple input validation<br />

flaws that could lead to cross-site scripting attacks.\n\n - A local denial of service<br />

vulnerability in the HTTP engine.\n\n For your information, the installed version is: \n %L<br />

Solution: Sun has release a fix for this version of their server. Apply the referenced patches.<br />

CVE-2009-1553<br />

Winamp < 5.552 Buffer Overflow<br />

<strong>PVS</strong> ID: 5031 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

running Winamp, a media player for Windows. The version of Winamp installed on the<br />

remote host is earlier than 5.552. Such versions reportedly contain a flaw in the way that it<br />

handles malformed '.maki' files. A malfored file will cause a buffer overflow within the<br />

'gen_ff.dll' library. Successful exploitation will result in the attacker executing arbitrary<br />

code. An attacker, exploiting this flaw, would need to be able to entice a user into opening<br />

a malformed '.maki' file. For your information, the reported version of Winamp is: \n %L \n<br />

Solution: Upgrade to Winamp version 5.552 or later.<br />

CVE-2009-1831<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Pidgin < 2.5.6 Multiple Buffer Overflow Vulnerabilities<br />

<strong>PVS</strong> ID: 5032 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1332


Description: Synopsis : \n\nThe remote host is affected by multiple remote buffer overflow<br />

vulnerabilities.\n\nThe remote host is running Pidgin earlier than 2.5.6. Such versions are<br />

reportedly affected by multiple remote buffer overflow vulnerabilities : \n\n - A buffer<br />

overflow issue in the 'decrypt_out()' function can be exploited through specially crafted<br />

'QQ' packets. (CVE-2009-1374)\n\n - A buffer maintained by PurpleCircBuffer which is<br />

used by XMPP and Sametime protocol plugins can be corrupted if it's exactly full and then<br />

more bytes are added to it. (CVE-2009-1375)\n\n - A buffer overflow is possible when<br />

initiating a file transfer to a malicious buddy over XMPP. (CVE-2009-1373)\n\n - An<br />

integer-overflow issue exists in the application due to a n incorrect typecasting of 'int64' to<br />

'size_t'. (CVE-2009-1376)\n\nSuccessful exploitation could allow an attacker to execute<br />

arbitrary code on the remote host.For your information, the installed version of Pidgin is: \n<br />

%L<br />

Solution: Upgrade to Pidgin 2.5.6 or later.<br />

BASE < 1.4.3 XSS<br />

CVE-2009-1376<br />

<strong>PVS</strong> ID: 5033 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to an HTML Injection attack\n\nThe remote<br />

host is running BASE, a web-based tool for analyzing alerts from one or more SNORT<br />

sensors. The version of BASE installed on the remote host allows a remote attacker to<br />

inject HTML and perform cross-site scripting (XSS) attacks against unsuspecting users. In<br />

order to inject the malicious code, the attacker would need the ability to log into the BASE<br />

system. Successful exploitation would result in the attacker executing script code within the<br />

browser of other BASE users. The two php scripts which are vulnerable to injection are:<br />

'base_ag_main.php' and 'base_qry_main.php'. For your information, the reported version of<br />

BASE is: \n %L<br />

Solution: Upgrade to BASE version 1.4.3 or later.<br />

CVE Not available<br />

SoulSeek Version Detection<br />

<strong>PVS</strong> ID: 5034 FAMILY: Peer-To-Peer File Sharing RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the SoulSeek Peer to Peer application. SoulSeek is used to<br />

download and share files. As such, it should be authorized with respect to corporate<br />

policies and guidelines. The version of SoulSeek is: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

lighttpd < 1.4.24 Information Disclosure<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1333


<strong>PVS</strong> ID: 5035 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a flaw which allows attackers to retrieve<br />

sensitive files or data\n\nAccording to its banner, the version of lighttpd installed on the<br />

remote host is older than 1.4.24. Such versions may be affected by an<br />

information-disclosure vulnerability. Specifically, Lighttpd does not correctly handle a file<br />

name which has a trailing '\'. An attacker, exploiting this flaw, can request any file within<br />

the web root to download or view. This may lead to the loss of condidential data. For your<br />

information, the reported version of Lighttpd is: \n %L \n<br />

Solution: Update lighttpd to version 1.4.24 or later.<br />

CVE Not available<br />

DocuWiki Version Detection<br />

<strong>PVS</strong> ID: 5036 FAMILY: CGI RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the open source DocuWiki software. DocuWiki allows remote<br />

users to contribute dynamic content to the web interface. The reported version of DocuWiki<br />

is: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

SquirrelMail < 1.4.18 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5037 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running SquirrelMail, a web-based email client. The installed version of SquirrelMail is<br />

affected by multiple vulnerabilities : \n\n - Multiple cross-site scripting vulnerabilities.\n\n -<br />

A code-injection vulnerability affects the 'map_yp_alias' function which an attacker could<br />

exploit to execute arbitrary code subject to the privileges of the web server.\n\n - Multiple<br />

session-fixation issues could allow an attacker to steal an unsuspecting user's<br />

session.\n\nFor your information, the installed version of SquirrelMail is : \n %L<br />

Solution: Upgrade to SquirrelMail 1.4.18 or newer.<br />

CVE-2009-1579<br />

Avira Anti-Virus Multiple Scan Evasions<br />

<strong>PVS</strong> ID: 5038 FAMILY: Web Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:38973<br />

Family Internet Services 1334


Description: Synopsis : \n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote client is running the Avira Anti-Virus engine. The version information of the<br />

signature database and the core engine are: \n %L \n\nThis version of the Avira scan engine<br />

is vulnerable to a flaw wherein attackers can bypass the scan engine by submitting specially<br />

formatted 'ZIP', 'CAB', 'RAR', or 'LH' files. An attacer, exploiting this flaw, would be able<br />

to pass malicious code through the scan engine.<br />

Solution: Upgrade to Avira scan engine 7.9.0.180/8.2.0.180<br />

CVE Not available<br />

Simple Machines < 1.1.9 / 2.0.0 RC1 XSS<br />

<strong>PVS</strong> ID: 5039 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a cross-site scripting attack.\n\nThe remote<br />

host is running Simple Machines Forum. The installed version is earlier than 1.1.9 / 2.0.0<br />

RC1-1. Such versions fail to properly sanitize user-supplied images identified as<br />

'image/bmp' MIME types. Successful exploitation would result in an attacker executing<br />

script code within the browsers of other users. For your information, the reported version of<br />

Simple Machines Forum is: \n %L<br />

Solution: Upgrade to Simple Machines Forum 1.1.9 / 2.0.0 RC1-1<br />

CVE Not available<br />

NSD packet.c Off-By-One Buffer Overflow<br />

<strong>PVS</strong> ID: 5040 FAMILY: DNS Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:38850<br />

Description: Synopsis : \n\nThe remote DNS server is vulnerable to a remote buffer overflow<br />

attack.\n\nThe remote host is running a version of NSD DNS Server which has a stack<br />

buffer overflow vulnerability. A remote attacker could overwrite one byte in memory,<br />

leading to a denial of service. It is possible, but unlikely, that this vulnerability could result<br />

in remote code execution. For your information, the reported version of NSD is: \n %L<br />

Solution: Upgrade to NSD version 3.2.2 or later, or apply the patch referenced in the vendor's<br />

advisory.<br />

CVE Not available<br />

iTunes < 8.2 Remote Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5041 FAMILY: Web Clients RISK: HIGH NESSUS ID:38986<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a remote buffer overflow<br />

attack.\n\nAccording to its banner, the version of iTunes installed on the remote host is<br />

older than 8.2. Such versions may be affected by a remote buffer overflow when parsing<br />

'items: ' URLs. An attacker could exploit this flaw to execute arbitrary code on the remote<br />

Family Internet Services 1335


host subject to the privileges of the user running the application. For your information, the<br />

installed version of iTunes is: \n %L<br />

Solution: Upgrade to iTunes 8.2 or later.<br />

CVE-2009-0950<br />

QuickTime < 7.6.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5042 FAMILY: Web Clients RISK: HIGH NESSUS ID:38988<br />

Description: Synopsis : \n\nThe remote host contains an application that is vulnerable to multiple attack<br />

vectors.\n\nThe version of QuickTime installed on the remote host is older than 7.6.2. Such<br />

versions contain multiple vulnerabilities : \n\n - A memory corruption issue exists in<br />

QuickTime's handling of 'Sorenson 3' video files. (CVE-2009-0188)\n\n - A heap buffer<br />

overflow exists in the handling of 'FLC' compression files. (CVE-2009-0951)\n\n - A<br />

buffer overflow may occur when processing compressed 'PSD' images.<br />

(CVE-2009-0952)\n\n - An integer overflow exists in the handling of 'PICT' images could<br />

lead to a heap buffer overflow. (CVE-2009-0010), (CVE-2009-0953)\n\n - A heap buffer<br />

overflow could occur when handling 'Clipping Region' atom types in a movie file.<br />

(CVE-2009-0954)\n\n - A heap buffer overflow exists in the handling of 'MS ADPCM'<br />

encoded audio data. (CVE-2009-0185)\n\n - A sign extension issue exists in the handling of<br />

image description atoms. (CVE-2009-0955)\n\n - An uninitialized memory access issue<br />

exists when handling movie files with a zero user data atom size. (CVE-2009-0956)\n\n - A<br />

heap buffer overflow exists in the handling of 'JP2' images. (CVE-2009-0957)\n\nFor your<br />

information, the installed version of QuickTime is : \n %L<br />

Solution: Upgrade to QuickTime 7.6.2 or later.<br />

CVE-2009-0957<br />

DB2 9.1 < Fix Pack 7 / 9.5 < Fix Pack 4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5043 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote database server is affected by multiple issues.\n\nAccording to<br />

its version, the installation of DB2 9.1 / 9.5 on the remote host is affected by one or more of<br />

the following issues : \n\n - A denial-of-service issue when the application processes<br />

crafted IPv6 addresses in the correlation token. (IZ38874)\n\n - A security-bypass issue<br />

exists in the application when LDAP-based authentication is used. (LI73778)\n\nFor your<br />

information, the observed version of DB2 was: \n %L<br />

Solution: Apply DB2 9.1 Fix Pack 7 or DB2 9.5 Fix Pack 4<br />

CVE-2009-1906<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Apache Tomcat < 4.1.40 / 5.5.28 / 6.0.20 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5044 FAMILY: Web Servers NESSUS ID:Not Available<br />

Family Internet Services 1336


RISK:<br />

MEDIUM<br />

Description: Synopsis : \n\nThe remote web server is affected by multiple vulnerabilities.\n\nThe<br />

version of Apache Tomcat installed on the remote host is affected by a multiple<br />

vulnerabilities : \n\n - A username enumeration vulnerability exists when FORM based<br />

authentication with either the MemoryRealm, DataSourceRealm, or JDBCRealm is used.<br />

(CVE-2009-0580)\n\n - A denial of service exists if Tomcat receives a request with invalid<br />

headers via the Java AJP connector. (CVE-2009-0033)\n\n - A remote<br />

information-disclosure vulnerability exists in the 'RequestDispatcher' can be exploited to<br />

gain access to content in the 'WEB-INF' directory. (CVE-2008-5515)\n\n - It is possible for<br />

a web application to replace the XML parser used by Tomcat to process 'web.xml',<br />

'context.xml', and 'tld' files.\n\nFor your information, the reported version of Apache<br />

Tomcat is : \n %L<br />

Solution: Upgrade to Apache Tomcat 4.1.40 / 5.5.28 / 6.0.20<br />

CVE-2009-0783<br />

LogMeIn 'cfgadvanced.html' HTTP Header Injection<br />

<strong>PVS</strong> ID: 5045 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is affected by a HTTP header injection<br />

vulnerability.\n\nThe remote host is a LogMeIn server awaiting remote connections. The<br />

installed version of LogMeIn is 4.0.784 or earlier. Such versions are reportedly affected by<br />

a HTTP header injection vulnerability. An attacker could exploit this in order to launch<br />

various attacks including cross-site scripting, and cross-site request forgery. For your<br />

information, the installed version is: \n %L<br />

Solution: Disable this service if it is not needed.<br />

CVE Not available<br />

Safari < 4.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5046 FAMILY: Web Clients RISK: HIGH NESSUS ID:39339<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is affected by several<br />

issues.\n\nThe version of Safari installed on the remote host is earlier than 4.0. Such<br />

versions are potentially affected by numerous issues in the following components : \n\n -<br />

CF<strong>Network</strong>\n\n - CoreGraphics\n\n - ImageIO\n\n - International Components for<br />

Unicode\n\n - libxml\n\n - Safari\n\n - Safari Windows Installer\n\n - WebKit\n\nFor your<br />

information, the reported version of Safari is : \n %L<br />

Solution: Upgrade to Safari 4.0 or later.<br />

CVE-2009-1718<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1337


Microsoft SharePoint Detection<br />

<strong>PVS</strong> ID: 5047 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a Microsoft SharePoint Server. The reported version of<br />

Microsoft SharePoint is: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Kerio MailServer < 6.6.2 Patch 3 / 6.7.0 Patch 1 XSS<br />

<strong>PVS</strong> ID: 5048 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote mail server is vulnerable to cross-site scripting attacks.\n\nThe<br />

remote Kerio MailServer is earlier than 6.6.2 Patch 3 / 6.7.0 Patch 1. Such versions are<br />

reportedly affected by a cross-site scripting vulnerability in the 'Integration' page. For your<br />

information, the reported version of Kerio MailServer is : \n %L<br />

Solution: Upgrade to Kerio MailServer 6.6.2 Patch 3 / 6.7.0 Patch 1<br />

CVE-2009-2636<br />

Google Chrome < 2.0.172.31 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5049 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nThe version of Google Chrome installed on the remote host is earlier than<br />

2.0.172.31. Such versions are reportedly affected by multiple issues :\n\n - A memory<br />

corruption issue exists in the way the WebKit handles recursion in certain DOM event<br />

handlers. (CVE-2009-1690)\n\n - WebKit's handling of drag events is affected by an<br />

information disclosure vulnerability. (CVE-2009-1718)\n\nFor your information, the<br />

reported browser version is \n%L<br />

Solution: Upgrade to Google Chrome 2.0.172.31 or later.<br />

CVE-2009-1718<br />

Cisco IronPort Detection<br />

<strong>PVS</strong> ID: 5050 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Cisco IronPort, an appliance for email and web security. Be<br />

sure that the installed version has the latest patches installed. For your information, the<br />

displayed banner is : \n %L<br />

Solution: N/A<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1338


CVE Not available<br />

TACACS Client Detection<br />

<strong>PVS</strong> ID: 5051 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is configured to use TACACS authentication. Further, the client is<br />

configured to send authentication in plaintext. The observed UserID was: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

TACACS Server Detection<br />

<strong>PVS</strong> ID: 5052 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is a TACACS authentication server.<br />

Solution: N/A<br />

CVE Not available<br />

SMB AndX File Handle Detection (client)<br />

<strong>PVS</strong> ID: 5053 FAMILY: Samba RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client requested the following file: \n %L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

SMB AndX File Handle Detection (server)<br />

<strong>PVS</strong> ID: 5054 FAMILY: Samba RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is hosting the following file:\n%P<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

FTP Server File Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5055 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1339


Description: The remote FTP server is hosting the following file:\n%P<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

FTP Client File Download Detection<br />

<strong>PVS</strong> ID: 5056 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote FTP client just downloaded the following file: \n %L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Big-IP Web Application Firewall Detection<br />

<strong>PVS</strong> ID: 5057 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: Based on the modified HTTP headers, <strong>PVS</strong> has determined that the remote server is<br />

running the Big-IP web application firewall (WAF). A WAF is a security solution<br />

which applies rules based on HTTP content. For your information, the request sent<br />

by the client was: '%P' and the response was '%L'.<br />

Solution: N/A<br />

CVE Not available<br />

WebKnight Web Application Firewall Detection<br />

<strong>PVS</strong> ID: 5058 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: Based on the modified HTTP headers, <strong>PVS</strong> has determined that the remote server is<br />

running the WebKnight web application firewall (WAF). A WAF is a security solution<br />

which applies rules based on HTTP content. For your information, the request sent by the<br />

client was: '%P' and the response was '%L'.<br />

Solution: N/A<br />

CVE Not available<br />

AirLock Web Application Firewall Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5059 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1340


Description: Based on the software 'Cookie', <strong>PVS</strong> has determined that the remote server is running the<br />

AirLock web application firewall (WAF). A WAF is a security solution which applies rules<br />

based on HTTP content. For your information, the request sent by the client was: '%P' and<br />

the response was '%L'.<br />

Solution: N/A<br />

CVE Not available<br />

Barracuda Web Application Firewall Detection<br />

<strong>PVS</strong> ID: 5060 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: Based on the software 'Cookie', <strong>PVS</strong> has determined that the remote server is running the<br />

Barracuda web application firewall (WAF). A WAF is a security solution which applies<br />

rules based on HTTP content. For your information, the request sent by the client was: '%P'<br />

and the response was '%L'.<br />

Solution: N/A<br />

CVE Not available<br />

F5 ASM Web Application Firewall Detection<br />

<strong>PVS</strong> ID: 5061 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: Based on the software 'Cookie', <strong>PVS</strong> has determined that the remote server is running the<br />

F5 ASM web application firewall (WAF). A WAF is a security solution which applies rules<br />

based on HTTP content. For your information, the request sent by the client was: '%P' and<br />

the response was '%L'.<br />

Solution: N/A<br />

CVE Not available<br />

F5 TrafficShield Web Application Firewall Detection<br />

<strong>PVS</strong> ID: 5062 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: Based on the 'Server' HTTP headers, <strong>PVS</strong> has determined that the remote server is<br />

running the F5 TrafficShield web application firewall (WAF). A WAF is a security<br />

solution which applies rules based on HTTP content. For your information, the<br />

request sent by the client was: '%P' and the response was '%L'.<br />

Solution: N/A<br />

CVE Not available<br />

Teros Web Application Firewall Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5063 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1341


Description: Based on the software 'Cookies', <strong>PVS</strong> has determined that the remote server is running the<br />

Teros web application firewall (WAF). A WAF is a security solution which applies rules<br />

based on HTTP content. For your information, the request sent by the client was: '%P' and<br />

the response was '%L'.<br />

Solution: N/A<br />

CVE Not available<br />

NetContinuum Web Application Firewall Detection<br />

<strong>PVS</strong> ID: 5064 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: Based on the software 'Cookies', <strong>PVS</strong> has determined that the remote server is running the<br />

NetContinuum web application firewall (WAF). A WAF is a security solution which<br />

applies rules based on HTTP content. For your information, the request sent by the client<br />

was: '%P' and the response was '%L'.<br />

Solution: N/A<br />

CVE Not available<br />

BinarySEC Web Application Firewall Detection<br />

<strong>PVS</strong> ID: 5065 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: Based on the HTTP 'Server' header, <strong>PVS</strong> has determined that the remote server is running<br />

the BinarySEC web application firewall (WAF). A WAF is a security solution which<br />

applies rules based on HTTP content. For your information, the request sent by the client<br />

was: '%P'.\n\nThe reported version of BinarySEC is: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

HyperGuard Web Application Firewall Detection<br />

<strong>PVS</strong> ID: 5066 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: Based on the HTTP 'Cookie' header, <strong>PVS</strong> has determined that the remote server is running<br />

the HyperGuard web application firewall (WAF). A WAF is a security solution which<br />

applies rules based on HTTP content. For your information, the request sent by the client<br />

was: '%P' and the response was '%L'<br />

Solution: N/A<br />

CVE Not available<br />

Profense Web Application Firewall Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5067 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1342


Description: Based on the HTTP 'Server' header, <strong>PVS</strong> has determined that the remote server is running<br />

the Profense web application firewall (WAF). A WAF is a security solution which applies<br />

rules based on HTTP content. For your information, the request sent by the client was: '%P'<br />

and the response was '%L'<br />

Solution: N/A<br />

CVE Not available<br />

Netscaler Web Application Firewall Detection<br />

<strong>PVS</strong> ID: 5068 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: Based on the HTTP headers, <strong>PVS</strong> has determined that the remote server is running the<br />

Netscaler web application firewall (WAF). A WAF is a security solution which applies<br />

rules based on HTTP content. For your information, the request sent by the client was: '%P'<br />

and the response was '%L'<br />

Solution: N/A<br />

CVE Not available<br />

dotDefender Web Application Firewall Detection<br />

<strong>PVS</strong> ID: 5069 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: Based on the HTTP headers, <strong>PVS</strong> has determined that the remote server is running the<br />

dotDefender web application firewall (WAF). A WAF is a security solution which applies<br />

rules based on HTTP content. For your information, the request sent by the client was: '%P'<br />

and the response was '%L'<br />

Solution: N/A<br />

CVE Not available<br />

NFS Directory Detection<br />

<strong>PVS</strong> ID: 5070 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is an NFS server and the following directory is accessible<br />

remotely:\n%P<br />

Solution: N/A<br />

NFS File Detection<br />

realtimeonly<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5071 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1343


Description: The remote host is an NFS server hosting the following file:\n%P<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Firefox < 3.0.11 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5072 FAMILY: Web Clients RISK: HIGH NESSUS ID:39372<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is susceptible to multiple attack<br />

vectors.\n\nThe installed version of Firefox is earlier than 3.0.11. Such versions are<br />

potentially affected by the following security issues : \n\n - Multiple memory corruption<br />

vulnerabilities could potentially be exploited to execute arbitrary code. (MFSA<br />

2009-24)\n\n - Certain invalid Unicode characters, when used as a part of IDN, can be<br />

displayed as a whitespace in the location bar. An attacker can exploit this vulnerability to<br />

spoof the location bar. (MFSA 2009-25)\n\n - It may be possible for local resources loaded<br />

via 'file: ' protocol to access any domain's cookies saved on a user's system. (MFSA<br />

2009-26)\n\n - It may be possible to tamper with SSL date via non-200 responses to proxy<br />

CONNECT requests. (MFSA 2009-27)\n\n - A race condition exists in<br />

'NPObjWrapper_NewResolve' when accessing the properties of a NPObject, a wrapped<br />

JSObject. (MFSA 2009-28)\n\n - If the owner document of an element becomes a null after<br />

garbage collection, then it may be possible to execute the event listeners within the wrong<br />

JavaScript context. An attacker can potentially exploit this vulnerability to execute arbitrary<br />

JavaScript with chrome privileges. (MFSA 2009-29)\n\n - When the 'file: ' resource is<br />

loaded from the location bar, the resource inherits principal of the previously loaded<br />

document. This could potentially allow unauthorized access to local files.<br />

(MFSA-2009-30)\n\n - While loading external scripts into XUL documents content-loading<br />

policies are not checked. (MFSA 2009-31)\n\n - It may also be possible for scripts from<br />

page content to run with elevated privileges. (MFSA 2009-32)\n\n For your information,<br />

the reported version of Firefox is : \n %L<br />

Solution: Upgrade to Firefox 3.0.11 or later.<br />

CVE-2009-1841<br />

ClamAV < 0.95.2 File Scan Evasion<br />

<strong>PVS</strong> ID: 5073 FAMILY: Web Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is running an anti-virus application that is affected by a file<br />

scan evasion vulnerability.\n\nAccording to its version, the clamd anti-virus daemon on the<br />

remote host is earlier than 0.95.2. Such versions are reportedly affected by a file scan<br />

evasion vulnerability. An attacker could exploit this flaw by embedding malicious code in a<br />

specially crafted 'CAB', 'RAR', or 'ZIP' archive in order to bypass the anti-virus software.<br />

For your information, the reported version of ClamAV on the remote host is: \n %L<br />

Family Internet Services 1344


Solution: Upgrade to ClamAV 0.95.2 or later.<br />

CVE Not available<br />

Apple iPhone 3.x Detection<br />

<strong>PVS</strong> ID: 5074 FAMILY: Mobile Devices RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is an iPhone version 3.x mobile phone. The observed banner was: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Palm Pre Mobile Phone Detection<br />

<strong>PVS</strong> ID: 5075 FAMILY: Mobile Devices RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Palm Pre mobile phone. The observed banner was: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

IBM WebSphere Application Server < 6.0.2.35 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5076 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:38978<br />

Description: Synopsis : \n\nThe remote host is running a web server that is vulnerable to multiple attack<br />

vectors.\n\nIBM WebSphere Application Server 6.0.2 before Fix Pack 35 appears to be<br />

running on the remote host. Such versions are reportedly affected by multiple<br />

vulnerabilities : \n\n - The administrative component's secure login page fails to redirect to<br />

an 'https: //' page when it receives an 'http: //' request. (PK77010)\n\n - An unspecified<br />

security issue affects 'wsadmin' in the 'SystemManagement/Repository' component.<br />

(PK77235)\n\n - An information disclosure vulnerability affects the 'Configservice APIs' in<br />

the Administrative Console' component. (PK84999)\n\n - An unspecified vulnerability<br />

affects the '<strong>Security</strong>' component, which permits 'non-standard HTTP methods'.<br />

(PK773246)\n\nFor your information, the installed version of WebSphere is : \n %L<br />

Solution: Apply Fix Pack 35 (6.0.2.35) or later.<br />

CVE-2009-1901<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

IBM WebSphere Application Server < 6.1.0.25 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5077 FAMILY: Web Servers RISK: HIGH NESSUS ID:39450<br />

Description: Synopsis : \n\nThe remote host is running a web server that is vulnerable to multiple attack<br />

vectors.\n\nIBM WebSphere Application Server 6.1.0 before Fix Pack 25 appears to be<br />

running on the remote host. Such versions are reportedly affected by multiple<br />

Family Internet Services 1345


vulnerabilities : \n\n - The administrative component's secure login page fails to redirect to<br />

an 'https: //' page when it receives an 'http: //' request. (PK77010)\n\n - An unspecified<br />

security issue affects 'wsadmin' in the 'SystemManagement/Repository' component.<br />

(PK77235)\n\n - An information disclosure vulnerability affects the 'Configservice APIs' in<br />

the Administrative Console' component. (PK84999)\n\n - An unspecified vulnerability<br />

affects the '<strong>Security</strong>' component, which permits 'non-standard HTTP methods'.<br />

(PK773246)\n\n - A security-bypass vulnerability when users use JAX-WS applications<br />

with a WS-<strong>Security</strong> policy set at the operational level. (PK87767)\n\n - A denial-of-service<br />

vulnerability caused because the application uses insecure obfuscation in web services.<br />

(PK79275)\n\n - An information disclosure vulnerability affecting the Migration<br />

component when WAS is migrated from version 6.1 to 7.0 and tracing is enabled.<br />

(PK80337)\n\n - A security-bypass issue caused by an error in the Single Sign-on with<br />

SPNEGO implementation. (PK77465)\n\n - A security-bypass vulnerability due to an<br />

unspecified error when configured with CSIv2 <strong>Security</strong> with Identity Assertion.<br />

(PK83097)\n\nFor your information, the installed version of WebSphere is : \n %L<br />

Solution: Apply Fix Pack 25 (6.1.0.25) or later.<br />

CVE-2009-0904<br />

RT: Request Tracker 'ShowConfigTab' <strong>Security</strong> Bypass<br />

<strong>PVS</strong> ID: 5078 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is running a web application that is affected by a security<br />

bypass vulnerability.\n\nThe remote host is running RT: Request Tracker, an<br />

enterprise-grade ticketing system. The version detected is affected by a security bypass<br />

vulnerability because the 'ShowConfigTab' right unintentionally enabled users to edit<br />

global RT at a Glance. An attacker could exploit this to edit the application's configuration.<br />

For your information, the reported version of RT is : \n %L<br />

Solution: Upgrade to RT 3.6.8 / 3.8.4<br />

CVE Not available<br />

Google Chrome < 1.0.154.53 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5079 FAMILY: Web Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:39499<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nThe version of Google Chrome installed on the remote host is earlier than<br />

1.0.154.53. Such versions are reportedly affected by a multiple vulnerabilities : \n\n - The<br />

browser uses the HTTP Host header to determine the context of a 4xx/5xx CONNECT<br />

response from a proxy server. This could allow a man-in-the-middle attacker to execute<br />

arbitrary script code in the context of a legitimate server. (CVE-2009-2060)\n\n - The<br />

browser displays a cached certificate for 4xx/5xx CONNECT response pages from a proxy<br />

server. A man-in-the-middle attacker could exploit this by displaying a spoofed web page<br />

with the valid certificate of a legitimate website.\n\n For your information, the reported<br />

Family Internet Services 1346


version of Google Chrome is : \n %L<br />

Solution: Upgrade to Google Chrome 1.0.154.53 or later.<br />

CVE-2009-2071<br />

PHP < 5.2.10 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5080 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server uses a version of PHP that is affected by multiple<br />

vulnerabilities.\n\nAccording to its banner, the version of PHP installed on the remote host<br />

is earlier than 5.2.10. Such versions are reportedly affected by multiple vulnerabilities : \n\n<br />

- A restriction-bypass vulnerability could allow the execution of arbitrary commands when<br />

'safe_mode' is enabled 'safe_mode_exec_dir' is not set. This issue only affects PHP on<br />

Windows. (bug 45997)\n\n - A denial of service vulnerability is triggered when an<br />

application processes a 'JPEG' image file through a call to the 'exif_read_data()' function.<br />

(bug 48378).\n\nFor your information, the reported version of PHP is : \n %L<br />

Solution: Upgrade to PHP version 5.2.10 or later.<br />

CVE-2009-2687<br />

Microsoft .NET Hidden 'ViewState' Detection<br />

<strong>PVS</strong> ID: 5081 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote .NET application stores state information within a hidden form field. Further,<br />

the information is not hashed. Given this, an attacker can modify the ViewState string in<br />

transit and possibly alter the state or output of the .NET application. The path to the<br />

application is: %P<br />

Solution: Enable hashing of the ViewState string. This can be accomplished by setting<br />

'enableViewStateMac<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Google Chrome < 2.0.172.33 Buffer Overflow vulnerability<br />

<strong>PVS</strong> ID: 5082 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is vulnerable to a buffer<br />

overflow attack.\n\nThe version of Google Chrome installed on the remote host is earlier<br />

than 2.0.172.33. Such versions are reportedly affected by a buffer overflow vulnerability<br />

when handling certain responses from HTTP servers. An attacker could exploit this issue to<br />

cause a denial of service, or execute arbitrary code with the privileges of the logged on<br />

user. For you information, the reported version is : \n %L<br />

Solution: Upgrade to Google Chrome 2.0.172.33 or later.<br />

Family Internet Services 1347


CVE-2009-2121<br />

Last Seen FTP Client Name<br />

<strong>PVS</strong> ID: 5083 FAMILY: FTP Clients RISK: LOW NESSUS ID:Not Available<br />

Description: <strong>PVS</strong> observed at least one FTP session originating from this client address. <strong>PVS</strong><br />

maintains the most recently seen FTP account used to download files. The detected<br />

user login string was:\n %L<br />

realtime<br />

Solution: N/A<br />

CVE Not available<br />

Mozilla SeaMonkey < 1.1.17 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5084 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is running a web browser that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running a version of Mozilla SeaMonkey earlier than<br />

1.1.17. Such versions are reportedly affected by multiple vulnerabilities : \n\n - Multiple<br />

remote memory-corruption vulnerabilities.\n\n - Content injection vulnerabilities.\n\n - An<br />

information disclosure vulnerability.\n\n - A cross-site scripting vulnerability.\n\n - A<br />

privilege escalation vulnerability.\n\n - A security bypass vulnerability.\n\n - A URI<br />

spoofing vulnerability.\n\nFor your information, the reported version of SeaMonkey is : \n<br />

%L<br />

Solution: Upgrade to SeaMonkey 1.1.17 or later.<br />

CVE-2009-1841<br />

MyBB < 1.4.7 SQL Injection<br />

<strong>PVS</strong> ID: 5085 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server is running a PHP application that is<br />

vulnerable to a SQL-injection attack.\n\nThe remote web server is running a<br />

version of MyBB earlier than 1.4.7. Such versions reportedly fail to properly<br />

sanitize user-supplied data to the 'birthdayprivacy' parameter of the 'usercp.php'<br />

script before using it in an SQL query. An attacker could exploit this flaw to<br />

access or modify sensitive information. For your information, the reported version<br />

of MyBB is: \n %L<br />

Solution: Upgrade to MyBB 1.4.7 or later.<br />

CVE-2009-2230<br />

BASE < 1.2.5 Authentication Bypass<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1348


<strong>PVS</strong> ID: 5086 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is running a PHP application that is vulnerable to an<br />

authentication bypass attack.\n\nThe remote host is running BASE, a web-based tool for<br />

analyzing alerts from one or more SNORT sensors. The version of BASE installed on the<br />

remote host is earlier than 1.2.5. Such versions are reportedly fail to sufficiently validate<br />

'user', 'role', or passwords against the database in the 'readRoleCookie()' function of the<br />

'includes/base_auth.inc/php' script. An attacker could exploit this in order to bypass<br />

authentication and gain unauthorized access to the application. For your information, the<br />

reported version of BASE is: \n %L<br />

Solution: Upgrade to BASE version 1.2.5<br />

CVE Not available<br />

Samba < 3.3.6/3.2.13/3.0.35 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5087 FAMILY: Samba RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote Samba server may be affected by an unauthorized access<br />

vulnerability.\n\nAccording to its banner, the version of the Samba server on the remote<br />

host has a security bypass vulnerability. Access restrictions can be bypassed due to a read<br />

of uninitialized data in smbd. This could allow a user to modify an access control list<br />

(ACL), even when they should be denied permission.\n\nNote the 'dos filemode' parameter<br />

must be set to 'yes' in smb.conf in order for an attack to be successful (the default setting is<br />

'no'). For your information, the reported version of SAMBA is: \n %L<br />

Solution: Upgrade to Samba 3.3.6 / 3.2.13 / 3.0.35 or later, or apply the appropriate patch referenced<br />

in the project's advisory.<br />

CVE-2009-1886<br />

Movable Type < 4.26 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5088 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Movable Type, a blogging software for Unix and Windows platforms. The<br />

installed version is earlier than 4.26. Such versions are reportedly affected by multiple<br />

vulnerabilities : \n\n - An unspecified cross-site scripting vulnerability.\n\n - A<br />

security-bypass issue in the 'mt-wizard.cgi' script.\n\nFor your information, the reported<br />

version of Movable Type is : \n %L<br />

Solution: Upgrade to Movable Type 4.26 or later.<br />

CVE-2009-2481<br />

MyBB < 1.4.8 Multiple XSS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1349


<strong>PVS</strong> ID: 5089 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server is running a PHP application that is affected by<br />

multiple attack vectors.\n\nThe remote web server is running a version of MyBB earlier<br />

than 1.4.8. Such versions reportedly fail to properly sanitize user-supplied data to<br />

unspecified parameters in the 'Archive' and 'Attachment' features of the application. An<br />

attacker could exploit this flaw to launch cross-site scripting attacks. For your information,<br />

the reported version of MyBB is: \n %L<br />

Solution: Upgrade to MyBB 1.4.8 or later.<br />

CVE Not available<br />

FireStats < 1.6.2 SQL Injection Vulnerability<br />

<strong>PVS</strong> ID: 5090 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server is running a PHP application that is affected by<br />

multiple attack vectors.\n\nThe remote web server is running FireStats, a PHP-based<br />

website statistics application. The installed version of FireStats is earlier than 1.6.2. Such<br />

versions are reportedly affected by a SQL-injection vulnerability through an unspecified<br />

vector.\n\nFor your information, the reported version of FireStats is: \n %L<br />

Solution: Upgrade to FireStats 1.6.2 or later.<br />

CVE-2009-2144<br />

Joomla! < 1.5.12 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5091 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server contains a PHP application that is vulnerable to<br />

multiple attack vectors.\n\nThe installed version of Joomla! is earlier than 1.5.12. Such<br />

versions are reportedly affected by multiple vulnerabilities : \n\n - A cross-site scripting<br />

vulnerability in the 'PHP_SELF' property. (20090605)\n\n - A cross-site scripting<br />

vulnerability in the 'HTTP_REFERER' parameter. (20090604)\n\n - An information<br />

disclosure vulnerability because several files were missing checks for JEXEC.<br />

(20090606)\n\nFor your information, the reported version of Joomla was: \n %L<br />

Solution: Upgrade to Joomla! 1.5.12 or later.<br />

CVE Not available<br />

Horde Passwd Module < 3.1.1 XSS<br />

<strong>PVS</strong> ID: 5092 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 1350


Description: Synopsis : \n\nThe remote web server contains a PHP application that is vulnerable to<br />

cross-site scripting attacks.\n\nThe installation of Horde is using the Passwd module which<br />

provides support for changing passwords. The installed version of this module is earlier<br />

than 3.1.1. Such versions are reportedly affected by a cross-site scripting vulnerability that<br />

affects the 'backend' parameter of the 'main.php' script. An attacker can exploit this to<br />

execute arbitrary script code in the browser of an authenticated user.\nFor your<br />

information, the reported version of the Horde Passwd module is: \n %L<br />

Solution: Upgrade to Passwd H3 3.1.1 or later.<br />

CVE-2009-2360<br />

SMTP Client Account Detection<br />

<strong>PVS</strong> ID: 5093 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The host is an SMTP client using the following email address.<br />

realtime<br />

Solution: N/A<br />

CVE Not available<br />

Safari < 4.0.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5094 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

Safari installed on the remote host is earlier than 4.0.2. Such versions are potentially<br />

affected by two issues : \n\n - A vulnerability in WebKit's handling of parent and top<br />

objects may allow for cross-site scripting attacks. (CVE-2009-1724)\n\n - A memory<br />

corruption in WebKit's handling of numeric character references could lead to a crash or<br />

arbitrary code execution. (CVE-2009-1725)\n\nFor your information, the reported version<br />

of Safari is: \n %L<br />

Solution: Upgrade to Safari 4.0.2 or later.<br />

CVE-2009-1725<br />

Bugzilla < 3.2.4/3.4 RC1 <strong>Security</strong>-Bypass Vulnerability<br />

<strong>PVS</strong> ID: 5095 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is affected by a security bypass vulnerability.\n\nThe<br />

remote web server is running a version of Bugzilla earlier than 3.2.4/3.4 RC1. Such<br />

versions reportedly allow authenticated users who do not belong to the 'canconfirm' group<br />

to modify the status of bugs. An attacker could exploit this to change the status of bug<br />

reports. The reported version of Bugzilla is: \n %L<br />

Family Internet Services 1351


Solution: Upgrade to Bugzilla 3.2.4/3.4 RC1<br />

CVE Not available<br />

WordPress < 2.8.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5096 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server is running a PHP application that is vulnerable to<br />

multiple attack vectors.\n\nThe remote host is running a version of WordPress earlier than<br />

2.8.1. Such versions are reportedly affected by multiple vulnerabilities : \n\n - A username<br />

enumeration weakness caused by the application displaying different responses to login<br />

requests depending on the existence of the supplied username. (CVE-2009-2334)\n\n - A<br />

security-bypass vulnerability in the 'wp-admin/admin.php' script when it is called with the<br />

'pages' parameter set to a plug-in configuration page. An authenticated attacker could<br />

exploit this to gain access to configuration scripts. (CVE-2009-2335)\n\nThe reported<br />

version of WordPress is: \n %L<br />

Solution: Upgrade to WordPress 2.8.1/WordPress MU 2.8.1 or later.<br />

CVE-2009-2336<br />

MediaWiki 1.14.0/1.15.0 Cross-Site Scripting Vulnerability<br />

<strong>PVS</strong> ID: 5097 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server is running a PHP application that is affected by a<br />

cross-site scripting vulnerability.\n\nThe remote web server is running MediaWiki 1.14.0 or<br />

1.15.0. These versions reportedly fail to properly supply user-supplied input to the 'ip'<br />

parameter of the 'Special: Blocks' page. An attacker could exploit this flaw to launch<br />

cross-site scripting attacks. The reported version of MediaWiki is: \n %L<br />

Solution: Upgrade to MediaWiki 1.14.1/1.15.1 or later.<br />

CVE-2009-4589<br />

eDirectory < 8.8 SP5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5098 FAMILY: Generic<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running eDirectory, a directory service from Novell. The installed version is earlier than<br />

8.8 SP5. Such versions are reportedly affected by multiple vulnerabilities : \n\n - An HTTP<br />

request containing a specially crafted 'Accept-Language' header can trigger a stack-based<br />

buffer-overflow. This issue affects the iMonitor service. (Bug 484007/446342)\n\n - A<br />

denial of service vulnerability exists when multiple wild-cards are used in RDN. (Bug<br />

458504)\n\n - A malformed bind LDAP packet can cause eDir to crash. (Bug<br />

Family Internet Services 1352


492592)\n\nThe reported version of eDirectory is : \n %L<br />

Solution: Upgrade to eDirectory 8.8 SP5 or later.<br />

CVE-2009-0192<br />

Google Chrome < 2.0.172.37 Buffer Overflow<br />

<strong>PVS</strong> ID: 5099 FAMILY: Web Clients RISK: HIGH NESSUS ID:39852<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is vulnerable multiple attack<br />

vectors.\n\nThe version of Google Chrome installed on the remote host is earlier than<br />

2.0.172.37. Such versions are reportedly affected by multiple vulnerabilities : \n\n - A heap<br />

overflow exists when evaluating specially crafted regular expressions in Javascript. This<br />

could lead to a denial of service or the remote execution of arbitrary code withing the<br />

Google Chrome sandbox.\n\n - A memory corruption issue exists in the renderer process<br />

that could cause a denial of service or possibly allow arbitrary code execution with the<br />

privileges of the logged on user. \n\n - A denial-of-service issue when the application<br />

handles a maliciously crafted webpage containing a 'HTMLSelectElement' object with a<br />

large length attribute.\n\nThe reported version of Google Chrome is: \n %L<br />

Solution: Upgrade to Google Chrome 2.0.172.37 or later.<br />

CVE-2009-2535<br />

Real<strong>Network</strong>s Helix Server 12.x Multiple DoS<br />

<strong>PVS</strong> ID: 5100 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:40350<br />

Description: Synopsis :\n\nThe remote media streaming server is affected by multiple denial of service<br />

vulnerabilities.\n\nAccording to its banner, The remote host is running version 12.x of<br />

Real<strong>Network</strong>s Helix Server / Helix Mobile Server. Such versions are reportedly affected by<br />

multiple issues :\n\n - By sending a specially crafted 'RTSP' (SET_PARAMETERS)<br />

request with 'DataConvertBuffer' parameter set to empty, an attacker may be able to crash<br />

the remote Helix server process. (CVE-2009-2533)\n\n - By sending a 'SETUP' request<br />

without including a '/' character in it, a remote attacker may be able to crash the remote<br />

Helix server process. (CVE-2009-2534)<br />

Solution: Update to Real<strong>Network</strong>s Helix Server / Helix Mobile Server 13.0.0 or later.<br />

CVE-2009-2534<br />

Firefox < 3.0.12 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5101 FAMILY: Web Clients RISK: HIGH NESSUS ID:40351<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors\n\nThe installed<br />

version of Firefox is earlier than 3.0.12. Such versions are potentially affected by the<br />

following security issues :\n\n - Multiple memory corruption vulnerabilities could<br />

potentially be exploited to execute arbitrary code. (MFSA 2009-34)\n\n - It may be possible<br />

Family Internet Services 1353


to crash the browser or potentially execute arbitrary code by using a flash object that<br />

presents a slow script dialog. (MFSA 2009-35)\n\n - Glyph rendering libraries are affected<br />

by multiple heap/integer overflows. (MFSA 2009-36)\n\n - A vulnerability involving SVG<br />

element could be exploited to crash the browser or execute arbitrary code on the remote<br />

system. (MFSA 2009-37)\n\n - A vulnerability in 'setTimeout' could allow unsafe access to<br />

the 'this' object from chrome code. An attacker could exploit this flaw to run arbitrary<br />

JavaScript with chrome privileges. (MFSA 2009-39)\n\n - It may be possible for JavaScript<br />

from one website to bypass cross-origin wrapper, and unsafely access properties of an<br />

object from another website. (MFSA 2009-40)<br />

Solution: Upgrade to Firefox 3.0.12 or later.<br />

CVE-2009-2472<br />

Joomla! < 1.5.13 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5102 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors\n\nThe installed<br />

version of Joomla! is earlier than 1.5.13. Such versions are reportedly affected by multiple<br />

vulnerabilities :\n\n - A flaw which affects the TinyMCE editor would allow a remote<br />

attack to upload and execute arbitrary files\n\n - A failure to parse user-supplied input to<br />

'JEXEC' would allow a remote attacker to glean internal path information<br />

Solution: Upgrade to Joomla! 1.5.13 or later.<br />

CVE Not available<br />

RaidenHTTPD workspace.php ulang Parameter Local File Inclusion<br />

<strong>PVS</strong> ID: 5103 FAMILY: Web Servers RISK: HIGH NESSUS ID:29728<br />

Description: Synopsis :\n\nThe remote web server contains a PHP script that is susceptible to a local file<br />

include attack.\n\nThe remote host is running RaidenHTTPD, a web server for Windows.<br />

The version of RaidenHTTPD installed on the remote host fails to sanitize user-supplied<br />

input to the 'ulang' parameter in scripts '/raidenhttpd-admin/workspace.php' and<br />

'/raidenhttpd-admin/menu.php' before using it to include PHP code. Provided the server's<br />

WebAdmin feature has been enabled, an unauthenticated remote attacker can leverage this<br />

issue to view arbitrary files or to execute arbitrary PHP code on the remote host, subject to<br />

the privileges under which the server operates, which is SYSTEM by default.<br />

Solution: Upgrade to RaidenHTTPD Server 2.0.27 or later.<br />

CVE-2007-6453<br />

CommuniGate Pro POP3 < 5.1c2 Buffer Overflow<br />

<strong>PVS</strong> ID: 5104 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 1354


Description: Synopsis : \n\nThe remote host is vulnerable to an HTML Injection attack\n\nThe version<br />

of CommuniGate Pro running on the remote host is prone to an HTML injection flaw. The<br />

root cause of this flaw is a failure within the CommuniGate software when processing a<br />

specially formatted URI. An attacker, exploiting this flaw, would need to be able to entice a<br />

user into opening an email. Upon opening the email, the attacker would be able to execute<br />

arbitrary script code.\n\nFor your information, the reported version of CommuniGatePro is:<br />

\n %L \n<br />

Solution: Upgrade to CommuniGate Pro 5.2.15 or newer.<br />

CVE Not available<br />

Snitz Forum < 3.4.0.08 SQL Injection<br />

<strong>PVS</strong> ID: 5105 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack\n\nThe remote host<br />

seems to be running Snitz Forum, a web forum application implemented in ASP. This<br />

version of Snitz ('%L') is reported vulnerable to a SQL injection flaw within the 'email'<br />

parameter of the 'register.asp' script. An attacker, exploiting this flaw, would send specially<br />

formed HTTP queries to the register.asp script. These queries would include SQL<br />

statements which would ultimately be executed on the database utilized by Snitz.<br />

Solution: Upgrade to Snitz Forum 3.4.0.08 or higher<br />

CVE-2003-0286<br />

WordPress < 2.8.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5106 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a cross-site scripting (XSS) attack\n\nThe<br />

remote host is running a version of WordPress earlier than 2.8.2. Such versions are<br />

reportedly affected by a cross-site scripting vulnerability. In particular, the 'uri' parameter<br />

of the 'wp-comments-post.php' script is not sufficiently sanitized. An attacker, exploiting<br />

this flaw, would be able to inject script code which would be executed within the browser.<br />

In order to exploit this flaw, the attacker would need to be able to entice an unsuspecting<br />

user into opening a specially formatted URI. For your information, the reported version of<br />

WordPress is: \n %L \n<br />

Solution: Upgrade to WordPress 2.8.1/WordPress MU 2.8.2 or later.<br />

CVE Not available<br />

ISC BIND Dynamic Update Message Handling Remote DoS<br />

<strong>PVS</strong> ID: 5107 FAMILY: DNS Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:40422<br />

Family Internet Services 1355


Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack\n\nThe<br />

version of BIND installed on the remote host suggests that it suffers from a denial of<br />

service vulnerability, which may be triggered by sending a malicious dynamic update<br />

message to a zone for which the server is the master, even if that server is not configured to<br />

allow dynamic updates. Note that <strong>PVS</strong> obtained the version by observing the response to a<br />

'version.bind', the value of which can be and sometimes is tweaked by DNS administrators.<br />

Solution: Upgrade to BIND 9.4.3-P3 / 9.5.1-P3 / 9.6.1-P3 or later<br />

CVE-2009-0696<br />

Squid 3.0.STABLE16 / 3.10.11 Remote DoS<br />

<strong>PVS</strong> ID: 5108 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:40420<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS)<br />

attack\n\nAccording to its banner, the version of the Squid proxy caching server installed<br />

on the remote host is older than 3.0.STABLE17 or 3.1.0.12. Such versions reportedly use<br />

incorrect bounds checking when processing some requests or responses. Squid-2.x releases<br />

are not vulnerable.<br />

Solution: Either upgrade to Squid version 3.0.STABLE17 or 3.1.0.12 or later or apply the patch<br />

referenced in the project's advisory above.<br />

CVE-2009-2622<br />

Adobe AIR < 1.5.2 Multiple Vulnerabilities (APSB09-10)<br />

<strong>PVS</strong> ID: 5109 FAMILY: Web Clients RISK: HIGH NESSUS ID:40447<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors\n\nThe remote<br />

Windows host contains a version of Adobe AIR Player that is earlier than 1.5.2. Such<br />

versions are reportedly affected by multiple vulnerabilities :\n\n - A memory corruption<br />

vulnerability that could potentially lead to code execution. (CVE-2009-1862)\n\n - A<br />

privilege escalation vulnerability that could potentially lead to code execution.<br />

(CVE-2009-1863)\n\n - A heap overflow vulnerability that could potentially lead to code<br />

execution. (CVE-2009-1864)\n\n - A null pointer vulnerability that could potentially lead to<br />

code execution. (CVE-2009-1865)\n\n - A stack overflow vulnerability that could<br />

potentially lead to code execution. (CVE-2009-1866)\n\n - A clickjacking vulnerability that<br />

could allow an attacker to lure a web browser user into unknowingly clicking on a link or<br />

dialog. (CVE-2009-1867)\n\n - A URL parsing heap overflow vulnerability that could<br />

potentially lead to code execution. (CVE-2009-1868)\n\n - An integer overflow<br />

vulnerability that could potentially lead to code execution. (CVE-2009-1869)\n\n - A local<br />

sandbox vulnerability that could potentially lead to information disclosure when SWFs are<br />

saved to the hard drive. CVE-2009-1870)<br />

Solution: Upgrade to Adobe AIR version 1.5.2 or later."<br />

CVE-2009-1870<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1356


Apple iPhone < 3.0.1 Overflow<br />

<strong>PVS</strong> ID: 5110 FAMILY: Mobile Devices RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is an<br />

iPhone version 3.x mobile phone. The observed banner was: \n %L \n\nThis version of<br />

iPhone is vulnerable to a flaw in the way that it handles malformed SMS text messages. An<br />

attacker, exploiting this flaw, would be able to execute arbitrary code on the remote system.<br />

Solution: Upgrade to iPhone version 3.0.1 or higher<br />

CVE-2009-2204<br />

Apache < 2.2.12 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5111 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server may be affected by several issues.\n\nAccording to<br />

its banner, the version of Apache 2.2 installed on the remote host is older than 2.2.12. Such<br />

versions may be affected by several issues : \n\n - A denial-of-service vulnerability in the<br />

'mod_proxy' module could be exploited to cause the process to consume large amounts of<br />

CPU resources. (CVE-2009-1890)\n\n - The 'mod_deflate' module is prone to a remote<br />

denial-of-service vulnerability when large file downloads are terminated before completing.<br />

(CVE-2009-1891)\n\n<strong>PVS</strong> cannot determine whether the affected modules are in use. The<br />

installed version of Apache is: \n %L<br />

Solution: Either ensure that the affected modules are not in use or upgrade to Apache version 2.2.12<br />

or later.<br />

CVE-2009-1891<br />

VLC Media Player < 1.0.1 Remote Integer Underflow<br />

<strong>PVS</strong> ID: 5112 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host contains an application that is affected by an integer<br />

underflow vulnerability.\n\nThe version of VLC media player installed on the remote host<br />

is earlier than 1.0.1. Such versions contain a flaw in the 'modules/access/rtsp/real.c' file of<br />

VLC Player. If an attacker can trick a user into opening a specially crafted RDT data<br />

stream, he may be able to execute arbitrary code within the context of the affected<br />

application. The reported version of VLC is: \n %L<br />

Solution: Upgrade to VLC Media Player 1.0.1 or later.<br />

CVE Not available<br />

Firefox < 3.0.13/3.5.0 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5113 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1357


Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe<br />

installed version of Firefox is earlier than 3.0.13/3.5.0. Such versions are<br />

reportedly potentially affected by the following security issues : \n\n - The browser<br />

can be fooled into trusting a malicious SSL server certificate with a null character<br />

in the host name. (MFSA 2009-42)\n\n - A heap overflow in the code that handles<br />

regular expressions in certificate names can lead to arbitrary code execution.<br />

(MFSA 2009-43)\n\nThe reported version of Firefox is: \n %L<br />

Solution: Upgrade to Firefox 3.5.0/3.0.13 or later.<br />

CVE-2009-2408<br />

Mozilla Firefox < 3.5.2/3.0.12 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5114 FAMILY: Web Clients RISK: HIGH NESSUS ID:40479<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe installed<br />

version of Mozilla Firefox is earlier than 3.5.2/3.0.12. Such versions are potentially<br />

affected by multiple issues : \n\n - A denial-of-service vulnerability when Firefox receives a<br />

reply from a SOCKS5 proxy which contains a DNS name longer than 15 characters.<br />

(CVE-2009-2470)\n\n - Multiple flaws exist in the 'libvorbis' library could lead to remote<br />

code execution. (CVE-2009-2663)\n\nThe reported version of Mozilla Firefox was: \n %L<br />

Solution: Upgrade to Mozilla Firefox 3.5.2/3.0.12 or later.<br />

CVE-2009-2663<br />

Mozilla Firefox < 3.0.13/3.5.2 Proxy Response DoS<br />

<strong>PVS</strong> ID: 5115 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe installed<br />

version of Firefox is earlier than 3.0.13/3.5.2. Such versions are reportedly affected by<br />

multiple memory corruption vulnerabilities. An attacker could exploit one of these issues to<br />

corrupt memory on the affected host and potentially run arbitrary code in the context of the<br />

user running the affected application. The reported version of Mozilla Firefox was: \n %L<br />

Solution: Upgrade to Mozilla Firefox 3.5.2/3.0.12 or later.<br />

CVE-2009-2664<br />

Mozilla Firefox 3.5 < 3.5.2 Proxy Response DoS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5116 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is affected by a privilege escalation vulnerability.\n\nThe<br />

installed version of Mozilla Firefox 3.5 is earlier than 3.5.2. Such versions are potentially<br />

affected by a privilege-escalation vulnerability. The issues exists when the browser with an<br />

add-on implementing a Content Policy opens pages that have a 'Link:' HTTP header. An<br />

attacker can exploit this issue to execute arbitrary JavaScript code with chrome<br />

privileges.\n%L<br />

Family Internet Services 1358


Solution: Upgrade to Mozilla Firefox 3.5.2/3.0.12 or later.<br />

CVE-2009-2665<br />

LoJack Software Detection<br />

<strong>PVS</strong> ID: 5117 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the 'Lojack' software for laptops. This software registers itself<br />

with a central Internet server which allows stolen devices to be tracked.<br />

Solution: N/A<br />

CVE Not available<br />

Apple GarageBand < 5.1 Information Disclosure<br />

<strong>PVS</strong> ID: 5118 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to an information disclosure<br />

vulnerability.\n\nThe remote host is running Apple GarageBand, an application used to<br />

created music. The installed version of GarageBand is earlier than 5.1. Such versions<br />

potentially are affected by an issue caused by GarageBand changing the Apple Safari<br />

browser's preferences to cause the browser to accept cookies from third party sites. An<br />

attacker could exploit this to obtain sensitive information and track a user's web activities.<br />

The reported version of Apple GarageBand is: \n %L<br />

Solution: Upgrade to Apple GarageBand 5.1 or later.<br />

CVE-2009-2198<br />

IBM DB2 Client Detection<br />

<strong>PVS</strong> ID: 5119 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is an IBM DB2 client<br />

Solution: N/A<br />

CVE Not available<br />

WordPress < 2.8.3 Multiple <strong>Security</strong> Bypass Vulnerabilities<br />

<strong>PVS</strong> ID: 5120 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of WordPress earlier than 2.8.3. Such versions are reportedly affected<br />

by multiple security-bypass vulnerabilities in the 'wp-admin' administrative scripts.<br />

Family Internet Services 1359


Authenticated attackers can exploit this issue to gain access to administrative functions. For<br />

your information, the reported version of WordPress is: \n %L<br />

Solution: Upgrade to WordPress 2.8.3 or later.<br />

CVE Not available<br />

Bugzilla < 3.4.1 Information Disclosure<br />

<strong>PVS</strong> ID: 5121 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an information disclosure flaw.\n\nThe<br />

remote host is running Bugzilla, a bug-tracking software with a web interface. The version<br />

of Bugzilla on the remote host suffers from flaw which allows authenticated users who can<br />

edit bugs to view names of all products through the 'show_bug.cgi' script.<br />

Solution: Upgrade to Bugzilla 3.4.1 or later.<br />

CVE Not available<br />

Mac OS X 10.5 < 10.5.8 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5122 FAMILY: Generic RISK: HIGH NESSUS ID:40502<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of Mac OS X 10.5 that is older than version 10.5.8. Mac OS X 10.5.8<br />

contains security fixes for the following products : \n\n - bzip2\n - CF<strong>Network</strong>\n -<br />

ColorSync\n - CoreTypes\n - Dock\n - Image RAW\n - ImageIO\n - Kernel\n - launched\n<br />

- Login Window\n - MobileMe\n - <strong>Network</strong>ing\n - XQuery\n\nFor your information, the<br />

reported version of Mac OS X is: \n %L<br />

Solution: Upgrade to Mac OS X 10.5.8 or later.<br />

CVE-2009-2194<br />

CMS Made Simple < 1.6.3 Local File Include Vulnerability<br />

<strong>PVS</strong> ID: 5123 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:40551<br />

Description: Synopsis : \n\nThe remote web server is running a PHP application that is affected by an<br />

information disclosure vulnerability.\n\nThe remote host is running CMS Made Simple, a<br />

web-based content manager written in PHP. The installed version of CMS Made Simple is<br />

earlier than 1.6.2. Such versions are potentially affected by an information disclosure<br />

vulnerability because they fail to properly sanitize user supplied data to the 'url' parameter<br />

of the 'modules/Printing/output.php' script. For your information, the reported version of<br />

CMS Made Simple is: \n %L<br />

Solution: Upgrade to CMS Made Simple 1.6.3 or later.<br />

Family Internet Services 1360


CVE Not available<br />

Oracle Secure Enterprise Search 10.x Version Detection<br />

<strong>PVS</strong> ID: 5124 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server is running the Oracle Secure Enterprise Search version %L<br />

Solution: N/A<br />

CVE Not available<br />

Safari < 4.0.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5125 FAMILY: Web Clients RISK: HIGH NESSUS ID:40554<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

Safari installed on the remote host is earlier than 4.0.3. Such versions are potentially<br />

affected by several issues : \n\n - A buffer overflow exists in the handling of EXIF<br />

metadata could lead to a crash or arbitrary code execution. (CVE-2009-2188)\n\n - A<br />

vulnerability in WebKit's parsing of floating point numbers may allow for remote code<br />

execution. (CVE-2009-2195)\n\n - A vulnerability in Safari may let a malicious website to<br />

be promoted in Safari's Top Sites. (CVE-2009-2196)\n\n - A vulnerability in how WebKit<br />

renders an URL with look alike characters could be used to masquerade a website.<br />

(CVE-2009-2199)\n\n - A vulnerability in WebKit may lead to the disclosure of sensitive<br />

information. (CVE-2009-2200)\n\n - A heap buffer overflow in CoreGraphics involving the<br />

drawing of long text strings could lead to a crash or arbitrary code execution.<br />

(CVE-2009-2468)\n\nFor your information, the reported version of Safari is: \n %L<br />

Solution: Upgrade to Safari 4.0.3 or later.<br />

CVE-2009-2468<br />

WordPress < 2.8.4 <strong>Security</strong> Bypass Vulnerability<br />

<strong>PVS</strong> ID: 5126 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:40578<br />

Description: Synopsis : \n\nThe remote host is affected by a security bypass vulnerability.\n\nThe<br />

remote host is running a version of WordPress earlier than 2.8.4. Such versions are<br />

potentially affected by a flaw in the 'reset_password()' function of the 'wp-login.php' script<br />

which allows an attacker to reset the password for the first account without a key in the<br />

database (usually the admin account). For your information, the reported version of<br />

WordPress is: \n %L<br />

Solution: Upgrade to WordPress 2.8.4 or later.<br />

CVE-2009-2762<br />

Microsoft IIS 7.0 Webserver Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1361


<strong>PVS</strong> ID: 5127 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running an IIS 7.0 web server<br />

Solution: N/A<br />

CVE Not available<br />

MS09-036: Vulnerability in ASP.NET in Microsoft Windows Could Allow Denial of Service (970957)<br />

<strong>PVS</strong> ID: 5128 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:40555<br />

Description: Synopsis :\n\nThe remote .Net Framework is susceptible to a denial of service<br />

attack\n\nThe remote host is running a version of the .NET Framework component of<br />

Microsoft Windows that is suspectible to a denial of service attack due to the way<br />

ASP.NET manages request scheduling. Using specially crafted anonymous HTTP requests,<br />

an anonymous remote attacker can cause the web server to become unresponsive until the<br />

associated application pool is restarted. Note that the vulnerable code in the .NET<br />

Framework is exposed only through IIS 7.0 when operating in integrated mode. \nIAVB<br />

Reference : 2009-B-0036\nSTIG Finding Severity : Category I<br />

Solution: Microsoft has released a set of patches for .NET Framework 2.0 and 3.5<br />

CVE-2009-1536<br />

Microsoft SQL Client Detection<br />

<strong>PVS</strong> ID: 5129 FAMILY: Database<br />

Description: Detects Microsoft SQL clients.<br />

Solution: N/A<br />

CVE Not available<br />

Curl < 7.19.6 Certificate Validation Bypass Vulnerability<br />

RISK: Risk<br />

not available<br />

NESSUS ID:Not Available<br />

<strong>PVS</strong> ID: 5130 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host may be affected by a security bypass vulnerability.\n\nThe<br />

remote host is running Curl, a download client for various protocols. This version of Curl<br />

reportedly fails to properly validate the domain name in a signed CA certificate because the<br />

application stops reading the domain name when it encounters a NULL character. An<br />

attacker can exploit this by obtaining a legitimate certificate for a subdomain that contains a<br />

NULL character. This issue only affects Curl when it is compiled against OpenSSL. For<br />

your information, the reported version of Curl is: \n %L<br />

Solution: Upgrade to Curl version 7.19.6<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1362


CVE-2009-2417<br />

ViewVC < 1.0.9 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5131 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running ViewVC, a web-based interface for CVS and Subversion. The installed version<br />

of ViewVC is earlier than 1.0.9. Such versions are potentially affected by multiple issues :<br />

\n\n - A cross-site scripting vulnerability in the 'view' parameter.\n\n - An unspecified<br />

vulnerability that may allow attackers to print illegal parameter names and values.\n\nFor<br />

your information, the reported version of ViewVC is: \n %L<br />

Solution: Upgrade to ViewVC 1.0.9 or later.<br />

CVE Not available<br />

Sun Java System Access Manager 7.1 < Patch 2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5132 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:35618<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of Sun Java System Access Manager 7.1 earlier than Patch 2. Such<br />

versions are potentially affected by multiple issues : \n\n - A vulnerability may allow<br />

unauthorized access to resources by revealing passwords to remote users who have<br />

privileges to access the administration console. (1-66-242166-1)\n\n - A sub-realm<br />

administrator may be able to escalate their privileges and access the root realm as an<br />

administrator. (1-66-249106-1)\n\n - A username-enumeration weakness could allow an<br />

attacker to determine valid user-names. (1-66-242026-1)\n\nFor your information, the<br />

installed version of Sun Java System Access Manager is: \n %L \nIAVT Reference :<br />

2009-T-0007\nSTIG Finding Severity : Category II<br />

Solution: Upgrade to Sun Java System Access Manager 7.1 Patch 2. This may require different<br />

patches depending on your installation type.<br />

CVE-2009-0348<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Sun Java System Access Manager 7.1 < Patch 3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5133 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of Sun Java System Access Manager 7.1 earlier than Patch 3. Such<br />

versions are potentially affected by multiple issues :\n\n - A vulnerability related to the<br />

CDCServlet component may result in policy advice being presented to the wrong client.<br />

(1-66-25968-1)\n\n - The software amy disclose clear text passwords in debug files when<br />

the debug flag is enabled. A local unprivileged user could gain unauthorized access to user<br />

identities.\n\n - A vulnerability may exist when the server processes specially crafted XML<br />

Family Internet Services 1363


documents which may allow an attacker to crash the service or possibly execute arbitrary<br />

code.\n\nFor your inforation, the installed version of Sun Java System Access Manager<br />

is:\n\n%L<br />

Solution: Upgrade to Sun Java System Access Manager 7.1 Patch 3 or later. This may required<br />

different patches depending your installation type.<br />

CVE-2008-4226<br />

Sun OpenSSO Enterprise 8.0 < Patch1 Update1 Memory Corruption<br />

<strong>PVS</strong> ID: 5134 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a denial-of-service attack.\n\nThe remote<br />

host is running a version of Sun OpenSSO Enterprise 8.1 earlier than Patch1 Update1. Such<br />

versions are potentially affected by a memory corruption vulnerability which an attacker<br />

could exploit to crash the affected service, or potentially execute arbitrary code through a<br />

specially crafted XML document. For your information, the reported version of Sun<br />

OpenSSO Enterprise is: \n %L<br />

Solution: Upgrade to Sun OpenSSO Enterprise 8.0 Patch1 Update1. This may require different<br />

patches depending on your installation type.<br />

CVE-2008-4226<br />

MySQL Database Server Detection<br />

<strong>PVS</strong> ID: 5135 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server is running the MySQL database server<br />

Solution: N/A<br />

CVE Not available<br />

MySQL Database Client Detection<br />

<strong>PVS</strong> ID: 5136 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server is running a MySQL database client<br />

Solution: N/A<br />

CVE Not available<br />

Pidgin < 2.5.9 Buffer Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5137 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:40663<br />

Family Internet Services 1364


Description: Synopsis : \n\nThe remote host is affected by a buffer overflow vulnerability.\n\nThe<br />

remote host is running Pidgin 2.5.9. Such versions reportedly trigger an memcpy to an<br />

invalid location in memory when receiving two consecutive specially crafted SLP message.<br />

For your information, the reported version of Pidgin is: \n %L<br />

Solution: Upgrade to Pidgin 2.5.9 or later.<br />

CVE-2009-2694<br />

Buildbot < 0.7.11p3 Multiple Cross-site Scripting Vulnerabilities<br />

<strong>PVS</strong> ID: 5138 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Buildbot, a software project to automate the compile test cycle for software<br />

projects. The installed version is earlier than 0.7.11p3. Such versions are potentially<br />

affected by multiple cross-site scripting vulnerabilities. For your information, the reported<br />

version of Buildbot was: \n %L<br />

Solution: Upgrade to Buildbot 0.7.11p3 or later.<br />

CVE-2009-2967<br />

TortoiseSVN < 1.5.6 / 1.6.0-1.6.3 Multiple Integer Overflows<br />

<strong>PVS</strong> ID: 5139 FAMILY: Generic RISK: HIGH NESSUS ID:40620<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe installed<br />

version of the TortoiseSVN is affected by multiple heap overflow issues. Specifically, the<br />

'libsvn_delta' library fails to perform sufficient boundary checks before processing certain<br />

svndiff streams. An attacker with commit access to a vulnerable Subversion server could<br />

exploit this vulnerability from a Subversion client to trigger a heap overflow on the server.<br />

Typically such an attack would result in a denial of service condition or arbitrary code<br />

execution. An attacker could also trigger this issue from a rogue Subversion server on a<br />

Subversion client in response to a checkout or update request. For your information, the<br />

reported version of TortoiseSVN is: \n %L<br />

Solution: Upgrade to TortoiseSVN 1.5.7/1.6.4 or later.<br />

CVE-2009-2411<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

SVN < 1.5.6 / 1.6.0-1.6.3 Multiple Integer Overflows<br />

<strong>PVS</strong> ID: 5140 FAMILY: Generic RISK: HIGH NESSUS ID:40620<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe installed<br />

version of SVN is affected by multiple heap overflow issues. Specifically, the 'libsvn_delta'<br />

library fails to perform sufficient boundary checks before processing certain svndiff<br />

streams. An attacker with commit access to a vulnerable Subversion server could exploit<br />

this vulnerability from a Subversion client to trigger a heap overflow on the server.<br />

Family Internet Services 1365


Typically such an attack would result in a denial of service condition or arbitrary code<br />

execution. An attacker could also trigger this issue from a rogue Subversion server on a<br />

Subversion client in response to a checkout or update request. For your information, the<br />

reported version of SVN is: \n %L<br />

Solution: Upgrade to SVN 1.5.7/1.6.4 or later.<br />

CVE-2009-2411<br />

Google Chrome < 2.0.172.43 Remote Code Execution<br />

<strong>PVS</strong> ID: 5141 FAMILY: Web Clients RISK: HIGH NESSUS ID:40778<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is vulnerable to a remote code<br />

execution attack.\n\nThe version of Google Chrome installed on the remote host is earlier<br />

than 2.0.172.43. Such versions have a flaw in the V8 Javascript engine which could<br />

potentially allow specially-crafted Javascript on a eb page to read unauthorize memory,<br />

bypassing security checks. An attacker could exploit this to run arbitrary code within the<br />

Chrome sand-box. For your information, the reported version of Google Chrome is: \n %L<br />

Solution: Upgrade to Google Chrome 2.0.172.43 or later.<br />

CVE-2009-2935<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

IBM WebSphere Application Server 7.0 < Fix Pack 5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5142 FAMILY: Web Servers RISK: HIGH NESSUS ID:40823<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack<br />

vectors.\n\nIBM WebSphere Application Server 7.0 before Fix Pack<br />

5 appears to be running on the remote host. Such versions are<br />

reportedly affected by multiple vulnerabilities.\n\n - Invoking an<br />

MBean that does not have type key-property results in a<br />

NullPointerException. (PK78743)\n\n - Deployment fails to properly<br />

handle password in webservices client modules. (PK79275)\n\n -<br />

IBM-portlet-ext.xmi is not reading correctly the portlet serving<br />

enable parameter. (PK89385)\n\n - An attacker may be able to obtain<br />

sensitive information, caused by an error during the migration from<br />

WebSphere Application Server 6.1 to 7.0 when tracing is enabled.<br />

(PK80337)\n\n - Deploying new applications on WebSphere<br />

Application Server for z/OS prior to 1.8 can result in the application<br />

being saved on the file system with insecure permissions.<br />

(PK83308)\n\n - A security-bypass vulnerability due to a design<br />

error in the Single Sign-on with SPENEGO implementation. When<br />

setting the custom property<br />

'ws.webcontainer.invokefilterscompatibility' to true, an attacker can<br />

bypass the SSO authentication on security URLs. (PK77465)\n\n A<br />

security-bypass vulnerability due to an unspecified error when<br />

configured with CSIv2 <strong>Security</strong> is configured with Identity<br />

Assertion. (PK83097)\n\nFor your information, the reported version<br />

Family Internet Services 1366


of WebSphere is: \n %L<br />

Solution: Apply Fix Pack 5 (7.0.0.5) or later.<br />

CVE-2009-2092<br />

Altiris Deployment Solution < 6.9.430 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5143 FAMILY: Generic RISK: HIGH NESSUS ID:43828<br />

Description: Synopsis : \n\nThe remote Windows host is vulnerable to multiple attack vectors.\n\nThe<br />

version of Altiris Deployment Solution installed on the remote host is earlier than 6.9 SP3<br />

Build 430. Such versions are potentially affected by multiple issues : \n\n - An<br />

authentication bypass vulnerability when 'DBManager' authentication is used.\n\n - An<br />

authentication-bypass vulnerability caused by a race condition when files are transfered<br />

from the server to a client.\n\n A local privilege escalation vulnerability in the 'Aclient'<br />

client GUI. \n\n - A race-condition exists in the 'AClient' client application that an attacker<br />

can exploit to execute malicious commands with SYSTEM-level privileges. \n\nFor your<br />

information, the reported version of Altiris Deployment Solution is: \n %L<br />

Solution: Upgrade to Altiris Deployment Solution 6.9 SP3 Build 430<br />

CVE-2009-3109<br />

FlexCMS < 3.0 'CookieUsername' Parameter SQL Injection<br />

<strong>PVS</strong> ID: 5144 FAMILY: CGI RISK: HIGH NESSUS ID:40824<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a SQL injection attack.\n\nThe remote host<br />

is running FlexCMS, a content management system written in PHP. The installed version<br />

of FlexCMS is earlier than 3.0. Such versions are potentially affected by a SQL injection<br />

vulnerability in the 'CookieUsername' cookie parameter. An attacker, exploiting this flaw,<br />

may be able to compromise the application. Note, that this requires magic_quotes_gpc to be<br />

turned off.\n\nFor your information, the reported version of FlexCMS was: \n %L<br />

Solution: Upgrade to FlexCMS 3.0 or later.<br />

CVE Not available<br />

OpenOffice < 3.1.1 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5145 FAMILY: Generic RISK: HIGH NESSUS ID:40826<br />

Description: Synopsis : \n\nThe remote host has a program that is vulnerable to multiple attack<br />

vectors.\n\nThe version of OpenOffice is earlier than 3.1.1. Such versions are potentially<br />

affected by several issues : \n\n - A boundary error when parsing certain records can be<br />

exploited to cause a heap-based buffer overflow via a specially crafted document.<br />

(CVE-2009-0201)\n\n - An integer underflow error when parsing certain records in the<br />

document table. (CVE-2009-0200)\n\n - A vulnerability in the parser of EMFS files can<br />

lead to the execution of arbitrary commands. (CVE-2009-2139)\n\nFor your information,<br />

the reported version of OpenOffice is: \n %L<br />

Family Internet Services 1367


Solution: Upgrade to OpenOffice version 3.1.1 or later.<br />

CVE-2009-0201<br />

Opera < 10.00 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5146 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:40827<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

Opera installed on the remote host is earlier than 10.00 and thus potentially affected by<br />

multiple issues : \n\n - The collapsed Address bar can in some cases temporarily show the<br />

previous domain of the present site. (930)\n\n - Certificates which use a wild card<br />

immediately before the top level domain, or nulls in the domain name, may pass validation<br />

checks in Opera. (934)\n\n - Some Unicode characters are treated incorrectly which might<br />

cause international domain names that use them to be shown in the wrong format. Showing<br />

these addresses in Unicode instead of punycode could allow for limited address spoofing.<br />

(932)\n\n - Opera does not check the revocation status for intermediate certificates not<br />

served by the server. (929)\n\nFor your information, the reported version of Opera is: \n<br />

%L<br />

Solution: Upgrade to Opera 10.00 or later.<br />

CVE Not available<br />

SquirrelMail < 1.4.20 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5147 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to cross-site request forgery.\n\nThe remote<br />

host is running SquirrelMail, a web-based email client. The installed version of<br />

SquirrelMail is potentially affected by cross-site request forgery vulnerabilities on all form<br />

submissions. For your information, the installed version of SquirrelMail is:%L<br />

Solution: Upgrade to SquirrelMail 1.4.20 RC1 or later.<br />

CVE-2009-2964<br />

Sybase SQL-Anywhere Database Server Detection<br />

<strong>PVS</strong> ID: 5148 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is running the Sybase SQL-Anywhere database server<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1368


Sybase SQL-Anywhere Database Client Detection<br />

<strong>PVS</strong> ID: 5149 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server is running a Sybase SQL-Anywhere database client<br />

Solution: N/A<br />

CVE Not available<br />

Sybase SQL-Anywhere Database Server Default Credentials<br />

<strong>PVS</strong> ID: 5150 FAMILY: Database RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials\n\nThe remote web server is running the Sybase SQL-Anywhere database<br />

server with default credentials. That is, the Sybase SQL Anywhere server ships with the<br />

default administrative credentials of 'dba/sql'. The <strong>PVS</strong> has just observed a user logging in<br />

using those credentials.<br />

Solution: Change the credentials and require an encrypted login<br />

CVE Not available<br />

Sun GlassFish Server 3.0 Preview Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5151 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the Sun GlassFish Server 3.0 Preview. This versions is potentially affected by<br />

multiple issues : \n\n - An information disclosure vulnerability affects the 'filename' and<br />

'file' parameters of the 'jsft_resource.jsf' script.\n\n - An information disclosure<br />

vulnerability affects the 'file' and 'filename' parameters of the 'scale_static_resource.jsf'<br />

script.\n\nFor your information, the reported version of Sun GlassFish is: \n %L<br />

Solution: Use the current stable version 2 of Sun GlassFish Enterprise Server.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla SeaMonkey < 1.1.18 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5152 FAMILY: Web Clients RISK: HIGH NESSUS ID:40874<br />

Description: Synopsis : \n\nThe remote host is running a web browser that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running a version of Mozilla SeaMonkey earlier than<br />

1.1.18. Such versions are potentially affected by multiple vulnerabilities : \n\n - A heap<br />

overflow vulnerability in the code that handles regular expressions in certificate names.<br />

(MFSA-2009-43)\n\n - A mismatch in the treatment of domain names in SSL certificates<br />

between SSL clients and the Certificate Authorities which issue server certificates.<br />

(MFSA-2009-42)\n\nFor your information, the reported version of SeaMonkey is: \n %L<br />

Family Internet Services 1369


Solution: Upgrade to SeaMonkey 1.1.18 or later.<br />

CVE-2009-2408<br />

Windows Media Services Remote Code Execution (MS09-047)<br />

<strong>PVS</strong> ID: 5153 FAMILY: Generic RISK: HIGH NESSUS ID:40890<br />

Description: Synopsis : \n\nThe remote media streaming server is vulnerable to multiple remote code<br />

execution attack.\n\nThe remote host is running a version of Windows Media Services that<br />

is potentially affected by a remote code execution vulnerability when processing specially<br />

crafted media files. For your information, the reported version of Windows Media Services<br />

was: \n %L \nIAVA Reference : 2009-A-0076\nSTIG Finding Severity : Category II<br />

Solution: Apply the patches from Microsoft referenced above.<br />

CVE-2009-2499<br />

Windows Media Services Version Detection<br />

<strong>PVS</strong> ID: 5154 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is running Windows Media Services, an application for streaming video<br />

and audio files to remote hosts. The installed version of Windows Media Services is: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Sybase ASE (Adaptive Server Enterprise) Database Server Detection<br />

<strong>PVS</strong> ID: 5155 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is running the Sybase ASE (Adaptive Server Enterprise) database server<br />

Solution: N/A<br />

CVE Not available<br />

Sybase ASE (Adaptive Server Enterprise) Database Client Detection<br />

<strong>PVS</strong> ID: 5156 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server is running a Sybase ASE (Adaptive Server Enterprise) database<br />

client<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1370


Sybase ASE (Adaptive Server Enterprise) Database Server Default Credentials<br />

<strong>PVS</strong> ID: 5157 FAMILY: Database RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials\n\nThe remote web server is running the Sybase ASE (Adaptive Server<br />

Enterprise) database server with default credentials. That is, the Sybase ASE server ships<br />

with the default administrative credentials of 'sa/NULL'. The <strong>PVS</strong> has just observed a user<br />

logging in using those credentials.<br />

Solution: Change the credentials and require an encrypted login<br />

CVE Not available<br />

Flash Client Version Detection<br />

<strong>PVS</strong> ID: 5158 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Flash client version: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

QuickTime < 7.6.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5159 FAMILY: Web Clients RISK: HIGH NESSUS ID:40929<br />

Description: Synopsis : \n\nThe remote host contains an application that is vulnerable to multiple attack<br />

vectors.\n\nThe version of QuickTime installed on the remote host is older than 7.6.4. Such<br />

versions contain multiple issues : \n\n - A memory corruption issue exists in the handling of<br />

H.264 movie files. (CVE-2009-2202)\n\n - A buffer overflow in the handling of MPEG-4<br />

video files. (CVE-2009-2203)\n\n - A heap buffer overflow exists in the handling of<br />

FlashPix files. (CVE-2009-2798)\n\n - A heap buffer overflow exists in the handling of<br />

H.264 movie files. (CVE-2009-2799)\n\nFor your information, the installed version of<br />

QuickTime is: \n %L<br />

Solution: Upgrade to QuickTime 7.6.4 or later.<br />

CVE-2009-2799<br />

Apple iPhone < 3.1 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5160 FAMILY: Mobile Devices RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is an Apple iPhone with an OS earlier than 3.1. Such versions are potentially affected by<br />

multiple issues: \n\n - An issue in WebKit's handling of the parent and top objects could<br />

result in cross-site scripting attacks. (CVE-2009-1724)\n\n - A memory corruption issue in<br />

WebKits's handling of numeric character references. (CVE-2009-1725)\n\n - The<br />

International Domain Name support and Unicode fonts embedded in Safari could be used<br />

Family Internet Services 1371


to create a URL which contains look-alike characters. (CVE-2009-2199)\n\n - A heap<br />

buffer overflow exists in the handling of AAC or MP3 files. (CVE-2009-2206)\n\n -<br />

Spotlight finds and allows access to deleted messages in Mail folders on the device.<br />

(CVE-2009-2207)\n\n - The iPhone OS allows users to specify a 'Require Passcode' setting<br />

that may be greater than the 'Maximum Inactivity time lock' setting from Microsoft<br />

Exchange servers. (CVE-2009-2794)\n\n - A heap buffer overflow exists in Recovery<br />

Mode command parsing. (CVE-2009-2795)\n\n - When a character in a password is<br />

deleted, and the deletion is undone, the character is briefly made visible.<br />

(CVE-2009-2796)\n\n - Safari includes the user name and password from the original URL<br />

in the referer header. (CVE-2009-2797)\n\n - A null pointer dereference issue exists in the<br />

handling of SMS arrival notifications. (CVE-2009-2815)\n\nFor your information, the<br />

observed banner was: \n %L<br />

Solution: Upgrade to Apple iPhone OS 3.1<br />

CVE-2009-2815<br />

Mozilla Firefox < 3.0.14 / 3.5.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5161 FAMILY: Web Clients RISK: HIGH NESSUS ID:40930<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe installed<br />

version of Mozilla Firefox is earlier than 3.0.14 / 3.5.3. Such versions are potentially<br />

affected by multiple issues : \n\n - Multiple memory corruption vulnerabilities in the<br />

browser engine. (MFSA 2009-47)\n\n - When security modules are added or removed via<br />

pkcs11.addmodule or pkcs11.deletemodule, the resulting dialogue was not sufficiently<br />

informative which could lead an attacker to entice a victim to install a malicious PKCS11<br />

module. Note that Firefox 3.5.x releases are not affected. (MFSA 2009-38)\n\n - The<br />

columns of a XUL tree element could be manipulated in a particular way which would<br />

leave a pointer owned by the column pointing to freed memory. (MFSA 2009-49)\n\n - The<br />

default Windows font used to render the locationbar and other text fields was improperly<br />

displaying certain Unicode characters with tall line-height. (MFSA 2009-50)\n\n - The<br />

'BrowserFeedWriter' could be leveraged to run JavaScript code from web content with<br />

elevated privileges. (MFSA 2009-51)\n\nFor your information, the installed version of<br />

Firefox is: \n %L<br />

Solution: Upgrade to Mozilla Firefox 3.5.3/3.0.14 or later.<br />

CVE-2009-3079<br />

Mac OS X 10.6 < 10.6.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5162 FAMILY: Generic RISK: HIGH NESSUS ID:40946<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of Mac OS X 10.6 that is older than version 10.6.1. Mac OS X 10.6.1<br />

contains security fixes for the following product : \n\n - Flash Player plug-in\n\nFor your<br />

information, the reported version of Mac OS X is: \n %L<br />

Solution: Upgrade to Mac OS X 10.6.1 or later.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1372


CVE-2009-1870<br />

MS09-047: Vulnerabilities in Windows Media Format (Windows 2000)<br />

<strong>PVS</strong> ID: 5163 FAMILY: Generic RISK: HIGH NESSUS ID:40890<br />

Description: Synopsis : \n\nThe remote Windows host is affected by multiple attack vectors.\n\nThe<br />

remote Windows host contains a version of the Windows Media Format Runtime that is<br />

affected by multiple issues : \n\n - The ASF parser has an invalid free vulnerability. A<br />

remote attacker could exploit this by tricking a user into opening a specially crafted ASF<br />

file, which could lead to arbitrary code execution. (CVE-2009-2498)\n\n - The MP3 parser<br />

has a memory corruption vulnerability. A remote attacker could exploit this by tricking a<br />

user into opening a specially crafted MP3 file, which could lead to arbitrary code<br />

execution. (CVE-2009-2499)\n\nNote, that this patch is not available for unsupported<br />

Service Packs. For your information, the installed version of Windows Media Format<br />

Runtime is: \n %L \nIAVA Reference : 2009-A-0076\nSTIG Finding Severity : Category II<br />

Solution: Apply the patches in the Microsoft bulletin.<br />

CVE-2009-2499<br />

MS09-047: Vulnerabilities in Windows Media Format (Windows Server 2003)<br />

<strong>PVS</strong> ID: 5164 FAMILY: Generic RISK: HIGH NESSUS ID:40890<br />

Description: Synopsis : \n\nThe remote Windows host is affected by multiple attack vectors.\n\nThe<br />

remote Windows host contains a version of the Windows Media Format Runtime that is<br />

affected by multiple issues : \n\n - The ASF parser has an invalid free vulnerability. A<br />

remote attacker could exploit this by tricking a user into opening a specially crafted ASF<br />

file, which could lead to arbitrary code execution. (CVE-2009-2498)\n\n - The MP3 parser<br />

has a memory corruption vulnerability. A remote attacker could exploit this by tricking a<br />

user into opening a specially crafted MP3 file, which could lead to arbitrary code<br />

execution. (CVE-2009-2499)\n\nNote that this patch is not available for unsupported<br />

Service Packs. For your information, the installed version of Windows Media Format<br />

Runtime is: \n %L \nIAVA Reference : 2009-A-0076\nSTIG Finding Severity : Category II<br />

Solution: Apply the patches in the Microsoft bulletin.<br />

CVE-2009-2499<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

MS09-047: Vulnerabilities in Windows Media Format (Windows XP 32-bit)<br />

<strong>PVS</strong> ID: 5165 FAMILY: Generic RISK: HIGH NESSUS ID:40890<br />

Description: Synopsis : \n\nThe remote Windows host is affected by multiple attack vectors.\n\nThe<br />

remote Windows host contains a version of the Windows Media Format Runtime that is<br />

affected by multiple issues : \n\n - The ASF parser has an invalid free vulnerability. A<br />

remote attacker could exploit this by tricking a user into opening a specially crafted ASF<br />

file, which could lead to arbitrary code execution. (CVE-2009-2498)\n\n - The MP3 parser<br />

has a memory corruption vulnerability. A remote attacker could exploit this by tricking a<br />

Family Internet Services 1373


user into opening a specially crafted MP3 file, which could lead to arbitrary code<br />

execution. (CVE-2009-2499)\n\nNote that this patch is not available for unsupported<br />

Service Packs. For your information, the installed version of Windows Media Format<br />

Runtime is: \n %L \nIAVA Reference : 2009-A-0076\nSTIG Finding Severity : Category II<br />

Solution: Apply the patches in the Microsoft bulletin.<br />

CVE-2009-2499<br />

MS09-047: Vulnerabilities in Windows Media Format (Windows XP 64-bit)<br />

<strong>PVS</strong> ID: 5166 FAMILY: Generic RISK: HIGH NESSUS ID:40890<br />

Description: Synopsis : \n\nThe remote Windows host is affected by multiple attack vectors.\n\nThe<br />

remote Windows host contains a version of the Windows Media Format Runtime that is<br />

affected by multiple issues : \n\n - The ASF parser has an invalid free vulnerability. A<br />

remote attacker could exploit this by tricking a user into opening a specially crafted ASF<br />

file, which could lead to arbitrary code execution. (CVE-2009-2498)\n\n - The MP3 parser<br />

has a memory corruption vulnerability. A remote attacker could exploit this by tricking a<br />

user into opening a specially crafted MP3 file, which could lead to arbitrary code<br />

execution. (CVE-2009-2499)\n\nNote that this patch is not available for unsupported<br />

Service Packs. For your information, the installed version of Windows Media Format<br />

Runtime is: \n %L \nIAVA Reference : 2009-A-0076\nSTIG Finding Severity : Category II<br />

Solution: Apply the patches in the Microsoft bulletin.<br />

CVE-2009-2499<br />

MS09-047: Vulnerabilities in Windows Media Format (Windows Vista / Server 2008)<br />

<strong>PVS</strong> ID: 5167 FAMILY: Generic RISK: HIGH NESSUS ID:40890<br />

Description: Synopsis : \n\nThe remote Windows host is affected by multiple attack vectors.\n\nThe<br />

remote Windows host contains a version of the Windows Media Format Runtime that is<br />

affected by multiple issues : \n\n - The ASF parser has an invalid free vulnerability. A<br />

remote attacker could exploit this by tricking a user into opening a specially crafted ASF<br />

file, which could lead to arbitrary code execution. (CVE-2009-2498)\n\n - The MP3 parser<br />

has a memory corruption vulnerability. A remote attacker could exploit this by tricking a<br />

user into opening a specially crafted MP3 file, which could lead to arbitrary code<br />

execution. (CVE-2009-2499)\n\nFor your information, the installed version of Windows<br />

Media Format Runtime is: \n %L \nIAVA Reference : 2009-A-0076\nSTIG Finding<br />

Severity : Category II<br />

Solution: Apply the patches in the Microsoft bulletin.<br />

CVE-2009-2499<br />

Pidgin < 2.6.1 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5168 FAMILY: Internet Messengers NESSUS ID:40986<br />

Family Internet Services 1374


RISK:<br />

MEDIUM<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Pidgin < 2.6.1. Such versions are potentially affected by multiple issues : \n\n -<br />

A denial-of-service vulnerability because it fails to properly handle malformed links sent<br />

via the Yahoo Instant Messenger protocol. (CVE-2009-3025)\n\n - A man-in-the-middle<br />

vulnerability exists because the application does not require the TLS/SSL preference to be<br />

enabled when connecting to older Jabber servers. (CVE-2009-3026)\n\nFor your<br />

information, the reported version of Pidgin is: \n %L<br />

Solution: Upgrade to Pidgin 2.6.1 or later.<br />

CVE-2009-3026<br />

Bugzilla < 3.0.9/3.2.5/3.4.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5169 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Bugzilla, a bug-tracking software with a web interface. The version of Bugzilla<br />

on the remote host is potentially affected by multiple flaws : \n\n - A SQL injection<br />

vulnerability in the 'Bug.search' WebService function. (CVE-2009-3125)\n\n - A SQL<br />

injection vulnerability in the 'Bug.create WebService function. (CVE-2009-3165)\n\n -<br />

When a user reset their password and then logged in immediately afterward, their password<br />

would appear in the URL of their browser. (CVE-2009-3166)\n\nFor your information, the<br />

installed version of Bugzilla is: \n %L<br />

Solution: Upgrade to Bugzilla 3.0.9, 3.2.5, or 3.4.2.<br />

CVE-2009-3166<br />

PostgreSQL Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5170 FAMILY: Database<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:40947<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running PostgreSQL, a database application. The version of PostgreSQL is potentially<br />

affected by multiple issues : \n\n - Authenticated non-superusers can shut down the<br />

backend server by re-LOAD-ing libraries in $libdir/plugins, if any libraries are present<br />

there.\n\n - A privilege escalation issue allows some actions to be performed with superuser<br />

privileges instead of table owner privileges. This is related to the fix for CVE-2007-6600<br />

which failed to include protection against misuse of 'RESET SESSION<br />

AUTHORIZATION'.\n\n - If PostgreSQL is configured with LDAP authentication, and<br />

your LDAP configuration allows anonymous binds, it is possible for a user to authenticate<br />

themselves with an empty password.\n\nFor your information, the installed version of<br />

PostgreSQL is: \n %L<br />

Solution: Upgrade to PostgreSQL 8.0.22, 8.1.18, 8.2.14, 8.3.8, or 8.4.1.<br />

Family Internet Services 1375


CVE-2009-3231<br />

Horde < 3.3.4 / 3.3.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5171 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server contains a PHP application that is vulnerable to<br />

multiple attack vectors.\n\nThe version of Horde, Horde Groupware, or Horde Groupware<br />

Webmail Edition installed on the remote host is potentially affected by multiple issues :<br />

\n\n - A vulnerability in the form library that allows the overwriting of arbitrary local files,<br />

subject to the permissions of the web server user. This issue occurs only when the<br />

application uses image form fields such as Turba H3 or Ansel.\n\n - Two cross-site<br />

scripting vulnerabilities in the preference system and the MIME viewer library.\n\nFor your<br />

information, the installed version of Horde is: \n %L<br />

Solution: Upgrade to Horde version 3.2.5 / 3.3.5 or later.<br />

Aria2 Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 5172 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running aria2, a client application used to download files via a number<br />

of protocols.<br />

Solution: N/A<br />

CVE Not available<br />

nginx Webserver Detection<br />

<strong>PVS</strong> ID: 5173 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running nginx web server.<br />

Solution: N/A<br />

CVE Not available<br />

nginx HTTP Request Remote Buffer Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5174 FAMILY: Web Servers RISK: HIGH NESSUS ID:41608<br />

Description: Synopsis : \n\nThe remote web server is affected by a remote buffer overflow<br />

vulnerability.\n\nThe remote host is running a version of nginx web server that is<br />

potentially affected by a remote buffer overflow vulnerability. Using a specially crafted<br />

HTTP request, an attacker can cause web server to crash, or potentially run arbitrary code<br />

subject to the privileges of the web server user.\n\nFor your information, the reported<br />

Family Internet Services 1376


version of nginx is: \n %L<br />

Solution: Upgrade to nginx 0.5.38, 0.6.39, 0.7.62, or 0.8.15.<br />

CVE-2009-2629<br />

Debian devscripts 'uscan' Input Validation Vulnerability<br />

<strong>PVS</strong> ID: 5175 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a remote code execution<br />

attack.\n\nThe remote host is running a version of devscripts uscan that is<br />

potentially affected by a code execution vulnerability. The application runs Perl<br />

code downloaded from potentially untrusted sources to implement its URL and<br />

version mangling functionality. An attacker could exploit this flaw to execute<br />

arbitrary code on the remote host. For your information, the reported version of<br />

devscripts uscan is: \n %L<br />

Solution: Upgrade to devscripts uscan 2.9.6 / 2.10.35<br />

CVE-2009-2946<br />

Google Chrome < 3.0.195.21 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5176 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:41000<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nThe version of Google Chrome installed on the remote host is earlier than<br />

3.0.195.21. Such versions are potentially affected by multiple issues : \n\n - Google<br />

Chrome's inbuilt RSS/ATOM reader renders untrusted JavaScript in an RSS/ATOM feed.<br />

(#21238)\n\n - It may be possible to bypass the same origin policy via the<br />

getSVGDocument() function (#21338)\n\nFor your information, the reported version of<br />

Google Chrome is: \n %L<br />

Solution: Upgrade to Google Chrome 3.0.195.21 or later.<br />

CVE-2009-3264<br />

Best Practical Request Tracker 'Custom Field' HTML Injection Vulnerability<br />

<strong>PVS</strong> ID: 5177 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is running a web application that is affected by a<br />

HTML-injection vulnerability.\n\nThe remote host is running Best Practical Solutions RT,<br />

an enterprise-grade ticketing system. The version detected is potentially affected by an<br />

HTML-injection vulnerability caused by the application failing to properly sanitize<br />

user-supplied input to 'Custom Field' values. Note that this issue only exists if the<br />

installation is using Custom Fields. For your information, the reported version of RT is : \n<br />

%L<br />

Family Internet Services 1377


Solution: Upgrade to RT 3.6.9 / 3.8.5<br />

CVE Not available<br />

PHP < 5.2.11 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5178 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:41014<br />

Description: Synopsis : \n\nThe remote web server uses a version of PHP that is affected by multiple<br />

vulnerabilities.\n\nAccording to its banner, the version of PHP installed on the remote host<br />

is earlier than 5.2.11. Such versions are reportedly affected by multiple issues : \n\n - An<br />

unspecified error occurs in certificate validation inside<br />

'php_openssl_apply_verification_policy'.\n\n - An unspecified input validation<br />

vulnerability affects the color index in 'imagecolortransparent()'.\n\n - A denial-of-service<br />

vulnerability related to 'popen' when invalid modes are used. (Bug 44683)\n\nFor your<br />

information, the reported version of PHP is: \n %L<br />

Solution: Upgrade to PHP version 5.2.11 or later.<br />

CVE-2009-5016<br />

MyBB < 1.4.9 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5179 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server is running a PHP application that is vulnerable to<br />

multiple attack vectors.\n\nThe remote web server is running a version of MyBB earlier<br />

than 1.4.9. Such versions are potentially affected by multiple issues : \n\n - A SQL injection<br />

vulnerability in avatar extension checking and validating. (Bug 464)\n\n - It is possible to<br />

copy another users name and put a zero-width space somewhere in it. (Bug 418)\n\nFor<br />

your information, the reported version of MyBB is: \n %L<br />

Solution: Upgrade to MyBB 1.4.9 or later.<br />

CVE Not available<br />

Interchange Search Request Information Disclosure<br />

<strong>PVS</strong> ID: 5180 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:41056<br />

Description: Synopsis : \n\nThe remote web server is affected by an information-disclosure<br />

vulnerability.\n\nThe remote web server is running Interchange, a web-based application<br />

server. The installed version is potentially affected by an information disclosure<br />

vulnerability. It is possible to remotely query any table configured withing Interchange by<br />

using a specially crafted search request because the application fails to limit which tables<br />

can be searched on. For your information, the reported version of Interchange is: \n %L<br />

Family Internet Services 1378


Solution: Upgrade to Interchange 5.7.2, 5.6.2, or 5.4.4.<br />

CVE Not available<br />

Firebird Database Client Detection<br />

<strong>PVS</strong> ID: 5181 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a Firebird Database client.<br />

Solution: N/A<br />

CVE Not available<br />

iTunes < 9.0.1 Remote Code Execution<br />

<strong>PVS</strong> ID: 5182 FAMILY: Web Clients RISK: HIGH NESSUS ID:41061<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a remote code execution<br />

attack.\n\nAccording to its banner, the version of iTunes installed on the remote host is<br />

older than 9.0.1. Such versions are potentially affected by a remote buffer overflow when<br />

opening specially crafted '.pls' files. An attacker could exploit this flaw to execute arbitrary<br />

code on the remote host subject to the privileges of the user running the application. For<br />

your information, the reported version of iTunes is: \n %L<br />

Solution: Upgrade to iTunes 9.0.1 or later.<br />

CVE-2009-2817<br />

IBM WebSphere Application Server < 6.1.0.27 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5183 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:41057<br />

Description: Synopsis : \n\nThe remote host is running a web server that is vulnerable to multiple attack<br />

vectors.\n\nIBM WebSphere Application Server 6.1.0 before Fix Pack 27 appears to be<br />

running on the remote host. Such versions are potentially affected by multiple issues : \n\n -<br />

Eclipse help system included with WebSphere Application Server is affected by a cross-site<br />

scripting vulnerability. (PK78917)\n\n - It may be possible to bypass security restrictions<br />

using a specially crafted HTTP HEAD method. (PK83258)\n\n - New applications<br />

deployed in WebSphere Application Server for z/OS prior to 1.8 are saved on the file<br />

system with insecure privileges resulting in disclosure of sensitive information.<br />

(PK83308)\n\n - If JAAS-J2C Authentication Data is configured using wsadmin scripts, the<br />

password value may appear in FFDC logs. (PK86137)\n\n - Apache APR-util is affected by<br />

a denial of service issue. (PK88341)\n\n - Due to an error in expat XML parser APR-util is<br />

affected by a denial of service issue. (PK88342)\n\n - It may be possible to trigger a denial<br />

of service attack due to errors in fix packs 6.1.0.23 and 6.1.0.25. (PK91709)\n\nFor your<br />

information, the reported version of WebSphere is: \n %L<br />

Solution: Apply Fix Pack 27 (6.1.0.27) or later.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1379


CVE-2009-3106<br />

Ability Mail Server < 2.70 Remote Denial of Service<br />

<strong>PVS</strong> ID: 5184 FAMILY: IMAP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:41644<br />

Description: Synopsis : \n\nThe remote mail server is affected by a denial of service<br />

vulnerability.\n\nThe remote host appears to be running Ability Mail Server < 2.70. Such<br />

versions are potentially affected by an issue caused by an unspecified error when handling<br />

IMAP version 4 FETCH commands. An attacker could exploit this flaw to crash the<br />

affected service. For your information, the reported version of Ability Mail Server is: \n<br />

%L<br />

Solution: Upgrade to Ability Mail Server 2.70 or later.<br />

CVE-2009-3445<br />

Ability Mail Server < 2.70 Remote Denial of Service<br />

<strong>PVS</strong> ID: 5185 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:41644<br />

Description: Synopsis : \n\nThe remote mail server is affected by a denial of service<br />

vulnerability.\n\nThe remote host appears to be running Ability Mail Server < 2.70. Such<br />

versions are potentially affected by an issue caused by an unspecified error when handling<br />

IMAP version 4 FETCH commands. An attacker could exploit this flaw to crash the<br />

affected service. For your information, the reported version of Ability Mail Server is: \n<br />

%L<br />

Solution: Upgrade to Ability Mail Server 2.70 or later.<br />

CVE-2009-3445<br />

Ability Mail Server < 2.70 Remote Denial of Service<br />

<strong>PVS</strong> ID: 5186 FAMILY: POP Server<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:41644<br />

Description: Synopsis : \n\nThe remote mail server is affected by a denial of service<br />

vulnerability.\n\nThe remote host appears to be running Ability Mail Server < 2.70. Such<br />

versions are potentially affected by an issue caused by an unspecified error when handling<br />

IMAP version 4 FETCH commands. An attacker could exploit this flaw to crash the<br />

affected service. For your information, the reported version of Ability Mail Server is: \n<br />

%L<br />

Solution: Upgrade to Ability Mail Server 2.70 or later.<br />

CVE-2009-3445<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1380


Ability Mail Server < 2.70 Remote Denial of Service<br />

<strong>PVS</strong> ID: 5187 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:41644<br />

Description: Synopsis : \n\nThe remote mail server is affected by a denial of service<br />

vulnerability.\n\nThe remote host appears to be running Ability Mail Server < 2.70. Such<br />

versions are potentially affected by an issue caused by an unspecified error when handling<br />

IMAP version 4 FETCH commands. An attacker could exploit this flaw to crash the<br />

affected service. For your information, the reported version of Ability Mail Server is: \n<br />

%L<br />

Solution: Upgrade to Ability Mail Server 2.70 or later.<br />

CVE-2009-3445<br />

VLC Media Player < 1.0.2 Multiple Buffer Overflows<br />

<strong>PVS</strong> ID: 5188 FAMILY: Web Clients RISK: HIGH NESSUS ID:41626<br />

Description: Synopsis : \n\nThe remote host contains an application that is vulnerable to multiple attack<br />

vectors.\n\nThe version of VLC media player installed on the remote host that is earlier<br />

than 1.0.2. Such versions are potentially vulnerable to a stack overflow when parsing a<br />

MPF, ASF, or AVI file with an overly deep box structure. If an attacker can trick a user<br />

into opening a specially crafted MP4, ASF, or AVI file with the affected application, he<br />

may be able to execute arbitrary code subject to the user's privileges. For your information,<br />

the reported version of VLC is: \n %L<br />

Solution: Upgrade to VLC Media Player 1.0.2 or later.<br />

CVE Not available<br />

BlackBerry Dialog Box Certificate Mismatch<br />

<strong>PVS</strong> ID: 5189 FAMILY: Mobile Devices<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is affected by a certificate mismatch vulnerability.\n\nThe<br />

remote host is running the BlackBerry Browser. The installed version of the browser is<br />

potentially affected by an issue wherein a malicious user could create a web site that<br />

includes a certificate that is purposely altered using null characters in the certificate's<br />

Common Name (CN) field to deceive a user into believing they are accessing a trusted site.<br />

For your information, the reported version of the BlackBerry browser is: \n %L<br />

Solution: Upgrade the browser to 4.5.0.173, 4.6.0.303, 4.6.1.309, 4.7.0.179, or 4.7.1.57<br />

CVE-2009-3477<br />

DB2 9.1 < Fix Pack 8 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5190 FAMILY: Database NESSUS ID:42044<br />

Family Internet Services 1381


RISK:<br />

MEDIUM<br />

Description: Synopsis : \n\nThe remote database server is vulnerable to multiple attack<br />

vectors.\n\nAccording to its version, the installation of DB2 9.1 on the remote host is<br />

affected by one or more of the following issues : \n\n - MODIFIED SQL DATA table<br />

function is not dropped when definer loses required privileges to maintain the objects.<br />

(IZ46773/IZ46774)\n\n - A user without sufficient privileges could insert, update, or delete<br />

rows in a table. (IZ50078/IZ50079)\n\n - A user can perform 'SET SESSION<br />

AUTHORIZATION' without 'SETSESSIONUSER' privilege. (IZ55883)\n\nFor your<br />

information, the observed version of DB was : \n %L<br />

Solution: Upgrade to DB2 9.1 Fix Pack 8<br />

CVE-2009-3474<br />

Informix Dynamic Server Long Password Remote Denial of Service<br />

<strong>PVS</strong> ID: 5191 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable a remote denial of service attack.\n\nThe<br />

remote host is running the Informix Dynamic server. According to its banner, the installed<br />

version is vulnerable to a remote denial of service attack when the application processes<br />

passwords of length greater than 512 bytes through a JDBC connection. For your<br />

information, the observed version of Informix Dynamic Server is: \n %L \n<br />

Solution: Upgrade to Informix Dynamic Server 10.00.xC11, 11.10.xC4, or 11.50.xC5<br />

CVE-2009-3470<br />

Websense Proxy Detection<br />

<strong>PVS</strong> ID: 5192 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Websense proxy. The detected version is: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Google Chrome < 3.0.195.24 Remote Code Execution<br />

<strong>PVS</strong> ID: 5193 FAMILY: Web Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:41958<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is vulnerable to remote code<br />

execution attacks.\n\nThe version of Google Chrome installed on the remote host is earlier<br />

than 3.0.195.24. Such versions are potentially affected by a remote code execution<br />

vulnerability. The 'v8' engine usees a common 'dtoa()' implementation to parse strings into<br />

floating point numbers. An attacker, exploiting this flaw, can execute arbitrary code in the<br />

Family Internet Services 1382


Google Chrome sandbox. For your information, the observed version of Google Chrome is:<br />

\n %L<br />

Solution: Upgrade to Google Chrome 3.0.195.24 or later.<br />

CVE-2009-0689<br />

Samba < 3.0.37 / 3.2.15 / 3.3.8 / 3.4.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5194 FAMILY: Samba<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:41970<br />

Description: Synopsis : \n\nThe remote Samba server is vulnerable to multiple attack<br />

vectors.\n\nAccording to its banner, the version of Samba server on the remote host is<br />

potentially affected by multiple vulnerabilities : \n\n - If a user in '/etc/passwd' is<br />

misconfigured to have an empty home directory then connecting to the home share of this<br />

user will use the root of the filesystem as the home directory. (CVE-2009-2813)\n\n -<br />

Specially crafted SMB requests on authenticated SMB connections can send smbd into a<br />

100% loop, causing a denial of service. (CVE-2009-2906)\n\n - When 'mount.cifs' is<br />

installed as a setuid program, a user can pass it a credential or password path to which he or<br />

she does not have access and then use the '--verbose' option to view the first line of that file.<br />

(CVE-2009-2948)\n\nFor your information, the observed version of SAMBA is: \n %L<br />

Solution: Upgrade to Samba 3.0.37, 3.2.15, 3.3.8, 3.4.2, or later.<br />

CVE-2009-2948<br />

Serv-U < 9.0.0.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5195 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:41980<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Serv-U File Server, an FTP server for Windows. The installed version is earlier<br />

than 9.0.0.1. Such versions are potentially affected by multiple issues : \n\n - A remote<br />

denial-of-service when processing specially crafted 'SITE SET TRANSFERPROGRESS<br />

ON' commands. An authenticated attacker can exploit this flaw to cause a denial-of-service<br />

when 'SITE SET' commands are enabled on the server.\n\n - An unprivileged user may be<br />

able to view all drives and virtual paths for drive '\\'.\n\nFor your information, the observed<br />

version of Serv-U File Server is : \n %L<br />

Solution: Upgrade to Serv-U version 9.0.0.1 or later.<br />

CVE Not available<br />

Apache < 2.2.14 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5196 FAMILY: Web Servers RISK: HIGH NESSUS ID:42052<br />

Family Internet Services 1383


Description: Synopsis : \n\nThe remote web server is vulnerable to multiple attack<br />

vectors.\n\nAccording to its banner, the version of Apache 2.2 installed on the remote host<br />

is older than 2.2.14. Such versions are potentially affected by multiple vulnerabilities : \n\n<br />

- Faulty error handling in the Solaris pollset support (Event Port backend) which could<br />

trigger hangs in the prefork and event MPMs on that platform (CVE-2009-2699)\n\n - The<br />

'ap_proxy_ftp_handler' function in 'modules/proxy/proxy_ftp.c in the 'mod_proxy_ftp'<br />

module allows remote FTP servers to cause a denial-of-service via a malformed reply to an<br />

EPSV command. (CVE-2009-3094)\n\n - The 'mod_proxy_ftp' module allows remote<br />

attackers to bypass intended access restrictions and send arbitrary commands to an FTP<br />

server. (CVE-2009-3095)\n\n<strong>PVS</strong> cannot determine whether the affected module is in use.<br />

For your information, the observed version of Apache is: \n %L<br />

Solution: Either ensure the affected module is not in use or upgrade to Apache version 2.2.14 or later.<br />

OSSProxy Detection<br />

CVE-2009-3095<br />

<strong>PVS</strong> ID: 5197 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is running software that should be authorized with respect<br />

to corporate policy\n\nThe remote client is running OSSProxy.exe, an application that is<br />

marketed to end users as a tool to speed up their Internet connection. The application routes<br />

all web connections through a 3rd party proxy which is made available by NetSetter<br />

(MarketScore). For your information, the User-Agent banner is: \n %L<br />

Solution: Ensure that this software is in line with corporate policies and guidelines.<br />

CVE Not available<br />

Apple iPhone Wireless Connection Detection<br />

<strong>PVS</strong> ID: 5198 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running an Apple iOS operating system. Further, the iPhone is<br />

connected to the network via a wireless connection.<br />

Solution: Ensure that the wireless connection is secured and operating within corporate guidelines.<br />

CVE Not available<br />

Sophos Enterprise Anti-virus Version Detection<br />

<strong>PVS</strong> ID: 5199 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Sophos Enterprise version: %L<br />

Solution: N/A<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1384


CVE Not available<br />

Pandora Version Detection<br />

<strong>PVS</strong> ID: 5200 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Pandora application for Mac. Pandora is a media web<br />

spider. The reported version of Pandora is:<br />

Solution: N/A<br />

CVE Not available<br />

Ubicom Embedded Web Server Detection<br />

<strong>PVS</strong> ID: 5201 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is running the Ubicom embedded HTTP server software. This software<br />

is commonly used on many wireless devices and is used for remote administration.<br />

Solution: Ensure that this device is in line with corporate policies.<br />

CVE Not available<br />

QuickBooks Accounting Software Version Detection<br />

<strong>PVS</strong> ID: 5202 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the QuickBooks accounting software. QuickBooks commonly<br />

accesses confidential data. The reported version of QuickBooks is: %L<br />

Solution: N/A<br />

GtekClient Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 5203 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software which should be authorized with respect<br />

to corporate policy\n\nThe remote client is running the GtekClient software, an application<br />

which is marketed to many large companies and embedded within the system software. The<br />

software commonly "phones home" and may pass system or configuration information to<br />

the vendor.<br />

Solution: Ensure that this software is in line with corporate policies and guidelines.<br />

CVE Not available<br />

Unsupported Software Detection (Windows 98)<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1385


<strong>PVS</strong> ID: 5204 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client appears to be running Windows 98. Windows 98 is an older operating<br />

system and is no longer supported by Microsoft. In addition, there are many malware<br />

programs that use the string "Windows 98" within their headers. The reported banner which<br />

triggered this alert is: \n %L<br />

Solution: Manually inspect the workstation to ensure that it is not running software which may<br />

impact the security of the entire network.<br />

CVE Not available<br />

Policy - Dopewars Gaming Server Detection<br />

<strong>PVS</strong> ID: 5205 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software which may be considered<br />

questionable.\n\nThe remote server is acting as a Dopewars game server.<br />

Solution: Ensure that this gaming is in alignment with corporate and security policies.<br />

CVE Not available<br />

Symantec <strong>Security</strong>Expressions Audit and Compliance Server Multiple XSS<br />

<strong>PVS</strong> ID: 5206 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:42083<br />

Description: Synopsis : \n\nThe remote web application is affected by multiple cross-site scripting<br />

vulnerabilities.\n\nThe remote web server is running Symantec <strong>Security</strong>Expressions Audit<br />

and Compliance Server. The installed version is potentially affected by multiple cross-site<br />

scripting vulnerabilities : \n\n - The web console fails to sanitize user supplied input to<br />

certain unspecified parameters. An authorized user may be able to exploit this issue to<br />

inject arbitrary HTML script code into an user's browser to be executed within the security<br />

context of the affected site.\n\n - Certain error messages are not properly encoded which<br />

could be exploited by an attacker to inject arbitrary HTML content into an user's browser<br />

session.\n\nFor your information, the observed version of Symantec <strong>Security</strong>Expressions<br />

Audit and Compliance Server is: \n %L<br />

Solution: Apply Hot Fix 1 referenced in article KB49452<br />

CVE-2009-3030<br />

OpenCms Multiple Input Validation Vulnerabilities<br />

<strong>PVS</strong> ID: 5207 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 1386


Description: Synopsis : \n\nThe remote web server is vulnerable to multiple attack vectors.\n\nThe<br />

remote web server is running Alkacon OpenCms, a web-based content management<br />

system. The installed version is earlier than 7.5.1. Such versions are potentially affected by<br />

multiple issues : \n\n - Multiple cross-site scripting issues.\n\n - Multiple SQL-injection<br />

issues.\n\n - Multiple input-validation vulnerabilities that allow 'phishing through frames'<br />

attacks.\n\n - Multiple input-validation vulnerabilities that may results in information<br />

disclosure.\n\nFor your information, the observed version of OpenCms is: \n %L<br />

Solution: Upgrade to OpenCms 7.5.1 or later.<br />

CVE Not available<br />

Achievo < 1.4.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5208 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server is hosting a PHP application that is vulnerable to<br />

multiple attack vectors.\n\nThe remote web server is hosting Achievo, a web-based<br />

resource management tool. The installed version of Achievo is earlier than 1.4.0. Such<br />

versions are potentially affected by multiple issues : \n\n - A persistent cross-site scripting<br />

vulnerability in the 'tittle' parameter of the scheduler module. (CVE-2009-2733)\n\n -<br />

Multiple cross-site scripting vulnerabilities in the 'atksearch[contractnumber]',<br />

'atksearch_AE_customer[customer]', and 'atksearchmode[contracttype]' parameters of the<br />

'Organisation Contracts' administration page. (CVE-2009-2733)\n\n - A SQL injection<br />

vulnerability exists in the 'user_id' parameter of the 'dispatch.php' script.<br />

(CVE-2009-2734)\n\n - A remote file-include vulnerability becuase the application fails to<br />

sufficiently sanitize user-supplied input to the 'config_atkroot' parameter of the<br />

'debugger.php' script.\n\nFor your information, the observed version of Achievo is: \n %L<br />

Solution: Upgrade to Achievo 1.4.0 or later, as this reportedly fixes the issue.<br />

CVE-2009-2734<br />

phpMyAdmin < 2.11.9.6 / 3.2.2.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5209 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server contains a PHP application that is vulnerable to<br />

multiple attack vectors.\n\nThe remote web server is running a version of phpMyAdmin<br />

earlier than 2.11.9.6 / 3.2.2.1. Such versions are potentially affected by multiple issues :<br />

\n\n - Unspecified cross-site scripting vulnerabilities.\n\n - Unspecified SQL Injection<br />

vulnerabilities.\n\nFor your information, the observed version of phpMyAdmin is: \n %L<br />

Solution: Upgrade to phpMyAdmin 2.11.9.6 or 3.2.2.1 or later.<br />

CVE-2009-3697<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

MapServer < 4.10.5/5.2.3/5.4.2 Integer Overflow Vulnerability<br />

<strong>PVS</strong> ID: 5210 FAMILY: CGI RISK: HIGH NESSUS ID:42262<br />

Family Internet Services 1387


Description: Synopsis : \n\nThe remote web server contains a CGI application that is vulnerable to a<br />

remote code execution attack.\n\nThe remote web server is running a version of MapServer<br />

earlier than 4.10.5 / 5.2.3 / 5.4.2. Such versions are potentially affected by an<br />

integer-overflow vulnerability when the application handles large HTTP requests<br />

containing specially crafted 'Content-Length' values. For your information, the observed<br />

version of MapServer is: \n %L<br />

Solution: Upgrade to MapServer 4.10.5, 5.2.3, or 5.4.2.<br />

CVE-2009-0840<br />

BASE < 1.4.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5211 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:42264<br />

Description: Synopsis : \n\nThe remote host is running a PHP application that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running BASE, a web-based tool for analyzing alerts<br />

from one or more SNORT sensors. The version of BASE installed on the remote host is<br />

earlier than 1.4.4. Such versions are potentially affected by multiple issues : \n\n - A<br />

SQL-injection flaw.\n\n - A cross-site scripting vulnerability in 'base_local_rules.php'.\n\n -<br />

A local file include vulnerability in 'base_local_rules.php'.\n\nFor your information, the<br />

observed version of BASE is: \n %L<br />

Solution: Upgrade to BASE version 1.4.4 or later.<br />

CVE Not available<br />

GNU Wget SSL Certificate <strong>Security</strong> Bypass<br />

<strong>PVS</strong> ID: 5212 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is affected by a security bypass vulnerability.\n\nThe<br />

remote host is using a version of Wget earlier than 1.12. Such versions are potentially<br />

affected by a security bypass vulnerability because the application fails to properly handle<br />

Common Name fields n X.509 certificates that contain an ASCII NULL character. For your<br />

information, the observed version of Wget is: \n %L<br />

Solution: Upgrade to Wget 1.12 or later.<br />

CVE-2009-3490<br />

Windows NETBIOS Workstation Name Detection<br />

<strong>PVS</strong> ID: 5213 FAMILY: Generic<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK: Risk<br />

not available<br />

NESSUS ID:Not Available<br />

Family Internet Services 1388


Description: The remote host is a NETBIOS workstation<br />

Solution: N/A<br />

CVE Not available<br />

XML Request Possible userID / password Cleartext Remote Disclosure<br />

<strong>PVS</strong> ID: 5214 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote XML client posted a request with what appears to be an embedded<br />

userID and/or password. You should manually verify that confidential data is not<br />

being leaked from the network. The observed XML request was: \n %L<br />

Solution: Ensure that confidential data is not passed via plain text form fields.<br />

CVE Not available<br />

Database Client Detection<br />

<strong>PVS</strong> ID: 5215 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server is running a database client<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

nginx HTTP Request Header Remote Buffer Overflow<br />

<strong>PVS</strong> ID: 5216 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:41608<br />

Description: Synopsis : \n\nThe remote web server is affected by a remote denial of service<br />

vulnerability.\n\nThe remote host is running a version of nginx web server earlier than<br />

0.5.38, 0.6.39, or 0.7.62. Such versions are potentially affected by a remote denial of<br />

service vulnerability because the application fails to to perform adequate bounds checking<br />

in the 'ngx_http_process_request_headers()' function of the 'src/http/ngx_http_request.c'<br />

source file. An attacker, exploiting this flaw, can cause the web server to crash, or<br />

potentially run arbitrary code subject to the privileges of the web server process.\n\nFor<br />

your information, the observed version of nginx is: \n %L<br />

Solution: Apply the patch from the vendor, or upgrade to nginx 0.5.38, 0.6.39, or 0.7.62<br />

CVE-2009-3896<br />

Opera < 10.01 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5217 FAMILY: Web Clients RISK: HIGH NESSUS ID:42291<br />

Family Internet Services 1389


Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

Opera installed on the remote host is earlier than 10.01. Such versions are potentially<br />

affected by multiple vulnerabilities : \n\n - Specially crafted domain names can cause a<br />

memory corruption in Opera, which may lead to a crash or possibly remote code execution.<br />

(938)\n\n - Opera may allow scripts to run on the feed subscription page, thereby gaining<br />

access to the feeds object. (939)\n\n - In some cases, a Web font intended to be used for<br />

page content could be incorrectly used by Opera to render parts of the user interface,<br />

including the address field. (940)\n\nFor your information, the observed version of Opera<br />

is: \n %L<br />

Solution: Upgrade to Opera 10.01 or later.<br />

CVE-2009-3832<br />

Mozilla Firefox < 3.0.15 / 3.5.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5218 FAMILY: Web Clients RISK: HIGH NESSUS ID:42306<br />

Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host has a version of Mozilla Firefox earlier than 3.0.15 /<br />

3.5.4 installed. Such versions are potentially affected by multiple vulnerabilities : \n\n - A<br />

user's form history, both from web content as well as the smart location bar, was vulnerable<br />

to theft. (MFSA 2009-52)\n\n - The file naming scheme used for downloading a file which<br />

already exists in the download folder is predictable. An attacker with local access could<br />

exploit this to trick the browser into opening the incorrect downloaded file. (MFSA<br />

2009-53)\n\n - Recursive creation of JavaScript web-workers can be used to create a set of<br />

objects whose memory could be freed prior to their use. Note that this only affects Firefox<br />

3.5.x. (MFSA 2009-54)\n\n - A flaw exists in the parsing of regular expressions used in<br />

Proxy Auto-configuration (PAC) files. (MFSA 2009-55)\n\n - A heap-based overflow<br />

exists in Mozilla's GIF image parser. (MFSA 2009-56)\n\n - The XPCOM utility<br />

'XPCVariant: : VariantDataToJS' unwrapped doubly-wrapped objects before returning<br />

them to chrome callers which could lead to chrome privileged code calling methods on an<br />

object which had previously been created or modified by web content. (MFSA<br />

2009-57)\n\n - A heap-based overflow exists in Mozilla's string to floating point number<br />

conversion routines. (MFSA 2009-59)\n\n - The text within a selection on a web page can<br />

be read by JavaScript in a different domain using the 'document.getSelection' function,<br />

violating the same-origin policy. (MFSA 2009-61)\n\n - When downloading a file<br />

containing a right-to-left override character (RTL) in the filename, the name displayed in<br />

the dialog title bar conflicts with the name of the file shown in the dialog body. (MFSA<br />

2009-62)\n\n - Multiple memory safety and stability bugs exist in the 'liboggz', 'libvorbis',<br />

and 'liboggplay' libraries. Note that this issue only affects Firefox 3.5.x. (MFSA<br />

2009-63)\n\n - Several memory corruption issues exist in the browser engine. (MFSA<br />

2009-64)\n\nFor your information, the observed version of Mozilla Firefox is: \n %L<br />

Solution: Upgrade to Mozilla Firefox 3.0.15, 3.5.4, or later.<br />

CVE-2009-3383<br />

Mozilla SeaMonkey < 2.0 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1390


<strong>PVS</strong> ID: 5219 FAMILY: Web Clients RISK: HIGH NESSUS ID:42307<br />

Description: Synopsis : \n\nThe remote host is running a web browser that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running a version of Mozilla SeaMonkey earlier than<br />

2.0. Such versions are potentially affected by multiple vulnerabilities : \n\n - A flaw exists<br />

in the parsing of regular expressions used in Proxy Auto-configuration (PAC) files. (MFSA<br />

2009-55)\n\n - A heap-based buffer overflow exists in Mozilla's GIF image parser. (MFSA<br />

2009-56)\n\n - When downloading a file containing a right-to-left override character (RTL)<br />

in the filename, the name displayed in the dialog title bar conflicts with the name of the file<br />

shown in the dialog body. (MFSA 2009-62)\n\nFor your information, the observed version<br />

of Mozilla SeaMonkey is: \n %L<br />

Solution: Upgrade to Mozilla SeaMonkey 2.0 or later.<br />

CVE-2009-3376<br />

MS09-061: Vulnerabilities in the Microsoft .NET Framework 1.1 Common Language Runtime Could<br />

Allow Remote Code Execution (974378)<br />

<strong>PVS</strong> ID: 5220 FAMILY: Web Servers RISK: HIGH NESSUS ID:42117<br />

Description: Synopsis :\n\nThe remote .NET Framework 1.1 is vulnerable to remote code execution<br />

attacks.\n\nThe remote host is running a version of the .NET Framework 1.1 which is<br />

potentially affected by multiple vulnerabilities :\n\n - A remote code execution<br />

vulnerability exists in the Microsoft .NET Framework that could allow a malicious<br />

Microsoft .NET Framework application to obtain a managed pointer to stack memory that<br />

is no longer used. (CVE-2009-0090)\n\n - A remote code execution vulnerability exists in<br />

the Microsoft .NET Framework that could allow a malicious Microsoft .NET application to<br />

bypass a type equality check. (CVE-2009-0091)\n\n - A remote code execution<br />

vulnerability exists in the Microsoft .NET Framework that can allow a malicious Microsoft<br />

.NET application to modify memory of the attacker's choice. (CVE-2009-2497)\n\nFor<br />

your information, the observed version of Microsoft .NET is\n%L<br />

Solution: Apply the patches referenced in Microsoft's security bulletin.<br />

CVE-2009-0091<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

MS09-061: Vulnerabilities in the Microsoft .NET Framework 2.0 Common Language Runtime Could<br />

Allow Remote Code Execution (974378)<br />

<strong>PVS</strong> ID: 5221 FAMILY: Web Servers RISK: HIGH NESSUS ID:42117<br />

Description: Synopsis :\n\nThe remote .NET Framework 2.0 is vulnerable to remote code execution<br />

attacks.\n\nThe remote host is running a version of the .NET Framework 2.0 which is<br />

potentially affected by multiple vulnerabilities :\n\n - A remote code execution<br />

vulnerability exists in the Microsoft .NET Framework that could allow a malicious<br />

Microsoft .NET Framework application to obtain a managed pointer to stack memory that<br />

is no longer used. (CVE-2009-0090)\n\n - A remote code execution vulnerability exists in<br />

the Microsoft .NET Framework that could allow a malicious Microsoft .NET application to<br />

bypass a type equality check. (CVE-2009-0091)\n\n - A remote code execution<br />

vulnerability exists in the Microsoft .NET Framework that can allow a malicious Microsoft<br />

Family Internet Services 1391


.NET application to modify memory of the attacker's choice. (CVE-2009-2497)\n\nFor<br />

your information, the observed version of Microsoft .NET is\n%L<br />

Solution: Apply the patches referenced in Microsoft's security bulletin.<br />

CVE-2009-0091<br />

MS09-061: Vulnerabilities in the Microsoft .NET Framework 2.0 SP1 Common Language Runtime<br />

Could Allow Remote Code Execution (974378)<br />

<strong>PVS</strong> ID: 5222 FAMILY: Web Servers RISK: HIGH NESSUS ID:42117<br />

Description: Synopsis :\n\nThe remote .NET Framework 2.0 SP1 is vulnerable to remote code execution<br />

attacks.\n\nThe remote host is running a version of the .NET Framework 2.0 SP1 which is<br />

potentially affected by multiple vulnerabilities :\n\n - A remote code execution<br />

vulnerability exists in the Microsoft .NET Framework that could allow a malicious<br />

Microsoft .NET Framework application to obtain a managed pointer to stack memory that<br />

is no longer used. (CVE-2009-0090)\n\n - A remote code execution vulnerability exists in<br />

the Microsoft .NET Framework that could allow a malicious Microsoft .NET application to<br />

bypass a type equality check. (CVE-2009-0091)\n\n - A remote code execution<br />

vulnerability exists in the Microsoft .NET Framework that can allow a malicious Microsoft<br />

.NET application to modify memory of the attacker's choice. (CVE-2009-2497)\n\nFor<br />

your information, the observed version of Microsoft .NET is\n%L<br />

Solution: Apply the patches referenced in Microsoft's security bulletin.<br />

CVE-2009-0091<br />

MS09-061: Vulnerabilities in the Microsoft .NET Framework 2.0 SP2 Common Language Runtime<br />

Could Allow Remote Code Execution (974378)<br />

<strong>PVS</strong> ID: 5223 FAMILY: Web Servers RISK: HIGH NESSUS ID:42117<br />

Description: Synopsis :\n\nThe remote .NET Framework 2.0 SP2 is vulnerable to remote code execution<br />

attacks.\n\nThe remote host is running a version of the .NET Framework 2.0 SP2 which is<br />

potentially affected by multiple vulnerabilities :\n\n - A remote code execution<br />

vulnerability exists in the Microsoft .NET Framework that could allow a malicious<br />

Microsoft .NET Framework application to obtain a managed pointer to stack memory that<br />

is no longer used. (CVE-2009-0090)\n\n - A remote code execution vulnerability exists in<br />

the Microsoft .NET Framework that could allow a malicious Microsoft .NET application to<br />

bypass a type equality check. (CVE-2009-0091)\n\n - A remote code execution<br />

vulnerability exists in the Microsoft .NET Framework that can allow a malicious Microsoft<br />

.NET application to modify memory of the attacker's choice. (CVE-2009-2497)\n\nFor<br />

your information, the observed version of Microsoft .NET is\n%L<br />

Solution: Apply the patches referenced in Microsoft's security bulletin.<br />

CVE-2009-0091<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1392


MS09-061: Vulnerabilities in the Microsoft .NET Framework 3.5.1 Common Language Runtime<br />

Could Allow Remote Code Execution (974378)<br />

<strong>PVS</strong> ID: 5224 FAMILY: Web Servers RISK: HIGH NESSUS ID:42117<br />

Description: Synopsis :\n\nThe remote .NET Framework 3.5.1 is vulnerable to remote code execution<br />

attacks.\n\nThe remote host is running a version of the .NET Framework 3.5.1 which is<br />

potentially affected by multiple vulnerabilities :\n\n - A remote code execution<br />

vulnerability exists in the Microsoft .NET Framework that could allow a malicious<br />

Microsoft .NET Framework application to obtain a managed pointer to stack memory that<br />

is no longer used. (CVE-2009-0090)\n\n - A remote code execution vulnerability exists in<br />

the Microsoft .NET Framework that could allow a malicious Microsoft .NET application to<br />

bypass a type equality check. (CVE-2009-0091)\n\n - A remote code execution<br />

vulnerability exists in the Microsoft .NET Framework that can allow a malicious Microsoft<br />

.NET application to modify memory of the attacker's choice. (CVE-2009-2497)\n\nFor<br />

your information, the observed version of Microsoft .NET is\n%L<br />

Solution: Apply the patches referenced in Microsoft's security bulletin.<br />

CVE-2009-0091<br />

Google Chrome < 3.0.195.32 Remote Code Execution<br />

<strong>PVS</strong> ID: 5225 FAMILY: Web Clients RISK: HIGH NESSUS ID:42413<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is vulnerable to remote code<br />

execution attacks.\n\nThe version of Google Chrome installed on the remote host is earlier<br />

than 3.0.195.32. Such versions are potentially affected by multiple vulnerabilities : \n\n -<br />

The user is not warned about certain possibly dangerous file types such as 'SVG', 'MHT',<br />

and 'XML' files. In some browsers, JavaScript can execute within these types of files.<br />

(23979)\n\n - A malicious site could use the Gears SQL API to put SQL metadata into a<br />

bad statement which could cause a subsequent memory corruption. This could lead to a<br />

Gears plugin crash or possibly arbitrary code execution. (26179)\n\nFor your information,<br />

the observed version of Google Chrome is: \n %L<br />

Solution: Upgrade to Google Chrome 3.0.195.32 or later.<br />

CVE-2009-3934<br />

eDirectory < 8.8.5 ftf1/8.7.3.10 ftf2 NULL Base DN DoS<br />

<strong>PVS</strong> ID: 5226 FAMILY: Generic<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:42412<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a denial of service attack.\n\nThe remote<br />

host is running eDirectory, a directory service from Novell. The installed version is earlier<br />

than 8.8 SP5 ftf1, or 8.7.3.10 ftf2. Such versions are affected by a denial of service<br />

vulnerability when handling search requests with an undefined BaseDN. For your<br />

information, the observed version of Novell eDirectory is: \n %L<br />

Solution: Upgrade to eDirectory 8.8 SP5 ftf1 / 8.7.3.10 ftf2 or later.<br />

Family Internet Services 1393


CVE-2009-3862<br />

Mac OS X 10.6 < 10.6.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5227 FAMILY: Generic RISK: HIGH NESSUS ID:42434<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of Mac OS X 10.6 that is older than version 10.6.2. Mac OS X 10.6.2<br />

contains security fixes for the following products : \n\n - Adaptive Firewall\n\n -<br />

Apache\n\n - Apache Protable Runtime\n\n - Certificate Assistant\n\n - CoreMedia\n\n -<br />

CUPS\n\n - DoveCot\n\n - fetchmail\n\n - file\n\n - FTP Server\n\n - Help Viewer\n\n -<br />

ImageIO\n\n - IOKit\n\n - IPSec\n\n - Kernel\n\n - Launch Services\n\n - libsecurity\n\n -<br />

libxml\n\n Login Window\n\n - OpenLDAP\n\n - QuickDraw Manager\n\nQuickTime\n\n -<br />

Screen Sharing\n\n - Subversion\n\nFor your information, the observed version of Mac OS<br />

X is: \n %L<br />

Solution: Upgrade to Mac OS X 10.6.2 or later.<br />

CVE-2009-2840<br />

Avigilon <strong>Security</strong> Camera Detection<br />

<strong>PVS</strong> ID: 5228 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a security camera. The camera streams images to a central server. As<br />

this traffic is passed unencrypted, it is possible for a passive listener to "eavesdrop" on the<br />

stream and reconstruct the images. It is usually recommended to run this sort of streaming<br />

service on a private VLAN. The reported version number was: \n %L<br />

Solution: If possible, use a private VLAN for this sort of traffic.<br />

IPP Device Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 5229 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a printer configured with the Internet Printer Protocol (IPP). The<br />

detected URI and configuration information is: \n %L<br />

Solution: N/A<br />

CUPS < 1.4.2 XSS<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5230 FAMILY: Web Servers RISK: HIGH NESSUS ID:42468<br />

Family Internet Services 1394


Description: Synopsis : \n\nThe remote host is running a web application that is affected by a cross-site<br />

scripting vulnerability.\n\nAccording to its banner, the version of CUPS installed on the<br />

remote host is earlier than 1.4.2. Such versions are potentially affected by a cross-site<br />

scripting vulnerability because the application fails to properly sanitize the 'kerberos'<br />

parameter. For your information, the observed version of CUPS is: \n %L<br />

Solution: Upgrade to CUPS version 1.4.2 or later.<br />

CVE-2009-2820<br />

Ingenico Point of Sales (POS) Device Detection<br />

<strong>PVS</strong> ID: 5231 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is an Ingenico Point of Sales device.<br />

Solution: N/A<br />

CVE Not available<br />

Safari < 4.0.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5232 FAMILY: Web Clients RISK: HIGH NESSUS ID:42478<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

Safari installed on the remote host is earlier than 4.0.4. Such versions are potentially<br />

affected by multiple issues : \n\n - An integer overflow exists in the handling of images<br />

with an embedded color profile, which may lead to a heap buffer overflow.<br />

(CVE-2009-2804)\n\n - Multiple use-after-free issues exist in libxml2, the most serious of<br />

which may lead to an unexpected application termination. (CVE-2009-2414,<br />

CVE-2009-2416)\n\n - An issue exists in Safari's handling of navigations initiated via the<br />

"Open Image in New Tab", "Open Image in New Window", or "Open Link in New Tab"<br />

shortcut menu options. Using these options within a maliciously crafted website could load<br />

a local HTML file, leading to the disclosure of sensitive information. (CVE-2009-2842)\n\n<br />

- An issue exists in WebKit's implementation of Cross-Origin Resource Sharing which<br />

could lead to cross-site request forger attacks. (CVE-2009-2816)\n\n - Multiple<br />

vulnerabilities exist in WebKit's handling of FTP directory listings. Accessing a<br />

maliciously crafted FTP server may lead to information disclosure, unexpected application<br />

termination, or execution of arbitrary code. (CVE-2009-3384)\n\n - When WebKit<br />

encounters an HTML 5 Media Element pointing to an external resource, it does not issue a<br />

resource load callback to determine if the resource should be loaded. This may result in<br />

undesired requests to remote servers. (CVE-2009-2841)\n\nFor your information, the<br />

observed version of Safari is: \n %L \nIAVT Reference : 2009-T-0049\nSTIG Finding<br />

Severity : Category I<br />

Solution: Upgrade to Safari 4.0.4 or later.<br />

CVE-2009-3384<br />

WordPress < 2.8.6 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1395


<strong>PVS</strong> ID: 5233 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:42801<br />

Description: Synopsis : \n\nThe remote web server is hosting a web application that is vulnerable to<br />

multiple attack vectors.\n\nThe remote host is running a version of WordPress earlier than<br />

2.8.6. Such versions are potentially affected by multiple vulnerabilities : \n\n - A<br />

file-upload and code execution vulnerability in the 'wp-admin/includes/file.php' script.\n\n -<br />

A cross-site scripting vulnerability in 'Press This'.\n\nFor your information, the observed<br />

version of WordPress is: \n %L<br />

Solution: Upgrade to WordPress 2.8.6 or later.<br />

CVE Not available<br />

Google Chrome < 3.0.195.33 <strong>Security</strong> Bypass Vulnerability.<br />

<strong>PVS</strong> ID: 5234 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:42798<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is vulnerable to remote code<br />

execution attacks.\n\nThe version of Google Chrome installed on the remote host is earlier<br />

than 3.0.195.33. Such versions are potentially affected by a security bypass vulnerability<br />

caused by custom headers being incorrectly sent for 'CORS OPTIONS' requests. A<br />

malicious web site operator could set custom HTTP headers on cross-origin 'OPTIONS'<br />

requests. For your information, the observed version of Google Chrome is: \n %L<br />

Solution: Upgrade to Google Chrome 3.0.195.33 or later.<br />

CVE-2009-2816<br />

IBM WebSphere Application Server < 7.0.0.7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5235 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:42821<br />

Description: Synopsis : \n\nThe remote host is running an application server that is vulnerable to<br />

multiple attack vectors.\n\nThe remote host appears to be running IBM WebSphere<br />

Application Server 7.0 before fix pack 7. Such versions are potentially affected by multiple<br />

issues : \n\n - A cross-site request forgery vulnerability exists due to insufficient validation<br />

of user supplied input to the administrative console. (PK87176)\n\n - Due to an error in<br />

Java Naming and Directory Interface, it may be possible to obtain sensitive information.<br />

(PK91414)\n\n - The administrative console is affected by a cross-site scripting<br />

vulnerability. (PK92057)\n\n - It may be possible to bypass security restrictions using a<br />

specially crafted HTTP HEAD method. (PK83258)\n\nFor your information, the observed<br />

version of WebSphere Application Server is: \n %L<br />

Solution: Apply Fix Pack 7 (7.0.0.7) or later.<br />

CVE-2009-2747<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1396


RhinoSoft Serv-U Web Client HTTP Request Remote Buffer Overflow<br />

<strong>PVS</strong> ID: 5236 FAMILY: Web Servers RISK: HIGH NESSUS ID:42934<br />

Description: Synopsis : \n\nThe remote host is running an FTP server that is vulnerable to a remote<br />

command execution attack.\n\nThe remote host appears to be running RhinoSoft Serv-U<br />

FTP server earlier than 9.1.0.0 with the web client enabled. Such versions are potentially<br />

affected by a remote buffer overflow vulnerability because the application fails to properly<br />

handle overly long session cookies. For your information, the observed version of Serv-U<br />

is: \n %L<br />

Solution: Upgrade to Serv-U version 9.1.0.0 or later.<br />

CVE-2009-4873<br />

Serv-U < 9.1.0.0 TEA Decoder Remote Stack Buffer Overflow<br />

<strong>PVS</strong> ID: 5237 FAMILY: FTP Servers RISK: HIGH NESSUS ID:42934<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a remote buffer overflow attack.\n\nThe<br />

remote host is running Serv-U File Server, an FTP server for Windows. The installed<br />

version is earlier than 9.1.0.0. Such versions are potentially affected by a remote buffer<br />

overflow vulnerability caused by a boundary error in a function when processing a<br />

hexadecimal representation of a string using a TEA decoding algorithm. For your<br />

information, the observed version of Serv-U is: \n %L<br />

Solution: Upgrade to Serv-U version 9.1.0.0 or later.<br />

CVE-2009-4006<br />

Bugzilla < 3.4.4/3.5.2 Information Disclosure Vulnerability<br />

<strong>PVS</strong> ID: 5238 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is affected by an information disclosure<br />

vulnerability.\n\nThe remote host is running Bugzilla, a bug-tracking software with a web<br />

interface. The version of Bugzilla on the remote host is potentially affected by an<br />

information disclosure vulnerability because the application displays aliases for hidden<br />

bugs in the 'Depends On' and 'Blocks' list for users who don't have permission to see them.<br />

For your information, the observed version of Bugzilla is: \n %L<br />

Solution: Upgrade to Bugzilla 3.4.4, 3.5.2, or later.<br />

CVE-2009-3386<br />

McAfee Common Management Agent Remote Denial of Service<br />

<strong>PVS</strong> ID: 5239 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 1397


Description: Synopsis : \n\nThe remote web server is vulnerable to a remote denial of service<br />

attack.\n\nThe remote web server is hosting McAfee Common Management Agent, a<br />

management related component for various McAfee products. The installed version of<br />

McAfee Common Management Agent is earlier than 3.6.0.603. Such versions are<br />

potentially affected by a remote denial of service vulnerability in the<br />

'FrameworkService.exe' component when handling multiple large HTTP requests. For your<br />

information, the observed version of McAfee Common Management Agent is: \n %L<br />

Solution: Upgrade to Common Management Agent 3.6.0 Patch 3 with HotFix 10 or later.<br />

CVE-2007-6584<br />

MySQL < 5.1.41 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5240 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:42900<br />

Description: Synopsis : \n\nThe remote database server is vulnerable to multiple attack vectors.\n\nThe<br />

remote host is running MySQL Community server < 5.1.41. Such versions are potentially<br />

affected by multiple issues : \n\n - The application fails to correctly handle the data<br />

directory path name if it contains symlinked directories in its path which could lead to a<br />

local privilege escalation. (Bug 32167)\n\n - MySQL clients linked against OpenSSL did<br />

not check server certificates presented by a server linked against yaSSL. (Bug 47320)\n\n -<br />

An error related to the handling of certain SELECT statements containing subqueries.\n\n -<br />

A failure to preserve unspecified 'null_value' flags when executing statements that use the<br />

'GeomFromWKB' function.\n\nFor your information, the observed version of MySQL is: \n<br />

%L<br />

Solution: Upgrade to MySQL Community server 5.1.41 or later.<br />

CVE-2009-4019<br />

Opera < 10.10 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5241 FAMILY: Web Clients RISK: HIGH NESSUS ID:42892<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

Opera installed on the remote host is earlier than 10.01. Such versions are potentially<br />

affected by multiple vulnerabilities : \n\n - Error messages can leak onto unrelated sites,<br />

potentially leading to cross-site scripting attacks. (941)\n\n - A heap buffer overflow in<br />

string to number conversion. (942)\n\nFor your information, the observed version of Opera<br />

is: \n %L<br />

Solution: Upgrade to Opera 10.10 or later.<br />

CVE-2009-0689<br />

PHP 5.3.x < 5.3.1 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5242 FAMILY: Web Servers NESSUS ID:42862<br />

Family Internet Services 1398


RISK:<br />

MEDIUM<br />

Description: Synopsis : \n\nThe remote web server uses a version of PHP that is vulnerable to multiple<br />

attack vectors.\n\nAccording to its banner, the version of PHP 5.3.x installed on the remote<br />

host is earlier than 5.3.1. Such versions are potentially affected by multiple issues : \n\n -<br />

Sanity checks are missing in exif processing.\n\n - It is possible to bypass the 'safe_mode'<br />

configuration setting using 'tempnam()'.\n\n - It is possible to bypass the 'open_basedir'<br />

configuration setting using 'posix_mkfifo()'.\n\n - The 'safe_mode_include_dir'<br />

configuration setting may be ignored.\n\n - Calling 'popen()' with an invalid mode can<br />

cause a crash.\n\n - A safe_mode restriction-bypass vulnerability because environment<br />

variables specified for 'proc_open' are passed without checking them.\n\nFor your<br />

information, the observed version of PHP is: \n %L<br />

Solution: Upgrade to PHP version 5.3.1 or later.<br />

CVE-2009-4018<br />

BIND 9 DNSSEC Query Response Remote Cache Poisoning<br />

<strong>PVS</strong> ID: 5243 FAMILY: DNS Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:42983<br />

Description: Synopsis :\n\nThe remote DNS Server is vulnerable to a remote cache-poisoning<br />

attack.\n\nThe remote DNS Server is running BIND 9 earlier than 9.4.3-P4, 9.5.2-P1, or<br />

9.6.1-P2. Such versions may incorrectly ad records to its cache from the additional section<br />

of responses received during resolution of a recursive client query. This behavior only<br />

occurs when processing client queries with checking disabled (CD) at the same time as<br />

requesting DNSSEC records (DO). For your information, the observed version of BIND 9<br />

is\n%L<br />

Solution: Upgrade to BIND 9.4.3-P4 / 9.5.2-P1 / 9.6.1-P2 or later.<br />

CVE-2009-4022<br />

IBM Solid Database < 6.30.0.37 Remote Denial of Service<br />

<strong>PVS</strong> ID: 5244 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:42877<br />

Description: Synopsis : \n\nThe remote database server is vulnerable to a denial-of-service<br />

attack.\n\nThe remote host is running IBM SolidDB. The installed version of SolidDB is<br />

earlier than 6.30.0.37. Such versions are potentially affected by a denial-of-service in<br />

'solid.exe' when handling a specially crafted network packet containing an invalid error<br />

code. For your information, the observed version of IBM SolidDB is : \n %L<br />

Solution: Upgrade to IBM SolidDB 6.30.0.37 or later.<br />

CVE-2009-3840<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1399


IBM Solid Database < 6.30.0.37 Remote Denial of Service<br />

<strong>PVS</strong> ID: 5245 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:42877<br />

Description: Synopsis : \n\nThe remote database server is vulnerable to a denial-of-service<br />

attack.\n\nThe remote host is running IBM SolidDB. The installed version of SolidDB is<br />

earlier than 6.30.0.37. Such versions are potentially affected by a denial-of-service in<br />

'solid.exe' when handling a specially crafted network packet containing an invalid error<br />

code. For your information, the observed version of IBM SolidDB is : \n %L<br />

Solution: Upgrade to IBM SolidDB 6.30.0.37 or later.<br />

CVE-2009-3840<br />

OpenX < 2.8.2 Arbitrary File Upload<br />

<strong>PVS</strong> ID: 5246 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server is vulnerable to a remote file upload attack.\n\nThe<br />

remote web server is hosting OpenX, a web-based ad server. The installed version is earlier<br />

than 2.8.2. Such versions are potentially affected by a remote file upload vulnerability. The<br />

application fails to verify the MIME type associated with an uploaded file. An attacker,<br />

exploiting this flaw, could execute arbitrary code on the remote server. For your<br />

information, the observed version of OpenX is: \n %L<br />

Solution: Upgrade to OpenX 2.8.2 or later.<br />

CVE-2009-4098<br />

Sun Solaris sshd Timeout Mechanism Remote Denial of Service<br />

<strong>PVS</strong> ID: 5247 FAMILY: SSH<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote SSH server is vulnerable to a remote denial of service<br />

attack.\n\nThe remote Solaris 10 host appears to be running the Solaris sshd daemon earlier<br />

than version 1.1.3. Such versions are potentially affected by a denial-of-service<br />

vulnerability in the timeout mechanism. An unprivileged attacker, exploiting this flaw,<br />

could crash the affected service. For your information, the observed version of Solaris sshd<br />

is: \n %L<br />

Solution: Apply patch 143140-01 or later, as referenced above.<br />

CVE-2009-4075<br />

RT: Request Tracker Session Fixation Vulnerability<br />

<strong>PVS</strong> ID: 5248 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:43006<br />

Family Internet Services 1400


Description: Synopsis : \n\nThe remote host is running a web application that is affected by a session<br />

fixation vulnerability.\n\nThe remote host is running RT: Request Tracker, an<br />

enterprise-grade ticketing system. The version detected is affected by a session fixation<br />

vulnerability. An attacker, exploiting this flaw, could gain unauthorized access to the<br />

application. For your information, the observed version of RT is: \n %L<br />

Solution: Upgrade to RT 3.8.6, 3.6.10, or later.<br />

CVE-2009-3585<br />

AWStats < 6.95 awredir.pl Redirect<br />

<strong>PVS</strong> ID: 5249 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:42982<br />

Description: Synopsis : \n\nThe remote web server is hosting a PERL script that has an open<br />

redirect.\n\nThe remote web server is hosting AWStats. The AWStats contains a version of<br />

the awredir.pl script that has an open redirect. An attacker may be able to exploit this issue<br />

to conduct phishing attacks by tricking users into visiting malicious websites. For your<br />

information, the observed version of AWStats is: \n %L<br />

Solution: Upgrade to AWStats 6.95 or later.<br />

CVE Not available<br />

Simple Machines Forum < 1.1.11 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5250 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server is hosting a CGI application that is vulnerable to<br />

multiple attack vectors.\n\nThe remote web servers is hosting Simple Machines Forum<br />

earlier than 1.1.11. Such versions are potentially affected by multiple cross-site scripting<br />

issues. For your information, the observed version of Simple Machines Forum is: \n %L<br />

Solution: Upgrade to Simple Machines Forum 1.1.11 or later.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

eDirectory < 8.8.5.2/8.7.3.10 ftf2 'NDS Verb 0x1' Buffer Overflow<br />

<strong>PVS</strong> ID: 5251 FAMILY: Generic RISK: HIGH NESSUS ID:43030<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a remote command execution<br />

attack.\n\nThe remote host is running eDirectory, a directory service from Novell. The<br />

installed version is earlier than 8.8 SP5 ftf2, or 8.7.3.10 ftf2. Such versions are potentially<br />

affected by a remote buffer overflow vulnerability when handling specially crafted 'NDS<br />

Verb 0x1' requests. An attacker, exploiting this flaw, could execute arbitrary commands on<br />

the host subject to the privileges of the affected software. For your information, the<br />

observed version of Novell eDirectory is: \n %L<br />

Family Internet Services 1401


Solution: Upgrade to eDirectory 8.8 SP5 ftf2 / 8.7.3.10 ftf2 or later.<br />

CVE-2009-0895<br />

HTTP Server Basic Authorization Detection<br />

<strong>PVS</strong> ID: 5252 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: Detect default HTTP credentials.<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Client .exe Download Detection<br />

<strong>PVS</strong> ID: 5254 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client was just observed download the following executable file: \n %L<br />

realtimeonly<br />

Solution: Ensure that this application is in alignment with existing policies and guidelines<br />

CVE Not available<br />

Novell iPrint Client < 5.32 Multiple Buffer Overflow Vulnerabilities<br />

<strong>PVS</strong> ID: 5255 FAMILY: Web Clients RISK: HIGH NESSUS ID:43060<br />

Description: Synopsis : \n\nThe remote Windows host has an application that is vulnerable to multiple<br />

attack vectors.\n\nThe installed version of Novell iPrint Client is affected by multiple<br />

buffer overflow vulnreabilities : \n\n - A stack-based buffer overflow exists due to<br />

insufficient boudnary checks on the 'target-frame' parameter. (CVE-2009-1568)\n\n - A<br />

stack-based buffer overflow exists due to insufficient validation of time information.<br />

(CVE-2009-1569)\n\nFor your information, the observed version Novell iPrint client is: \n<br />

%L<br />

Solution: Upgrade to Novell iPrint Client version 5.32 or later.<br />

CVE-2009-1569<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Adobe AIR < 1.5.3 Multiple Vulnerabilities (APSB09-19)<br />

<strong>PVS</strong> ID: 5256 FAMILY: Web Clients RISK: HIGH NESSUS ID:43069<br />

Family Internet Services 1402


Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote<br />

Windows host contains a version of Adobe AIR player that is earlier than 1.5.3. Such<br />

versions are reportedly affected by multiple vulnerabilities : \n\n - A vulnerability in the<br />

parsing of JPEG data that could potentially lead to code execution. (CVE-2009-3794)\n\n -<br />

A data injection vulnerability that could potentially lead to code execution.<br />

(CVE-2009-3796)\n\n - A memory corruption vulnerability that could potentially lead to<br />

code execution. (CVE-2009-3797)\n\n - A memory corruption vulnerability that could<br />

potentially lead to code execution. (CVE-2009-3798)\n\n - An integer overflow<br />

vulnerability that could potentially lead to code execution. (CVE-2009-3799)\n\n - Multiple<br />

crash vulnerabilities that could potentially lead to code execution. (CVE-2009-3800)\n\n -<br />

A Windows-only local file name access vulnerability in the Flash Player ActiveX control<br />

that could potentially lead to information disclosure. (CVE-2009-3951)\n\nFor you<br />

information, the observed version of Adobe AIR is: \n %L<br />

Solution: Upgrade to Adobe AIR 1.5.3 or later.<br />

CVE-2009-3951<br />

Moodle < 1.8.11 / 1.9.7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5257 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

Moodle installed on the remote host is potentially vulnerable to multiple flaws.\n\n -<br />

Multiple cross-site request forger issues. (MSA-09-0022)\n\n - User account disclosure in<br />

LAMS module. (MSA-09-0023)\n\n - Insufficient access control may allow unauthorized<br />

users to view glossary entries. (MSA-09-0024)\n\n - Invalid application access control in<br />

MNET interface could allow execution of any MNET function from all registered remote<br />

servers. (MSA-09-0026)\n\n - Login information can be sent unsecured even when a site is<br />

configured to use SSL for logins. (MSA-09-0027)\n\n - A SQL injection issue in the<br />

SCORM module. (MSA-09-0031)\n\nFor your information, the observed version of<br />

Moodle is: \n %L<br />

Solution: Upgrade to Moodle version 1.8.11, 1.9.7, or later.<br />

CVE-2009-4305<br />

TestLink < 1.8.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5258 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:43101<br />

Description: Synopsis : \n\nThe remote web server is vulnerable to multiple attack vectors.\n\nThe<br />

remote web server is hosting TestLink, a PHP-based testing suite. The installed version of<br />

TestLink is earlier than 1.8.5. Such versions are potentially affected by multiple<br />

vulnerabilities.\n\n - A cross-site scripting vulnerability in the 'req' parameter of the<br />

'login.php' script which does not require credentials to exploit.\n\n - Cross-site scripting<br />

vulnerabilities in the 'key' parameter of the '/lib/general/staticPage.php script, the<br />

'tableName' parameter of the '/lib/attachments/attachmentupload.php' script, and the<br />

'startDate', 'endDate', and 'logLevel' parameters of the '/lib/events/eventviewer.php' script. -<br />

Family Internet Services 1403


Multiple SQL-injection vulnerabilities in the 'Test Case ID' field of the<br />

'/lib/general/navBar.php' script, and the 'logLevel' parameter of the<br />

'/lib/events/eventviewer.php' script.\n\nFor your information, the observed version of<br />

TestLink is: \n %L<br />

Solution: Upgrade to TestLink 1.8.5 or later.<br />

CVE-2009-4238<br />

MySQL < 5.0.88 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5259 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:42899<br />

Description: Synopsis : \n\nThe remote database server is vulnerable to multiple attack vectors.\n\nThe<br />

remote host is running MySQL Community server < 5.0.88. Such versions are potentially<br />

affected by multiple issues : \n\n - MySQL clients linked against OpenSSL are vulnerable<br />

to man-in-the-middle attacks. (Bug #47320)\n\n - The GeomFromWKB() function can be<br />

manipulated to cause a denial of service. (Bug #47780)\n\n - Specially crafted SELECT<br />

statements containing sub-queries in the WHERE clause can cause the server to crash. (Bug<br />

48291)\n\nFor your information, the observed version of MySQL is: \n %L<br />

Solution: Upgrade to MySQL Community server 5.0.88 or later.<br />

CVE-2009-4019<br />

Invision Power Board < 3.0.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5260 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:43163<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Invision Power Board, a PHP bulletin board application. The installed version of<br />

Invision Power Board is potentially affected by multiple vulnerabilities : \n\n - A local-file<br />

include vulnerability that affects the 'section' parameter sent to the 'forum/index.php'<br />

script.\n\n - A sql-injection vulnerability that affects the 'starter' and 'state' parameters of the<br />

'admin/applications/forum/modules_public/moderate/moderate.php' script.\n\n - A<br />

cross-site scripting vulnerability caused by incorrect handling of '.txt' file<br />

attachments.\n\nFor your information, the observed version of Invision Power Board is: \n<br />

%L<br />

Solution: Upgrade to Invision Power Board 3.0.5 or later.<br />

CVE Not available<br />

PostgreSQL < 8.4.2/8.3.9/8.2.15/8.1.19/8.0.23/7.4.27 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5261 FAMILY: Database<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 1404


Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of PostgreSQL that is earelir than 8.4.2, 8.3.9, 8.2.15, 8.1.19, 8.0.23, or<br />

7.4.27. Such versions are potentially affected by multiple vulnerabilities : \n\n - NULL<br />

Bytes in SSL Certificates can be used to falsify client or server authentication.<br />

(CVE-2009-4034)\n\n - Privilege escalation via changing session state in an index function.<br />

(CVE-2009-4136) - An integer overflow in the 'ExecChooseHashTableSize()' function of<br />

the 'backend/executor/nodeHash.c' source file which could lead to a denial of service.<br />

(CVE-2010-0733)\n\nFor your information, the observed version of PostgreSQL is: \n %L<br />

Solution: Upgrade to PostgreSQL 7.4.27, 8.0.23, 8.1.19, 8.2.15, 8.3.9, 8.4.2, or later.<br />

CVE-2010-0733<br />

DB2 9.5 < Fix Pack 5 Unspecified Vulnerabilities<br />

<strong>PVS</strong> ID: 5262 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:43172<br />

Description: Synopsis : \n\nThe remote database server is vulnerable to multiple attack<br />

vectors.\n\nAccording to its version, the installation of DB2 9.5 is earlier than Fix Pack 5.<br />

Such versions are potentially affected by multiple unspecified vulnerabilities. For your<br />

information, the observed version of DB2 is: \n %L<br />

Solution: Upgrade to IBM DB2 9.5 Fix Pack 5<br />

CVE-2009-4335<br />

Piwik < 0.5 unserialize() PHP Code Execution Vulnerability<br />

<strong>PVS</strong> ID: 5263 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server is hosting a PHP application that is vulnerable to a<br />

remote code execution vulnerability.\n\nThe remote web server is hosting Piwik, a web<br />

analytics application written in PHP. The installed version is earlier than 0.5. Such versions<br />

are potentially affected by a remote PHP code execution vulnerability because the<br />

application unserializes data from user supplied cookies. An attacker could send a specially<br />

crafted cookie which, when unserialized, could be used to upload arbitrary files or possibly<br />

execute arbitrary PHP code. For your information, the observed version of Piwik is: \n %L<br />

Solution: Upgrade to Piwik 0.5 or later.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Firefox < 3.0.16 / 3.5.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5264 FAMILY: Web Clients RISK: HIGH NESSUS ID:43174<br />

Description: Synopsis : \n\nThe remote host has a web browser installed that is affected by multiple<br />

attack vectors.\n\nThe remote host is running a version of Mozilla Firefox earlier than<br />

3.0.16 or 3.5.6. Such versions are potentially affected by multiple vulnerabilities : \n\n -<br />

Multiple crashes that could result in arbitrary code execution. (MFSA 2009-65)\n\n -<br />

Family Internet Services 1405


Multiple vulnerabilities in 'liboggplay' which could lead to arbitrary code execution. Note<br />

that this only affects the 3.5.x branch. (MFSA 2009-66)\n\n - An integer overflow in the<br />

'Theora' video library which could lead to a crash or the execution of arbitrary code. Note<br />

that this only affects the 3.5.x branch. (MFSA 2009-67)\n\n - The NTML implementation is<br />

vulnerable to reflection attacks in which NTML credentials from one application could be<br />

forwarded to another application. (MFSA 2009-68)\n\n - Multiple location bar spoofing<br />

vulnerabilities. (MFSA 2009-69)\n\n - A content window which is opened by a chrome<br />

window retains a reference to the chrome window via the 'window.opener' property which<br />

could lead to a privilege escalation. (MFSA 2009-70)\n\n - The exception messages<br />

generated by the 'GeckoActiveXObject' differ based on whether or not the requested COM<br />

object's ProgID is present in the system registry. (MFSA 2009-71)\n\nFor your information,<br />

the observed version of Firefox is: \n %L<br />

Solution: Upgrade to Mozilla Firefox 3.0.16, 3.5.6, or later.<br />

CVE-2009-3987<br />

Mozilla SeaMonkey < 2.0.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5265 FAMILY: Web Clients RISK: HIGH NESSUS ID:43175<br />

Description: Synopsis : \n\nThe remote host has a web browser installed that is affected by multiple<br />

attack vectors.\n\nThe remote host is running a version of Mozilla SeaMonkey earlier than<br />

2.0.1. Such versions are potentially affected by multiple vulnerabilities : \n\n - Multiple<br />

crashes that could result in arbitrary code execution. (MFSA 2009-65)\n\n - Multiple<br />

vulnerabilities in 'liboggplay' which could lead to arbitrary code execution. Note that this<br />

only affects the 3.5.x branch. (MFSA 2009-66)\n\n - An integer overflow in the 'Theora'<br />

video library which could lead to a crash or the execution of arbitrary code. Note that this<br />

only affects the 3.5.x branch. (MFSA 2009-67)\n\n - The NTML implementation is<br />

vulnerable to reflection attacks in which NTML credentials from one application could be<br />

forwarded to another application. (MFSA 2009-68)\n\n - Multiple location bar spoofing<br />

vulnerabilities. (MFSA 2009-69)\n\n - A content window which is opened by a chrome<br />

window retains a reference to the chrome window via the 'window.opener' property which<br />

could lead to a privilege escalation. (MFSA 2009-70)\n\n - The exception messages<br />

generated by the 'GeckoActiveXObject' differ based on whether or not the requested COM<br />

object's ProgID is present in the system registry. (MFSA 2009-71)\n\nFor your information,<br />

the observed version of SeaMonkey is: \n %L<br />

Solution: Upgrade to Mozilla SeaMonkey 2.0.1 or later.<br />

Web Client Detection<br />

CVE-2009-3987<br />

<strong>PVS</strong> ID: 5266 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host issued the following GET request : \n%L<br />

realtimeonly<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1406


Solution: N/A<br />

CVE Not available<br />

Winamp < 5.57 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5267 FAMILY: Generic RISK: HIGH NESSUS ID:43181<br />

Description: Synopsis : \n\nThe remote host has a media player installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running Winamp, a media player for Windows. The<br />

version of Winamp installed on the remote host is earlier than 5.57. Such versions are<br />

potentially affected by multiple vulnerabilities : \n\n - A boundary error in the Module<br />

Decoder Plug-in exists when parsing samples and can be exploited to cause a heap-based<br />

buffer overflow via a specially crafted 'Impulse Tracker' file. (CVE-2009-3995)\n\n - An<br />

error in the Module Decoder Plug-in when parsing 'Ultratracker' files can be exploited to<br />

cause a heap-based buffer overflow. (CVE-2009-3996)\n\n - An integer overflow error<br />

exists in the Module Decoder Plug-in when parsing 'Oktalyzer' files and can be exploited to<br />

cause a heap-based buffer overflow.\n\n - Multiple integer overflow vulnerabilities in the<br />

'jpeg.w5s' and 'png.w5s' filters when processing malformed 'JPEG' and 'PNG' data.\n\nFor<br />

your information, the observed version of Winamp is: \n %L<br />

Solution: Upgrade to Winamp version 5.57 or later.<br />

CVE-2009-3997<br />

Zabbix < 1.6.6 Null Pointer Dereference DoS<br />

<strong>PVS</strong> ID: 5268 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to denial-of-service attack.\n\nThe remote<br />

host is running Zabbix, an IT monitoring service. The installed version of Zabbix is earlier<br />

than 1.6.6. Such versions are potentially affected by a Null Pointer Dereference<br />

vulnerability in the 'process_trap()' function of the 'zabbix_server/trapper/trapper.c' source<br />

file. An attacker can exploit this flaw to crash the affected service. For your information,<br />

the observed version of Zabbix is: \n %L<br />

Solution: Upgrade to Zabbix 1.6.6 or later.<br />

CVE Not available<br />

Zabbix < 1.6.7 <strong>Security</strong> Bypass Vulnerability<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5269 FAMILY: Generic RISK: HIGH NESSUS ID:43391<br />

Description: Synopsis : \n\nThe remote host is affected by a security bypass vulnerability.\n\nThe<br />

remote host is running Zabbix, an IT monitoring service. The installed version of Zabbix is<br />

earlier than 1.6.7. Such versions are potentially affected by a security bypass vulnerability<br />

because the application does not prevent unauthenticated users from executing arbitrary<br />

SQL queries (ZBX-1031). For your information, the observed version of Zabbix is: \n %L<br />

Family Internet Services 1407


Solution: Upgrade to Zabbix 1.6.7 or later.<br />

CVE Not available<br />

Zabbix < 1.6.8 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5270 FAMILY: Generic RISK: HIGH NESSUS ID:44620<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Zabbix, an IT monitoring service. The installed version of Zabbix is earlier than<br />

1.6.8. Such versions are potentially affected by multiple vulnerabilities : \n\n - A<br />

denial-of-service vulnerability in the 'zbx_get_next_field()' function. (ZBX-1355)\n\n - A<br />

SQL-injection vulnerability in the 'send_history_last_id()' function of the<br />

'zabbix_server/trapper/nodehistory.c' source file. (ZBX-1031)\n\n - It is possible for remote<br />

unatuthenticated usres to execute OS commands. (ZBX-1030)\n\nFor your information, the<br />

observed version of Zabbix is: \n %L<br />

Solution: Upgrade to Zabbix 1.6.8 or later.<br />

CVE-2009-4499<br />

Myspace Usage Detection<br />

<strong>PVS</strong> ID: 5271 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client was observed logging into a myspace.com account. Myspace is a social<br />

networking site which features a personal blog, instant messaging, bulletin boards, and<br />

more. You should ensure that such behavior is in alignment with Corporate Policies and<br />

guidelines.<br />

realtime<br />

Solution: N/A<br />

CVE Not available<br />

Facebook Usage Detection<br />

<strong>PVS</strong> ID: 5272 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client was observed accessing the Facebook social networking site. You should<br />

ensure that such behavior is in alignment with Corporate Policies and guidelines.<br />

realtime<br />

Solution: N/A<br />

CVE Not available<br />

YouTube Usage Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1408


<strong>PVS</strong> ID: 5273 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client was observed accessing youtube.com. Youtube is a public site which<br />

features videos from all over the world. You should ensure that such behavior is in<br />

alignment with Corporate Policies and guidelines.<br />

realtime<br />

Solution: N/A<br />

CVE Not available<br />

classmates.com Usage Detection<br />

<strong>PVS</strong> ID: 5274 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client was observed logging into classmates.com. Classmates.com is a social<br />

networking site which allows users to reconnect with former friends and colleagues. You<br />

should ensure that such behavior is in alignment with Corporate Policies and guidelines.<br />

Solution: N/A<br />

Gmail Usage Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 5275 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is a gmail.com email client. Gmail is a web-based email client. You<br />

should ensure that such behavior is in alignment with Corporate Policies and guidelines.<br />

For your information, the client email address is %L<br />

realtime<br />

Solution: N/A<br />

CVE Not available<br />

XM Radio Usage Detection<br />

<strong>PVS</strong> ID: 5276 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client was observed logging into their XM radio account. You should ensure<br />

that such behavior is in alignment with Corporate Policies and guidelines. For your<br />

information, the user account was logged as:\n %L<br />

realtime<br />

Solution: N/A<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1409


CVE Not available<br />

Synapse Client Detection<br />

<strong>PVS</strong> ID: 5277 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a Synapse client. Synapse is used to connect clients into a<br />

Peer To Peer (p2p) network. The reported version is\n %L<br />

Solution: Ensure that such behavior is in alignment with policies and guidelines regarding<br />

appropriate network usage<br />

CVE Not available<br />

Web Server - JavaScript Hosted on 3rd Party Server<br />

<strong>PVS</strong> ID: 5278 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server utilizes JavaScript on its pages. Further, the web server seems to be<br />

using JavaScript from an external source. The source of the JavaScript is: \n %L \n\nThe<br />

JavaScript is embedded within the following web document: \n%P<br />

Solution: Ensure that loading client-side JavaScript from a 3rd party is authorized according to<br />

policies and guidelines.<br />

CVE Not available<br />

Yahoo! Web Mail Usage Detection<br />

<strong>PVS</strong> ID: 5279 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is a Yahoo.com email client. Yahoo provides a web-based email client<br />

for users of their @yahoo.com domain. You should ensure that such behavior is in<br />

alignment with Corporate Policies and guidelines. For your information, the client<br />

username is %L<br />

Solution: N/A<br />

CVE Not available<br />

whatismyip.com Client Detection<br />

<strong>PVS</strong> ID: 5280 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client was just observed connecting to 'whatismyip.com'. This sort of query is<br />

often used by Botnet clients to determine their external (routable) IP address.<br />

realtime<br />

Solution: N/A<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1410


CVE Not available<br />

PHP 5.2.x < 5.2.12 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5281 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:43351<br />

Description: Synopsis : \n\nThe remote web server uses a version of PHP that is vulnerable to multiple<br />

attack vectors.\n\nAccording to its banner, the version of PHP 5.2.x installed on the remote<br />

host is earlier than 5.2.12. Such versions are potentially affected by multiple vulnerabilities<br />

: \n\n - A safe_mode bypass in tempnam(). (CVE-2009-3557)\n\n - An open_basedir<br />

bypass in posix_mkfifo(). (CVE-2009-3558)\n\n - A possible denial-of-service via<br />

temporary file exhaustion caused by a failure to limit the number of file uploads per<br />

request. (CVE-2009-4017)\n\n - An arbitrary code execution vulnerability in the<br />

'session.save_path()' function and the '$_SESSION' data structure. (CVE-2009-4143)\n\n -<br />

A cross-site scripting vulnerability becuase the 'htmlspecialcharacters()' function fails to<br />

properly handle some malformed multibyte character sequences.\n\nFor your information,<br />

the observed version of PHP is: \n %L<br />

Solution: Upgrade to PHP version 5.2.12 or later.<br />

CVE-2009-4143<br />

Serv-U < 9.2.0.1 User Directory Information Disclosure<br />

<strong>PVS</strong> ID: 5282 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:43369<br />

Description: Synopsis : \n\nThe remote FTP server is affected by an information disclosure<br />

vulnerability.\n\nThe remote FTP server is running Serv-U file Server, an FTP server for<br />

Windows. The installed version is earlier than 9.2.0.1. Such versions are potentially<br />

affected by an information disclosure vulnerability which could allow an attacker to view<br />

directories that are above the user's root directory. For your information, the observed<br />

version of Serv-U is: \n %L<br />

Solution: Upgrade to Serv-U version 9.2.0.1 or later.<br />

CVE-2009-4815<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Adobe Flash Media Server < 3.0.5 / 3.5.3 Multiple Vulnerabilities (APSB09-018) (RTMP over HTTP)<br />

<strong>PVS</strong> ID: 5283 FAMILY: Web Servers RISK: HIGH NESSUS ID:43390<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors\n\nThe remote host<br />

is running Adobe Flash Media server. The installed version of Adobe Flash Media server<br />

appears to be earlier than 3.0.5 or 3.5.3. Such versions are potentially affected by multiple<br />

vulnerabilities : \n\n - A resource exhaustion vulnerability that could lead to a denial of<br />

service. (CVE-2009-3791)\n\n - A directory traversal vulnerability that could lead to FMS<br />

loading arbitrary DLLs present on the server. (CVE-2009-3792)\n\nFor your information,<br />

the observed version of Adobe Flash Media Server is: \n %L<br />

Family Internet Services 1411


Solution: Upgrade to Adobe Flash Media Server 3.0.5, 3.5.3 or later.<br />

CVE-2009-3792<br />

Adobe Flash Media Server < 3.5.3 Multiple Vulnerabilities (APSB09-018) (RTMP)<br />

<strong>PVS</strong> ID: 5284 FAMILY: Web Servers RISK: HIGH NESSUS ID:43390<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors\n\nThe remote host<br />

is running Adobe Flash Media server. The installed version of Adobe Flash Media server<br />

appears to be earlier than 3.5.3. Such versions are potentially affected by multiple<br />

vulnerabilities : \n\n - A resource exhaustion vulnerability that could lead to a denial of<br />

service. (CVE-2009-3791)\n\n - A directory traversal vulnerability that could lead to FMS<br />

loading arbitrary DLLs present on the server. (CVE-2009-3792)\n\nFor your information,<br />

the observed version of Adobe Flash Media Server is: \n %L<br />

Solution: Upgrade to Adobe Flash Media Server 3.5.3 or later.<br />

CVE-2009-3792<br />

OpenX < 2.8.3 Authentication-Bypass<br />

<strong>PVS</strong> ID: 5285 FAMILY: CGI RISK: HIGH NESSUS ID:43864<br />

Description: Synopsis : \n\nThe remote web server is vulnerable to an authentication bypass<br />

attack.\n\nThe remote web server is hosting OpenX, a web-based ad server. The installed<br />

version is earlier than 2.8.3. Such versions are potentially affected by an authentication<br />

bypass vulnerability because the application allows anonymous access to the administrative<br />

interface. For your information, the observed version of OpenX is: \n %L<br />

Solution: Upgrade to OpenX 2.8.3 or later.<br />

CVE-2009-4830<br />

Web Server - BitTorrent .torrent File Detection<br />

<strong>PVS</strong> ID: 5286 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server is hosting .torrent files. These are files which are used by various<br />

BitTorrent clients to initiate a torrent download. As an example, consider the following file<br />

%P\nDistributing such files over the web can be done, but the webmaster should make sure<br />

that such file sharing is authorized with respect to policies and guidelines.<br />

Solution: N/A<br />

CVE Not available<br />

Android Mobile Device Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5287 FAMILY: Mobile Devices RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1412


Description: The remote client is an Android mobile device version: \n %L<br />

Solution: Ensure that such devices are within corporate standards<br />

CVE Not available<br />

ViewVC < 1.1.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5288 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server is vulnerable to multiple attack vectors.\n\nThe<br />

remote web server is running ViewVC, a web-based interface for CVS and Subversion. The<br />

installed version of ViewVC is earlier than 1.1.3. Such versions are potentially affected by<br />

multiple issues : \n\n - A security vulnerability that involves root listing support of per-root<br />

authorization configuration.\n\n - A security vulnerability in the 'query.py' involving the<br />

'forbidden' authorizer.\n\nFor your information, the observed version of ViewVC is: \n %L<br />

Solution: Upgrade to ViewVC 1.1.3 or later.<br />

CVE Not available<br />

Sun Java System Directory Proxy Server 6.x < 6.3.1 Update 1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5289 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:43615<br />

Description: Synopsis : \n\nThe remote host is running the Sun Java system Directory Proxy Server, and<br />

LDAP proxy server from Sun Microsystems. The installed version is earlier than 6.3.1<br />

Update 1. Such versions are potentially affected by multiple vulnerabilities : \n\n - Under<br />

certain conditions simultaneous long binds are incorrectly assigned the same backed<br />

connections. An attacker may exploit this flaw to hijack an authenticated user's session and<br />

perform unauthorized operations. (CVE-2009-4440)\n\n - 'SO_KEEPALIVE' socket option<br />

is not enabled, and hence it may be possible for a remote attacker to trigger a denial of<br />

service condition by exhausting available connection slots. (CVE-2009-4441)\n\n -<br />

'max-client-connections' configuration setting is not correctly implemented, thus it may be<br />

possible for a remote attacker to trigger a denial of service condition. (CVE-2009-4442)\n\n<br />

- An unspecified vulnerability in the 'psearch' functionality could allow an attacker to<br />

trigger a denial of service condition. (CVE-2009-4443)\n\nFor your information, the<br />

observed version of Sun Java System Directory Proxy server is: \n %L \nIAVB Reference :<br />

2010-B-0002\nSTIG Finding Severity : Category I<br />

Solution: Upgrade to Sun Java System Directory Server 6.3.1 and apply patch 141958-01<br />

CVE-2009-4443<br />

Centreon < 2.1.4 <strong>Security</strong> Bypass<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5290 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1413


Description: Synopsis : \n\nThe remote web server is hosting a web application that is affected by a<br />

security-bypass vulnerability.\n\nThe remote web server is hosting Centreon, a PHP-based<br />

application for monitoring networks.\n\nThe installed version of Centreon is earlier than<br />

2.1.4. Such versions are potentially affected by a security-bypass vulnerability which would<br />

allow an attacker to gain access to functionality such as ping or traceroute and access to<br />

LDAP import information. For your information, the observed version of Centreon is: \n<br />

%L<br />

Solution: Upgrade to Centreon 2.1.4 or later.<br />

CVE-2009-4368<br />

phpLDAPadmin < 1.2 Local File Inclusion<br />

<strong>PVS</strong> ID: 5291 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:43402<br />

Description: Synopsis : \n\nThe remote web server is hosting an application that is vulnerable to a local<br />

file inclusion attack.\n\nThe remote web server is hosting phpLDAPadmin, a web-based<br />

LDAP client. The installed version of phpLDAPadmin is earlier than 1.2.0. Such versions<br />

are potentially affected by a local file inclusion vulnerability because the application fails to<br />

properly sanitize user-supplied input to the 'cmd' parameter of the 'cmd.php' script. An<br />

unauthenticated user could exploit this flaw to view arbitrary files or possibly execute<br />

arbitrary PHP code on the remote host subject to the privileges of the web server user id.<br />

For your information, the observed version of phpLDAPadmin is : \n %L<br />

Solution: Upgrade to phpLDAPadmin 1.2.0 or later.<br />

CVE-2009-4427<br />

Transmission Client Detection<br />

<strong>PVS</strong> ID: 5292 FAMILY: Peer-To-Peer File Sharing<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software which should be authorized with respect<br />

to Corporate policy.\n\nThe remote host is running the Transmission client version<br />

%L\nTransmission is a client application which allows users to quickly download files<br />

from multiple locations over the BitTorrent protocol.<br />

Solution: Ensure that Transmission is allowed with respect to Corporate policies and guidelines.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Sendmail < 8.14.4 SSL Certificate NULL Character Spoofing<br />

<strong>PVS</strong> ID: 5293 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:43637<br />

Family Internet Services 1414


Description: Synopsis : \n\nThe remote host is vulnerable to a man-in-the-middle attack.\n\nThe remote<br />

mail server is running a version of Sendmail earlier than 8.14.4. Such versions are<br />

potentially affected by a flaw that my allow an attacker to spoof SSL certificates by using a<br />

NULL character in certain certificate fields. For your information, the observed version of<br />

Sendmail is: \n %L \nIAVA Reference : 2010-A-0002\nSTIG Finding Severity : Category I<br />

Solution: Upgrade to Sendmail 8.14.4 or later.<br />

CVE-2009-4565<br />

Dada Mail < 4.0.2 List Membership Requirement Bypass<br />

<strong>PVS</strong> ID: 5294 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server is hosting an application that is affected by a security<br />

bypass vulnerability.\n\nThe remote web server is hosting Dada Mail, a web-based mailing<br />

list application. The installed version is earlier than 4.0.2. Such versions, when using the<br />

'Dada Bridge' plugin, are potentially affected by a security bypass vulnerability because the<br />

application does not verify that the sender of an email is a member of a list. An attacker<br />

could exploit this flaw to spam the email list. For your information, the observed version of<br />

Dada Mail is: \n %L<br />

Solution: Upgrade to Dada Mail 4.0.2 or later.<br />

CVE Not available<br />

Novell iManager < 2.7 SP3 eDirectory Plugin Buffer Overflow Vulnerability<br />

<strong>PVS</strong> ID: 5295 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server is affected by a buffer overflow<br />

vulnerability.\n\nNovell iManager is installed on the remote host. The version of iManager<br />

is earlier than 2.7 SP3 and is therefore potentially affected by a buffer overflow<br />

vulnerability in the eDirectory plugin. A remote attacker, exploiting this flaw, could<br />

potentially execute arbitrary code. For your information, the observed version of Novell<br />

iManager is: \n %L<br />

Solution: Upgrade to Novell iManager 2.7 SP3 (iManager 2.7.3).<br />

CVE-2009-4486<br />

Liferay Portal 'p_p_id' Parameter HTML Injection<br />

<strong>PVS</strong> ID: 5296 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server is hosting an application that is vulnerable to a<br />

HTML-injection attack.\n\nThe remote web server is running Liferay Portal, a Java-based<br />

web portal. The installed version is earlier than 5.3.0. Such versions are potentially affected<br />

by an HTML injection vulnerability because the application fails to properly sanitize<br />

Family Internet Services 1415


user-supplied input to the 'p_p_id' parameter. An unauthenticated can supply malicious data<br />

which is then displayed to an administrator in another page. For your information, the<br />

observed version of Liferay Portal is: \n %L<br />

Solution: Upgrade to Liferay Portal 5.3.0 or later.<br />

CVE-2009-3742<br />

Trac < 0.11.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5297 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server is hosting an application that is vulnerable to<br />

multiple attack vectors.\n\nThe remote web server is hosting Trac, a web-based software<br />

management application. The installed version of Trac is earlier than 0.11.6. Such versions<br />

are potentially affected by multiple vulnerabilities : \n\n - Fixed the policy checks in report<br />

results when using alternate formats.\n\n - Added a check for the 'raw' role that is missing<br />

in docutils < 0.6.\n\nFor your information, the observed version of Trac is: \n %L<br />

Solution: Upgrade to Trac 0.11.6 or later.<br />

CVE Not available<br />

Pidgin < 2.6.5 Information Disclosure Vulnerability<br />

<strong>PVS</strong> ID: 5298 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:43862<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Pidgin < 2.6.5. Such versions are potentially affected by an information<br />

disclosure vulnerability because the MSN protocol plugin axtracts the filename of a custom<br />

emoticon from an incoming request and uploads that file without correlating the filename to<br />

a valid custom emoticon. For your information, the observed version of Pidgin is: \n %L<br />

Solution: Upgrade to Pidgin 2.6.5 or later.<br />

Web Client Detection<br />

CVE-2010-0013<br />

<strong>PVS</strong> ID: 5299 FAMILY: Web Clients RISK: NONE NESSUS ID:Not Available<br />

Description: The remote host is using the following Web client : \n%L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1416


TurboFTP 'DELE' FTP Command Remote Buffer Overflow<br />

<strong>PVS</strong> ID: 5300 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:43877<br />

Description: Synopsis : \n\nThe remote FTP server is vulnerable to a remote denial of service<br />

attack.\n\nThe remote host is running the TurboFTP FTP server. The installed version of<br />

TurboFTP is earlier than 1.00.720. Such versions are potentially affected by a remote<br />

buffer overflow vulnerability when handling an overly large string that is passed to the<br />

'DELE' FTP command. An attacker, exploiting this flaw, could crash the affected service.<br />

For your information, the observed version of TurboFTP is: \n %L<br />

Solution: Upgrade to TurboFTP 1.00.720<br />

CVE Not available<br />

Zope 'standard_error_message' Cross-Site Scripting Vulnerability<br />

<strong>PVS</strong> ID: 5301 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server is hosting an application that is vulnerable to a<br />

cross-site scripting attack.\n\nThe remote Zope server is vulnerable to a cross-site scripting<br />

flaw related to the 'standard_error_message' template. An attacker, exploiting this flaw,<br />

could execute arbitrary script code in a user's browser. For your information, the observed<br />

version of Zope server is: \n %L<br />

Solution: Upgrade to Zope 2.8.12, 2.9.12, 2.10.22, 2.11.6, 2.12.3, or later.<br />

CVE-2010-1104<br />

DokuWiki < DokuWiki Release 2009-12-25 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5302 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:44059<br />

Description: Synopsis : \n\nThe remote web server is hosting an application that is vulnerable to<br />

multiple attack vectors.\n\nThe remote web server is hosting a release of DokuWiki earlier<br />

than DokuWiki 2009-12-25. Such versions are potentially affected by multiple<br />

vulnerabilities : \n\n - A security-bypass vulnerability that can be exploited through the<br />

'cmd[save]', 'cmd[del]', and 'cmd[update]' parameters of the 'lib/plugins/acl/ajax.php'<br />

script.\n\n - An information-disclosure vulnerability in the 'ns' parameter of the 'ajax.php'<br />

script.\n\nFor your information, the observed version of DokuWiki is: \n %L<br />

Solution: Upgrade to DokuWiki Release 2009-12-25 or later.<br />

CVE-2010-0288<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Sun Java System Identity Manager 8.1 Privilege Escalation Vulnerability<br />

<strong>PVS</strong> ID: 5303 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1417


Description: Synopsis : \n\nThe remote host is vulnerable to a privilege escalation attack.\n\nThe remote<br />

host is running Sun Java System Identity Manager 8.1 with Patch 5 or 6. Such versions are<br />

potentially affected by a privileges escalation vulnerability when it is configured with Sun<br />

Java System Access Manager, OpenSSO Enterprise 8.0, or IBM Tivoli Access Manager.<br />

An attacker, exploiting this flaw, could gain administrative privileges on the affected<br />

application. For your information, the observed version of Sun Java System Identity<br />

Manager is: \n %L<br />

Solution: Apply Patch 7 from the Sun reference.<br />

CVE-2010-0311<br />

phpMyAdmin < 2.11.10 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5304 FAMILY: CGI RISK: HIGH NESSUS ID:44324<br />

Description: Synopsis : \n\nThe remote web server contains a PHP application that is vulnerable to<br />

multiple attack vectors.\n\nThe remote web server is running a version of phpMyAdmin<br />

earlier than 2.11.10. Such versions are potentially affected by multiple vulnerabilities : \n\n<br />

- A cross-site request forgery attack because the application uses the 'unserialize()' PHP<br />

function on potentially unsafe data in the setup script.(CVE-2009-4605)\n\n - An insecure<br />

file creation and deletion vulnerability due to the way phpMyAdmin creates temporary<br />

files.\n\nFor your information, the observed version of phpMyAdmin is: \n %L<br />

Solution: Upgrade to phpMyAdmin 2.11.10, 3.0.0, or later.<br />

CVE-2009-4605<br />

Windows-Vista VPN Detection<br />

<strong>PVS</strong> ID: 5305 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Windows-Vista VPN Server. A VPN (Virtual<br />

Private <strong>Network</strong>) allows remote users to connect to an internal network as if they<br />

were local users. A VPN which allows split-tunneling will essentially serve as a<br />

bridge between the remote network and the internal network. Special care should<br />

be taken to ensure that remote VPN clients connect securely and do not introduce<br />

an unacceptable level of Risk to the internal computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to Corporate Guidelines and Policies.<br />

CVE Not available<br />

Dead Peer Detection v1.0 VPN Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5306 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Dead Peer Detection v1.0 VPN Server. A VPN (Virtual<br />

Private <strong>Network</strong>) allows remote users to connect to an internal network as if they were<br />

local users. A VPN which allows split-tunneling will essentially serve as a bridge between<br />

the remote network and the internal network. Special care should be taken to ensure that<br />

Family Internet Services 1418


emote VPN clients connect securely and do not introduce an unacceptable level of Risk to<br />

the internal computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to Corporate Guidelines and Policies.<br />

CVE Not available<br />

strongSwan 4.0.5 VPN Detection<br />

<strong>PVS</strong> ID: 5307 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the strongSwan 4.0.5 VPN Server. A VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN which allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of Risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to Corporate Guidelines and Policies.<br />

CVE Not available<br />

strongSwan 4.0.4 VPN Detection<br />

<strong>PVS</strong> ID: 5308 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the strongSwan 4.0.4 VPN Server. A VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN which allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of Risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to Corporate Guidelines and Policies.<br />

CVE Not available<br />

strongSwan 4.0.3 VPN Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5309 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the strongSwan 4.0.3 VPN Server. A VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN which allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of Risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to Corporate Guidelines and Policies.<br />

Family Internet Services 1419


CVE Not available<br />

strongSwan 4.0.2 VPN Detection<br />

<strong>PVS</strong> ID: 5310 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the strongSwan 4.0.2 VPN Server. A VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN which allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of Risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to Corporate Guidelines and Policies.<br />

CVE Not available<br />

strongSwan 4.0.1 VPN Detection<br />

<strong>PVS</strong> ID: 5311 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the strongSwan 4.0.1 VPN Server. A VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN which allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of Risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to Corporate Guidelines and Policies.<br />

CVE Not available<br />

strongSwan 4.0.0 VPN Detection<br />

<strong>PVS</strong> ID: 5312 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the strongSwan 4.0.0 VPN Server. A VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN which allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of Risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to Corporate Guidelines and Policies.<br />

CVE Not available<br />

strongSwan 2.8.0 VPN Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5313 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 1420


Description: The remote host is running the strongSwan 2.8.0 VPN Server. A VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN which allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of Risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to Corporate Guidelines and Policies.<br />

CVE Not available<br />

strongSwan 2.7.3 VPN Detection<br />

<strong>PVS</strong> ID: 5314 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the strongSwan 2.7.3 VPN Server. A VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN which allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of Risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to Corporate Guidelines and Policies.<br />

CVE Not available<br />

strongSwan 2.7.2 VPN Detection<br />

<strong>PVS</strong> ID: 5315 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the strongSwan 2.7.2 VPN Server. A VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN which allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of Risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to Corporate Guidelines and Policies.<br />

CVE Not available<br />

strongSwan 2.7.1 VPN Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5316 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the strongSwan 2.7.1 VPN Server. A VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN which allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of Risk to the internal<br />

computing environment.<br />

Family Internet Services 1421


Solution: Ensure that the VPN is acceptable with respect to Corporate Guidelines and Policies.<br />

CVE Not available<br />

strongSwan 2.7.0 VPN Detection<br />

<strong>PVS</strong> ID: 5317 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the strongSwan 2.7.0 VPN Server. A VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN which allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of Risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to Corporate Guidelines and Policies.<br />

CVE Not available<br />

Netscreen-14 VPN Detection<br />

<strong>PVS</strong> ID: 5318 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Netscreen-14 VPN Server. A VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN which allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of Risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to Corporate Guidelines and Policies.<br />

CVE Not available<br />

Netscreen-15 VPN Detection<br />

<strong>PVS</strong> ID: 5319 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Netscreen-15 VPN Server. A VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN which allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of Risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to Corporate Guidelines and Policies.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1422


Netscreen-16 VPN Detection<br />

<strong>PVS</strong> ID: 5320 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Netscreen-16 VPN Server. A VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN which allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of Risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to Corporate Guidelines and Policies.<br />

CVE Not available<br />

Symantec-Raptor-v8.1 VPN Detection<br />

<strong>PVS</strong> ID: 5321 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Symantec-Raptor-v8.1 VPN Server. A VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN which allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of Risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to Corporate Guidelines and Policies.<br />

CVE Not available<br />

Symantec-Raptor VPN Detection<br />

<strong>PVS</strong> ID: 5322 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Symantec-Raptor VPN Server. A VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an internal network as if they were local users.<br />

A VPN which allows split-tunneling will essentially serve as a bridge between the remote<br />

network and the internal network. Special care should be taken to ensure that remote VPN<br />

clients connect securely and do not introduce an unacceptable level of Risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to Corporate Guidelines and Policies.<br />

CVE Not available<br />

BIND 9 DNSSEC Bogus NXDOMAIN Response Remote Cache Poisoning<br />

<strong>PVS</strong> ID: 5323 FAMILY: DNS Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:44116<br />

Family Internet Services 1423


Description: Synopsis : \n\nThe remote DNS Server is vulnerable to a remote cache-poisoning<br />

attack.\n\nThe remote DNS Server is running Bind 9 earlier than 9.4.3-P5, 9.5.2-P1, or<br />

9.6.1-P3. Such versions are potentially affected by a remote cache-poisoning attack. An<br />

error exists in the DNSSEC NSEC/NSEC3 validation code taht could cause bogus<br />

NXDOMAIN responses to be cached as if they had validated correctly. For your<br />

information, the observed version of BIND 9 is: \n %L<br />

Solution: Upgrade to BIND 9.4.3-P5, 9.5.2-P2, 9.6.1-P3, or later.<br />

CVE-2010-0097<br />

HP Power Manager < 4.2.10 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5324 FAMILY: CGI RISK: HIGH NESSUS ID:44109<br />

Description: Synopsis : \n\nThe power management application installed on the remote host is<br />

vulnerable to multiple attack vectors.\n\nThe installed version of HP Power Manager is<br />

earlier than 4.2.10. Such versions are potentially affected by the following vulnerabilities :<br />

\n\n - Adequate bounds checking is not performed on the 'Login' parameter of the login<br />

page, which could lead to a buffer overflow. A remote unauthenticated attacker could<br />

exploit this to execute arbitrary code as SYSTEM. (CVE-2009-2685)\n\n - Adequate<br />

bounds checking is not performed on the 'fileName' or 'LogType' parameter of<br />

'formExportDataLogs', which could lead to a buffer overflow. A remote authenticated<br />

attacker could exploit this to execute arbitrary code as SYSTEM. (CVE-2009-3999)\n\n -<br />

The 'filename' parameter of 'formExportDataLogs' has a directory traversal vulnerability. A<br />

remote authenticated attacker could exploit this to overwrite arbitrary files with almost<br />

arbitrary data. This could result in a denial of service, or arbitrary code execution as<br />

SYSTEM. (CVE-2009-4900)\n\nFor your information, the observed version of HP Power<br />

Manager is: \n %L<br />

Solution: Upgrade to HP Power Manager 4.2.10 or later.<br />

CVE-2009-4000<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Real <strong>Network</strong>s RealPlayer < RealPlayer SP 1.0.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5325 FAMILY: Web Clients RISK: HIGH NESSUS ID:44119<br />

Description: Synopsis :\n\nThe remote host is running an application that is vulnerable to multiple attack<br />

vectors.\n\nThe remote host is running a version of RealPlayer earlier than RealPlayer SP<br />

1.0.5. Such versions are potentially affected by multiple vulnerabilities :\n\n - A RealPlayer<br />

'ASM' Rulebook heap-based buffer overflow. (CVE-2009-4241)\n\n - A RealPlayer 'GIF'<br />

file heap overflow. (CVE-2009-4242)\n\n - A RealPlayer media overflow (http chunck<br />

encoding). (CVE-2009-4243)\n\n - A RealPlayer 'IVR' file processing buffer overflow.<br />

(CVE-2009-0375)\n\n - A RealPlayer 'IVR' file heap overflow. (CVE-2009-0376)\n\n - A<br />

RealPlayer 'SIPR' codec heap overflow. (CVE-2009-4244)\n\n - A RealPlayer compressed<br />

'GIF' heap overflow. (CVE-2009-4245)\n\n - A RealPlayer 'SMIL' parsing heap overflow.<br />

(CVE-2009-4257)\n\n - A RealPlayer skin parsing stack overflow. (CVE-2009-4246)\n\n -<br />

A RealPlayer 'ASM' RuleBook array overflow. (CVE-2009-4247)\n\n - A RealPlayer 'rtsp'<br />

'set_parameter' buffer overflow. (CVE-2009-4248)\n\nNote that different versions are<br />

Family Internet Services 1424


affected by different vulnerabilities.\nIAVA Reference : 2010-A-0022\nSTIG Finding<br />

Severity : Category II<br />

Solution: Upgrade to RealPlayer SP 1.0.5 or later.<br />

CVE-2009-4248<br />

DNS Client Query Detection<br />

<strong>PVS</strong> ID: 5326 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client has issued a name query for the following FQDN<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Apache Tomcat < 5.5.29 / 6.0.24<br />

<strong>PVS</strong> ID: 5327 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:44314<br />

Description: Synopsis : \n\nThe remote web server is vulnerable to multiple attack vectors.\n\nThe<br />

version of Apache Tomcat installed on the remote host is earlier than 5.5.29, or 6.0.24.<br />

Such versions are potentially affected by multiple vulnerabilities : \n\n - When deploying<br />

WAR files, the WAR files are not checked for directory traversal attempts. This allows an<br />

attacker to create arbitrary content outside of the web root by including entries such as<br />

'../../bin/catalina.sh' in the WAR. (CVE-2009-2693)\n\n - By default, Tomcat automatically<br />

deploys any directories placed in a host's appBase. Depending on circumstances, files<br />

normally protected by one or more security constraints may be deployed without those<br />

security constraints, making them accessible without authentication. (CVE-2009-2901)\n\n<br />

- When deploying WAR files, the WAR file names are not checked for directory traversal<br />

attempts, which could lead to the deletion of arbitrary files in the host's work directory.<br />

(CVE-2009-2902)\n\nFor your information, but observed version of Apache Tomcat is : \n<br />

%L<br />

Solution: Upgrade to Apache Tomcat 5.5.29, 6.0.24, or later.<br />

CVE-2009-2902<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Google Chrome < 4.0.249.78 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5328 FAMILY: Web Clients RISK: HIGH NESSUS ID:44317<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nThe version of Google Chrome installed on the remote host is earlier than<br />

4.0.249.78. Such versions are potentially affected by multiple vulnerabilities : \n\n - A<br />

pop-up blocker bypass. (3275)\n\n - Cross-domain theft due to CSS design error.<br />

(9877)\n\n - Browser memory error with stale pop-up block menu. (12523)\n\n - An<br />

Family Internet Services 1425


unspecified error allows XMLHttpRequests to directories. (20450)\n\n - An unspecified<br />

error exists related to escaping characters in shortcuts. (23693)\n\n - Renderer memory<br />

error exist when drawing on canvases. (8864, 24701, 24646)\n\n - An image decoding<br />

memory error. (28566)\n\n - An unspecified error exists, which may result in failure to strip<br />

'Referer'. (29920)\n\n - An unspecified cross-domain access error. (30660)\n\n - An<br />

unspecified bitmap deserialization error. (31307)\n\n - An unspecified browser crash<br />

related to nested URLs. (31517)\n\nFor your information, the observed version of Google<br />

Chrome is: \n %L<br />

Solution: Upgrade to Google Chrome 4.0.249.78 or later.<br />

CVE-2010-0664<br />

SilverStripe < 2.3.5 Cross-site Scripting Vulnerability<br />

<strong>PVS</strong> ID: 5329 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:44332<br />

Description: Synopsis : \n\nThe remote web server is hosting an application that is vulnerable to a<br />

cross-site scripting attack.\n\nThe remote web server is hosting SilverStripe CMS. The<br />

installed version of SilverStripe is earlier than 2.3.5. Such versions are potentially affected<br />

by a persistent cross-site scripting vulnerability becase the application fails to properly<br />

sanitize user-supplied input to the 'CommenterURL' parameter in the comment posting<br />

mechanism. An attacker could exploit this flaw in order to execute arbitrary script code in a<br />

user's browser. For your information, the observed version of SilverStripe is: \n %L<br />

Solution: Upgrade to SilverStripe 2.3.5 or later.<br />

CVE-2010-1593<br />

Symantec Altiris Notification Server 6.0 < SP3 R12 Static Encryption Key<br />

<strong>PVS</strong> ID: 5330 FAMILY: CGI RISK: HIGH NESSUS ID:44339<br />

Description: Synopsis : \n\nThe remote host is vulnerable to an information disclosure<br />

vulnerability.\n\nThe remote host is running Symantec Altiris Notification Server 6.0<br />

earlier than SP3 R12. Such versions are potentially affected by a local information<br />

disclosure vulnerability because the application uses a static encryption key for encrypted<br />

credentials entered by the administrator. An attacker, exploiting this flaw, could view<br />

unauthorized information or possibly execute code. For your information, the observed<br />

version of Symantec Altiris Notification Server is: \n %L<br />

Solution: Upgrade to Altiris Notification Server 6.0 SP3 R12 or later.<br />

CVE-2009-3035<br />

Bugzilla < 3.0.11 / 3.2.6 / 3.4.5 / 3.5.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5331 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:44426<br />

Family Internet Services 1426


Description: Synopsis : \n\nThe remote web server is hosting an application that is vulnerable to<br />

multiple attack vectors.\n\nThe remote web server is hosting a version of Bugzilla that is<br />

earlier than 3.0.11, 3.2.6, 3.4.5, or 3.5.3. Such versions are potentially affected by multiple<br />

vulnerabilities : \n\n - Bugzilla allows web browsers to serve the contents of files in the<br />

'CVS/', 'contrib/', 'docs/en/xml', and 't/' directories as well as the 'old-params.txt' file.\n\n -<br />

When moving a bug from one product to another, an intermediate web page is displayed<br />

letting you select the groups the bug should be restricted to in the new product. Because of<br />

a regression in Bugzilla 3.4.x involving groups, a private bug could temporarily become a<br />

public.\n\nFor your information, the observed version of Bugzilla is: \n %L<br />

Solution: Upgrade to Bugzilla 3.0.11, 3.2.6, 3.4.5, 3.5.3, or later.<br />

CVE-2009-3989<br />

Squid 3.0STABLE23 / 3.1.0.16 Remote DoS<br />

<strong>PVS</strong> ID: 5332 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:44384<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a Denial of Service (Dos)<br />

attack.\n\nAccording to its banner, the version of Squid proxy caching server installed on<br />

the remote host is 2.x or 3.x earlier than 3.0.STABLE23 or 3.1.0.16. Such versions<br />

reportedly use incorrect data validation when processing specially crafted DNS packets. An<br />

attacker, exploiting this flaw, could cause a short term denial of service. For your<br />

information, the observed version of Squid is: \n %L<br />

Solution: Either upgrade to Squid version 3.0.STABLE23 or 3.1.0.16 or later, or apply the patch<br />

referenced in the project's advisory above.<br />

CVE-2010-0308<br />

MySQL 6.0 < 6.0.9 CREATE TABLE <strong>Security</strong> Bypass<br />

<strong>PVS</strong> ID: 5333 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to security bypass attack.\n\nThe version of<br />

MySQL 6.0 installed on the remote host is earlier than 6.0.9, and thus potentially affected<br />

by a security bypass vulnerability. The application allwos an attacker to bypass certain<br />

checks when creating a table with ceratin 'DATA DIRECTORY' and 'INDEX<br />

DIRECTORY' options that are within the MySQL home data directory. For you<br />

information, the observed version of MySQL is: \n %L<br />

Solution: Upgrade to MySQL Community Server version 6.0.9 or later.<br />

CVE-2008-7247<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

OTRS Core System Multiple Unspecified SQL Injection Vulnerabilities<br />

<strong>PVS</strong> ID: 5334 FAMILY: CGI NESSUS ID:Not Available<br />

Family Internet Services 1427


RISK:<br />

MEDIUM<br />

Description: Synopsis : \n\nThe remote web server is hosting a web application that is vulnerable to<br />

multiple sql-injection attacks.\n\nThe remote web server is hosting OTRS, an Open source<br />

Ticket Request System written in Perl. The installed version is earlier than 2.1.9, 2.2.9,<br />

2.3.5, or 2.4.7. Such versions are potentially affected by multiple unspecified sql-injection<br />

vulnerabilities. An attacker, with a valid Agent or Customer-session, could exploit this flaw<br />

to read or modify records in the database. For your information, the observed version of<br />

OTRS is: \n %L<br />

Solution: Upgrade to OTRS 2.1.9, 2.2.9, 2.3.5, 2.4.7, or later.<br />

CVE-2010-0438<br />

cURL < 7.20.0 CURLOPT_ENCODING Option Buffer Overflow<br />

<strong>PVS</strong> ID: 5335 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is running a download client that is vulnerable to a buffer<br />

overflow attack.\n\nThe remote host is running cURL, a download client for various<br />

protocols. The installed version of cURL is earlier than 7.20.0. Such versions are<br />

potentially affected by a buffer overflow vulnerability when downloading compressed files<br />

over HTTP and automatically decompressing the file with the 'CURLOPT_ENCODING'<br />

option. This issue only occurs in versions of cURL that are built with zlib enabled. For your<br />

information, the observed version of cURL is: \n %L<br />

Solution: Upgrade to cURL 7.20.0 or later.<br />

CVE Not available<br />

Google Chrome < 4.0.249.89 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5336 FAMILY: Web Clients RISK: HIGH NESSUS ID:44587<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nThe version of Google Chrome installed on the remote host is earlier than<br />

4.0.249.89. Such versions are potentially affected by multiple vulnerabilities : \n\n - Two<br />

errors when resolving domain names and when interpreting configured proxy lists can be<br />

exploited to disclose sensitive data. (12303, 22914)\n\n - Multiple integer overflows in the<br />

V8 engine. (31009)\n\n - An unspecified error when processing the '' tag.<br />

(31692)\n\n - Chrome leaks redirection targets via the '' href. (32309)\n\n - An<br />

unspecified error when displaying domain names in HTTP authentication dialogs.<br />

(37218)\n\n - An integer overflow when deserializing sandbox messages. (32915)\n\nFor<br />

your information, the observed version of Google Chrome is: \n %L<br />

Solution: Upgrade to Google Chrome 4.0.249.89 or later.<br />

CVE-2010-0649<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1428


Apple iPhone OS < 3.1.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5337 FAMILY: Mobile Devices RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is an iPhone with an OS version earlier than 3.1.3. Such versions are potentially affected by<br />

multiple vulnerabilities : \n\n - A buffer overflow exists in the handling of mp4 audio files.<br />

(CVE-2010-0036)\n\n - A buffer underflow exists in ImageIO's handling of TIFF images.<br />

(CVE-2009-2285)\n\n - A memory corruption issue exists in the handling of a certain USB<br />

control message. (CVE-2010-0038)\n\n - Multiple input validation issues exist in WebKit's<br />

handling of FTP directory listings. (CVE-2009-3384)\n\n - When WebKit encounters an<br />

HTML 5 Media Element pointing to an external resource, it does not issue a resource load<br />

callback to determine if the resource should be loaded. (CVE-2009-2841)\n\nFor your<br />

information, the observed version of iPhone OS is: \n %L<br />

Solution: Upgrade to iPhone OS 3.1.3 or later.<br />

CVE-2010-0038<br />

Flash Player < 10.0.45.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5338 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:44596<br />

Description: Synopsis : \n\nThe remote host contains a browser plug-in that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host conatains a version of Adobe Flash Player that is earlier<br />

than 10.0.45.2. Such versions are potentially affected by multiple vulnerabilities : \n\n - An<br />

issue which could subvert the domain sandbox and make unauthorized cross-domain<br />

requests. (CVE-2010-0186)\n\n - An unspecified denial of service.<br />

(CVE-2010-0187)\n\nFor your information, the observed version of Flash player is: \n %L<br />

Solution: Upgrade to Adobe Flash Player 10.0.45.2 or later.<br />

CVE-2010-0187<br />

OpenOffice < 3.2 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5339 FAMILY: Generic RISK: HIGH NESSUS ID:44597<br />

Description: Synopsis : \n\nThe remote host has a program that is vulnerable to multiple attack<br />

vectors.\n\nThe version of OpenOffice installed on the remote host is earlier than 3.2. Such<br />

versions are potentially affected by several issues : \n\n - <strong>Signatures</strong> may not be handled<br />

properly due to a vulnerability in the libxml2 library. (CVE-2006-4339)\n\n - There is an<br />

HMAC truncation authentication bypass vulnerability in the libxmlsec library.<br />

(CVE-2009-0217)\n\n - The application is bundled with a vulnerable version of the<br />

Microsoft VC++ runtime. (CVE-2009-2493)\n\n - Specially crafted XPM files are not<br />

processed properly, which could lead to arbitrary code execution. (CVE-2009-2949)\n\n -<br />

Specially crafted GIF files are not processed properly, which could lead to arbitrary code<br />

execution. (CVE-2009-2950)\n\n - Specially crafted Microsoft Word documents are not<br />

processed properly, which could lead to arbitrary code execution. (CVE-2009-3301 /<br />

CVE-2009-3302)\n\nFor your information, the observed version of OpenOffice is: \n %L<br />

Family Internet Services 1429


Solution: Upgrade to OpenOffice version 3.2 or later.<br />

CVE-2009-3302<br />

Squid < 3.0STABLE24 HTCP Request Denial of Service<br />

<strong>PVS</strong> ID: 5340 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:45591<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a Denial of Service (DoS)<br />

attack.\n\nAccording to its banner, the version of Squid proxy caching server installed on<br />

the remote host is 2.x or 3.0.x earlier than 3.0.STABLE24. Such versions are potentially<br />

affected by a denial-of-service vulnerability due to incorrect processing of specially crafted<br />

HTCP packets. For your information, the observed version of Squid is: \n %L<br />

Solution: Either upgrade to Squid version 3.0.STABLE24 or later, or apply the patch referenced in<br />

the project's advisory above.<br />

CVE-2010-0639<br />

Novell eDirectory < 8.8 SP5 Patch 3 eMBox SOAP Request DoS<br />

<strong>PVS</strong> ID: 5341 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:44938<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a denial of service attack.\n\nThe remote<br />

host is running eDirectory, a directory service software from Novell. The eMBox service<br />

included with the installed version of eDirectory is affected by a denial of service<br />

vulnerability. By sending a specially crafted HTTP SOAP request, it may be possible for a<br />

remote attacker to crash the remote service. For your information, the observed version of<br />

eDirectory is: \n %L<br />

Solution: Upgrade to eDirectory 8.8 SP5 Patch 3 or later.<br />

CVE-2010-0666<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Firefox < 3.0.18 / 3.5.8 / 3.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5342 FAMILY: Web Clients RISK: HIGH NESSUS ID:44659<br />

Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running a version of Mozilla Firefox earlier than<br />

3.0.18, 3.5.8, 3.6. Such versions are potentially affected by multiple vulnerabilities : \n\n -<br />

Several crashes can result in arbitrary code execution. (MFSA 2010-01)\n\n - The<br />

implementation of 'Web Workers' contains an error in its handling of array data types when<br />

processing posted messages. (MFSA 2010-02)\n\n - The HTML parser incorrectly frees<br />

used memory when insufficient space is available to process remaining input. (MFSA<br />

2010-03)\n\n - A cross-site scripting issue due to 'window.dialogArguments' being readable<br />

cross-domain. (CVE-2010-04)\n\n - A cross-site scripting issue when using SVG<br />

documents and binary Content-Type. (MFSA 2010-05)\n\n - Multiple crashes can result in<br />

Family Internet Services 1430


arbitrary code execution. (MFSA 2010-011)\n\n - A cross-site scripting issue when using<br />

'addEventListener' and 'setTimeout' on a wrapped object. (MFSA 2010-12)\n\n - It is<br />

possible to corrupt a user's XUL cache. (MFSA 2010-14)\n\nFor your information, the<br />

observed version of Firefox is: \n %L<br />

Solution: Upgrade to Mozilla Firefox 3.0.18, 3.5.8, 3.6, or later.<br />

CVE-2010-0171<br />

Mozilla SeaMonkey < 2.0.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5343 FAMILY: Web Clients RISK: HIGH NESSUS ID:44660<br />

Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running a version of Mozilla SeaMonkey earlier than<br />

2.0.3. Such versions are potentially affected by multiple vulnerabilities : \n\n - Several<br />

crashes can result in arbitrary code execution. (MFSA 2010-01)\n\n - The implementation<br />

of 'Web Workers' contains an error in its handling of array data types when processing<br />

posted messages. (MFSA 2010-02)\n\n - The HTML parser incorrectly frees used memory<br />

when insufficient space is available to process remaining input. (MFSA 2010-03)\n\n - A<br />

cross-site scripting issue due to 'window.dialogArguments' being readable cross-domain.<br />

(CVE-2010-04)\n\n - A cross-site scripting issue when using SVG documents and binary<br />

Content-Type. (MFSA 2010-05)\n\n - Multiple crashes can result in arbitrary code<br />

execution. (MFSA 2010-11)\n\n - A cross-site scripting issue when using<br />

'addEventListener' and 'setTimeout' on a wrapped object. (MFSA 2010-12)\n\nFor your<br />

information, the observed version of SeaMonkey is: \n %L<br />

Solution: Upgrade to Mozilla SeaMonkey 2.0.3 or later.<br />

CVE-2010-0171<br />

Sawmill < 7.2.18 Unspecified Cross-Site Scripting Vulnerability<br />

<strong>PVS</strong> ID: 5344 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server is vulnerable to a cross-site scripting attack.\n\nThe<br />

host is running Sawmill, a log analysis and reporting application. The installed version of<br />

Sawmill is earlier than 7.2.18. Such versions are potentially affected by a cross-site<br />

scripting vulnerability. An attacker, exploiting this flaw, could execute arbitrary script code<br />

in a user's browser. For your information, the observed version of Sawmill is: \n %L<br />

Solution: Upgrade to Sawmill 7.2.18 or later.<br />

CVE-2010-1079<br />

SilverStripe < 2.3.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5345 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:44941<br />

Family Internet Services 1431


Description: Synopsis : \n\nThe remote web server is hosting an application that is vulnerable to<br />

multiple attack vectors.\n\nThe remote web server is hosting SilverStripe CMS. The<br />

installed version of SilverStripe is earlier than 2.3.6. Such versions are potentially affected<br />

by multiple vulnerabilities : \n\n - A cross-site scripting vulnerability in the 'DataObjectSet'<br />

pagination.\n\n A cross-site scripting vulnerablity in the 'user' parameter of the<br />

'jsparty/jquery/plugins/validate/demo/form.php' script.\n\n- An information disclosure<br />

vulnerability through 'profile_trace' and 'debug_profile' GET parameters. (98229,<br />

98230)\n\n - The 'sapphire/core/control/Director.php' script displays the output of the<br />

'memory_get_peak_usage()' function in an insecure manner.\n\nFor your information, the<br />

observed version of SilverStripe is: \n %L<br />

Solution: Upgrade to SilverStripe 2.3.6 or later.<br />

CVE-2010-5188<br />

PHP < 5.3.2 / 5.2.13 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5346 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:44921<br />

Description: Synopsis : \n\nThe remote web server uses a version of PHP that is affected by multiple<br />

vulnerabilities.\n\nAccording to its banner, the version of PHP installed on the remote host<br />

is earlier than 5.3.2 / 5.2.13. Such versions are potentially affected by multiple<br />

vulnerabilities : \n\n - A safe_mode validation issue inside 'tempnam()' when the directory<br />

path does not end with a '/'.\n\n - A possible open_basedir/safe_mode bypass in the session<br />

extension.\n\nFor your information, the observed version of PHP is: \n %L<br />

Solution: Upgrade to PHP version 5.3.2 / 5.2.13 or later.<br />

CVE-2010-1129<br />

XMail < 1.27 Insecure Temporary File Creation<br />

<strong>PVS</strong> ID: 5347 FAMILY: SMTP Servers RISK: LOW NESSUS ID:44942<br />

Description: Synopsis : \n\nThe remote SMTP server is vulnerable to a symlink attack.\n\nThe remote<br />

mail server is running a version of XMail earlier than 1.27. Such versions are potentially<br />

affected by a flaw that may allow an attacker with local access to the host to delete or<br />

corrupt arbitrary files, due to the application creating temporary files in an insecure manner.<br />

For your information, the observed version of XMail is: \n %L<br />

Solution: Upgrade to XMail 1.27 or later.<br />

CVE Not available<br />

Website Baker < 2.8.1 <strong>Security</strong> Bypass Vulnerability<br />

<strong>PVS</strong> ID: 5348 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 1432


Description: Synopsis : \n\nThe remote web server is hosting a web application that is affected by<br />

security bypass vulnerability.\n\nThe remote web server is hosting Website Baker. The<br />

installed version of Website Baker is potentially affected by a security bypass vulnerability<br />

in the 'print_error()' function of the 'framework/class.wb.php' script. An attacker, exploiting<br />

this flaw, can impersonate registered users. For your information, the observed version of<br />

Website Baker is: \n %L<br />

Solution: Upgrade to Website Baker 2.8.0<br />

CVE Not available<br />

Opera < 10.50 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5349 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:44960<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

Opera installed on the remote host is earlier than 10.50. Such versions are potentially<br />

affected by multiple vulnerabilities : \n\n - An error in the TLS protocol when handling<br />

session re-negotiations. (944)\n\n - An unspecified vulnerability.\n\nFor your information,<br />

the observed version of Opera is: \n %L \nIAVA Reference : 2011-A-0107\nIAVB<br />

Reference : 2012-B-0038\nSTIG Finding Severity : Category I<br />

Solution: Upgrade to Opera 10.50 or later.<br />

CVE-2009-3555<br />

Symantec IM Manager Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5350 FAMILY: CGI RISK: LOW NESSUS ID:45018<br />

Description: Synopsis : \n\nThe remote host contains a web application that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running a version of the Symantec IM Manager<br />

earlier than build 8.4.13. Such versions are potentially affected by multiple vulnerabilities :<br />

\n\n - An unspecified cross-site scripting vulnerability. (CVE-2009-3036)\n\n - A buffer<br />

overflow vulnerability in the Autonomy KeyView module. (CVE-2009-3032)\n\nFor your<br />

information, the observed version of Symantec IM Manager is: \n %L<br />

Solution: Upgrade to Symantec IM Manager build 8.4.13 or later.<br />

CVE-2009-3036<br />

Client PDF Download Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5351 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client was just observed download the following pdf file: \n %L<br />

Solution: Ensure that this document is in alignment with existing policies and guidelines<br />

Family Internet Services 1433


CVE Not available<br />

Client ZIP Download Detection<br />

<strong>PVS</strong> ID: 5352 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client was just observed download the following zip file: \n %L<br />

Solution: Ensure that this compressed file is in alignment with existing policies and guidelines<br />

CVE Not available<br />

Mozilla Thunderbird < 2.0.0.23 Certificate Authority (CA) Common Null Byte Handling SSL MiTM<br />

Weakness<br />

<strong>PVS</strong> ID: 5353 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:40664<br />

Description: Synopsis : \n\nThe remote host contains a mail client that is affected by a security bypass<br />

vulnerability.\n\nThe installed version of Mozilla Thunderbird is earlier than 2.0.0.23. Such<br />

versions are potentially affected by the following security issue : \n\n - The client can be<br />

fooled into trusting a malicious SSL server certificate with a null character in the host<br />

name. (MFSA 2009-42)\n\nFor your information, the observed version of Thunderbird is:<br />

\n %L<br />

Solution: Upgrade to Thunderbird 2.0.0.23 or later.<br />

CVE-2009-2408<br />

Mozilla Thunderbird < 3.0.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5354 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:44111<br />

Description: Synopsis : \n\nThe remote host contains a mail client that is affected by multiple<br />

vulnerabilities.\n\nThe installed version of Mozilla Thunderbird is earlier than 3.0.1. Such<br />

versions are potentially affected by the following security issues : \n\n - Multiple crashes<br />

can result in arbitrary code execution. (MFSA 2009-65)\n\n - Multiple vulnerabilities in<br />

'liboggplay' can lead to arbitrary code execution. (MFSA 2009-66)\n\n - An integer<br />

overflow in the 'Theora' video library can lead to a crash or the execution of arbitrary code.<br />

(MFSA 2009-67)\n\nFor your information, the observed version of Thunderbird is: \n %L<br />

Solution: Upgrade to Mozilla Thunderbird 3.0.1 or later.<br />

CVE-2009-3982<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Thunderbird < 3.0.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5355 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:44961<br />

Family Internet Services 1434


Description: Synopsis : \n\nThe remote host contains a mail client that is affected by multiple<br />

vulnerabilities.\n\nThe installed version of Mozilla Thunderbird is earlier than 3.0.2. Such<br />

versions are potentially affected by the following security issues : \n\n - Multiple crashes<br />

can result in arbitrary code execution. (MFSA 2010-01)\n\n - The HTML parser incorrectly<br />

frees used memory when insufficient space is available to process remaining input. (MFSA<br />

2010-03)\n\n - Multiple crashes can result in arbitrary code execution. (MFSA<br />

2010-11)\n\n - A cross-site scripting issue when using 'addEventListener' and 'setTimeout'<br />

on a wrapped object. (MFSA 2010-12)\n\n - It is possible to corrupt a user's XUL cache.<br />

(MFSA 2010-14)\n\nFor your information, the observed version of Thunderbird is: \n %L<br />

Solution: Upgrade to Mozilla Thunderbird 3.0.2 or later.<br />

CVE-2010-0171<br />

Apache < 2.2.15 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5356 FAMILY: Web Servers RISK: HIGH NESSUS ID:45004<br />

Description: Synopsis : \n\nThe remote web server is vulnerable to multiple attack<br />

vectors.\n\nAccording to its banner, the version of Apache 2.2 installed on the remote host<br />

is older than 2.2.15. Such versions are potentially affected by multiple vulnerabilities : \n\n<br />

- A TLS renegotiation prefix attack is possible. (CVE-2009-3555)\n\n - The<br />

'mod_proxy_ajp' module returns the wrong status code if it encounters an error which<br />

causes the back-end server to be put into an error state. (CVE-2010-0408)\n\n - The<br />

'mod_isapi' module attempts to unload the 'ISAPI.DLL' when it encounters various error<br />

states which could leave call-backs in an undefined state. (CVE-2010-0425)\n\n - A flaw in<br />

the core sub-request process code can lead to sensitive information from a request being<br />

handled by the wrong thread if a multi-threaded environment is used.<br />

(CVE-2010-0434)\n\nFor your information, the observed version of Apache is: \n %L<br />

\nIAVA Reference : 2011-A-0107\nIAVB Reference : 2012-B-0038\nSTIG Finding<br />

Severity : Category I<br />

Solution: Either ensure the affected module is not in use or upgrade to Apache version 2.2.15 or later.<br />

CVE-2010-0434<br />

Trojan/Backdoor - Arugizer Detection<br />

<strong>PVS</strong> ID: 5357 FAMILY: Backdoors RISK: HIGH NESSUS ID:45006<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'Backdoor'<br />

program\n\nArugizer backdoor activity has been detected. This indicates that a successful<br />

reply to a YES command sent to the Arugizer backdoor has been seen, which is a clear sign<br />

that the backdoor is installed and responding to commands.<br />

Solution: Update your Antivirus and perform a full scan of the remote operating system.<br />

CVE-2010-0103<br />

OpenSSL < 0.9.8m Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1435


<strong>PVS</strong> ID: 5358 FAMILY: Web Servers RISK: HIGH NESSUS ID:45039<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nAccording to its<br />

banner, the remote host is running a version of OpenSSL older than 0.9.8m. Such versions<br />

potentially have the following vulnerabilities : \n\n - Session renegotiations are not handled<br />

properly, which could be exploited to insert arbitrary plaintext by a man-in-the-middle.<br />

(CVE-2009-3555)\n\n - The library does not check for a NULL return value from calls to<br />

the bn_wexpand() function, which has unspecified impact. (CVE-2009-3245)\n\nFor your<br />

information, the observed version of OpenSSL is: \n %L \nIAVA Reference :<br />

2011-A-0107\nIAVB Reference : 2012-B-0038\nSTIG Finding Severity : Category I<br />

Solution: Upgrade to OpenSSL 0.9.8m or later.<br />

CVE-2009-3555<br />

Mozilla Firefox cpe Version Detection<br />

<strong>PVS</strong> ID: 5359 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Firefox version: %L<br />

Solution: N/A<br />

CVE Not available<br />

Samba 3.3.11 / 3.4.6 / 3.5.0 <strong>Security</strong> Bypass Vulnerability<br />

<strong>PVS</strong> ID: 5360 FAMILY: Samba<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:45047<br />

Description: Synopsis : \n\nThe remote Samba server is vulnerable to a security bypass<br />

attack.\n\nAccording to its banner, the version of Samba Server on the remote host is<br />

potentially affected by a security bypass vulnerability. A flaw exists that causes all smbd<br />

processes to inherit CAP_DAC_OVERRIDE capabilities, allowing all file system access to<br />

be allowed even when permissions should have denied access. For your information, the<br />

observed version of Samba is: \n %L<br />

Solution: Upgrade to Samba 3.3.12, 3.4.7, 3.5.1<br />

CVE-2010-0728<br />

Safari < 4.0.5 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5361 FAMILY: Web Clients RISK: HIGH NESSUS ID:45045<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nThe version of Safari installed on the remote host is earlier than 4.0.5. Such<br />

versions are potentially affected by several issues : \n\n A buffer underflow in ImageIO's<br />

handling of TIFF images could lead to a crash or arbitrary code execution.<br />

(CVE-2009-2285)\n\n - An integer overflow in the handling of images with an embedded<br />

color profile could lead to a crash or arbitrary code execution. (CVE-2010-0040)\n\n - An<br />

Family Internet Services 1436


uninitialized memory access issue in ImageIO's handling of BMP images could result in<br />

sending of data from Safari's memory to a website. (CVE-2010-0041)\n\n - An uninitialized<br />

memory access issue in ImageIO's handling of TIFF images could result in sending of data<br />

from Safari's memory to a website. (CVE-2010-0042)\n\n - A memory corruption issue in<br />

the handling of TIFF images could lead to a crash or arbitrary code execution.<br />

(CVE-2010-0043)\n\n - An implementation issue in the handling of cookies set by RSS and<br />

Atom feeds could result in a cookie being set when visiting or updating a feed even if<br />

Safari is configured to block cookies via the 'Accept Cookies' preference.<br />

(CVE-2010-0044)\n\n - An issue in Safari's handling of external URL schemes could cause<br />

a local file to be opened in response to a URL encountered on a web page, which could<br />

allow a malicious web server to execute arbitrary code. (CVE-2010-0045)\n\n - A memory<br />

corruption issue in WebKit's handling of CSS format() arguments could lead to a crash or<br />

arbitrary code execution. (CVE-2010-0046)\n\n - A use-after-free issue in the handling of<br />

HTML object element fallback content could lead to a crash or arbitrary code execution.<br />

(CVE-2010-0047)\n\n - A use-after-free issue in WebKit's parsing of XML documents<br />

could lead to a crash or arbitrary code execution. (CVE-2010-0048)\n\n - A use-after-free<br />

issue in the handling of HTML elements containing right-to-left displayed text could lead<br />

to a crash or arbitrary code execution. (CVE-2010-0049)\n\n - A use-after-free issue in<br />

WebKit's handling of incorrectly nested HTML tags could lead to a crash or arbitrary code<br />

execution. (CVE-2010-0050)\n\n - An implementation issue in WebKit''s handling of<br />

cross-origin stylesheet requests when visiting a malicious website could result in disclosure<br />

of the content of protected resources on another website. (CVE-2010-0051)\n\n - A<br />

use-after-free issue in WebKit's handling of callbacks for HTML elements could lead to a<br />

crash or arbitrary code execution. (CVE-2010-0052)\n\n - A use-after-free issue in the<br />

rendering of content with a CSS display property set to 'run-in' could lead to a crash or<br />

arbitrary code execution. (CVE-2010-0053)\n\n - A use-after-free issue in WebKit's<br />

handling of HTML image elements could lead to a crash or arbitrary code execution.<br />

(CVE-2010-0054)\n\nFor your information, the observed version of is: \n %L<br />

Solution: Upgrade to Safari 4.0.5 or later.<br />

CVE-2010-0054<br />

Skype < 4.2.0.155 URI Handler <strong>Security</strong> Vulnerability<br />

<strong>PVS</strong> ID: 5362 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:45061<br />

Description: Synopsis : \n\nThe remote host is running an instant messaging application that is<br />

vulnerable to a security bypass attack.\n\nThe version of Skype installed on the remote host<br />

is earlier than 4.2.0.155. Such versions are potentially affected by a flaw in the handling of<br />

specially crafted 'skype: ' URIs. An attacker, exploiting this flaw, could control certain<br />

Skype settings and possibly gain access to sensitive information. For your information, the<br />

observed version of Skype is: \n %L<br />

Solution: Upgrade to Skype 4.2.0.155 or later.<br />

CVE Not available<br />

eScan Anti-Virus Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1437


<strong>PVS</strong> ID: 5363 FAMILY: CGI RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running eScan Anti-Virus, a virus scanning application for Linux. Check<br />

that the latest virus definitions are installed.<br />

Solution: N/A<br />

CVE Not available<br />

Google Chrome < 4.1.249.1036 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5364 FAMILY: Web Clients RISK: HIGH NESSUS ID:45086<br />

Description: Synopsis : \n\nThe remote host is using a web client that is vulnerable to multiple attack<br />

vectors.\n\nThe version of Google Chrome installed on the remote host is earlier than<br />

4.1.249.1036. Such versions are potentially affected by multiple vulnerabilities : \n\n -<br />

Multiple race conditions and pointer errors in the sandbox infrastructure. (28804,<br />

31880)\n\n - An error relating to persisted metadata such as web Databases and STS.<br />

(20801, 33445)\n\n - HTTP headers are processed before the SafeBrowsing check.<br />

(33572)\n\n - A memory error with malformed SVG. (34978)\n\n - Multiple integer<br />

overflows in WebKit JavaScript objects. (35724)\n\n - The HTTP basic auth dialog<br />

truncates URLs. (36772)\n\n - It is possible to bypass the download warning dialog.<br />

(37007)\n\n - An unspecified cross-origin bypass vulnerability. (37383)\n\n - A memory<br />

error relating to empty SVG elements. Note that this only affects Chrome Beta version.<br />

(37061)\n\nFor your information, the observed version of Google Chrome is: \n %L<br />

Solution: Upgrade to Google Chrome 4.1.249.1036<br />

CVE Not available<br />

eGroupWare < 1.6.003 Mutiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5365 FAMILY: CGI RISK: HIGH NESSUS ID:45023<br />

Description: Synopsis : \n\nThe remote web server is hosting an application that is vulnerable to<br />

multiple attack vectors.\n\nThe remote web server is hosting eGroupWare, a web based<br />

groupware application written in PHP. The installed version is earlier than 1.6.003. Such<br />

versions are potentially affected by multiple vulnerabilities : \n\n - A remote command<br />

execution vulnerability in the 'spellchecker_lang' and 'aspell_path' parameters of the<br />

'spellchecker.php' script.\n\n - A cross-site scripting vulnerability in the 'lang' parameter of<br />

the 'login.php' script.\n\nFor your information, the observed version of eGroupWare is: \n<br />

%L<br />

Solution: Upgrade to eGroupWare 1.6.003 or later.<br />

DB2 Trace Enabled<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5366 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1438


Description: The remote DB2 client was just observed running a trace command. The observed<br />

command was: \n %L<br />

Solution: N/A<br />

DB2 Trace Disabled<br />

CVE Not available<br />

<strong>PVS</strong> ID: 5367 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote DB2 client was just observed disabling the trace command. The observed<br />

command was: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

DB2 Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5368 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote DB2 client was just observed issuing a "grant all" command. The entire<br />

observed command was: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

DB2 Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5369 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote DB2 client was just observed issuing a "grant dbadm" command. The entire<br />

observed command was: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

DB2 Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5370 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote DB2 client was just observed issuing a "grant option" command. The entire<br />

observed command was: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1439


DB2 Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5371 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote DB2 client was just observed issuing a server configuration change. The entire<br />

observed command was: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

DB2 Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5372 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote DB2 client was just observed making a system table change. The entire<br />

observed command was: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

DB2 Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5373 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote DB2 client was just observed dropping a database. The entire observed<br />

command was: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

DB2 Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5374 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote DB2 client was just observed creating or altering a database. The entire<br />

observed command was: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

DB2 Suspicious Command Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5375 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote DB2 client was just observed dropping a database table. The entire observed<br />

command was: \n %L<br />

Family Internet Services 1440


Solution: N/A<br />

CVE Not available<br />

DB2 Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5376 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote DB2 client was just observed altering a database table. The entire observed<br />

command was: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

DB2 Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5377 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote DB2 client was just observed adding a database user. The entire observed<br />

command was: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

DB2 Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5378 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote DB2 client was just observed dropping a database user. The entire observed<br />

command was: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

DB2 Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5379 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote DB2 client was just observed altering a database users privileges. The entire<br />

observed command was: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

DB2 Suspicious Command Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5380 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1441


Description: The remote DB2 client was just observed changing the database schema privileges. The<br />

entire observed command was: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

DB2 Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5381 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote DB2 client was just observed creating a database procedure. The entire<br />

observed command was: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

DB2 Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5382 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote DB2 client was just observed modifying a database schema. The entire<br />

observed command was: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Microsoft SQL Server Native Auditing Accessed<br />

<strong>PVS</strong> ID: 5383 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Microsoft SQL client was just observed running the following native auditing<br />

function: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Microsoft SQL Server Native Auditing Enabled<br />

<strong>PVS</strong> ID: 5384 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Microsoft SQL client was just observed running the following 'native auditing'<br />

command\n%L<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1442


Microsoft SQL Server Extended Procedure Detection<br />

<strong>PVS</strong> ID: 5385 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Microsoft SQL client was just observed running the following extended<br />

procedure: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Microsoft SQL Server Native Auditing Accessed<br />

<strong>PVS</strong> ID: 5386 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Microsoft SQL client was just observed running the following native auditing<br />

function: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Microsoft SQL Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5387 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Microsoft SQL client was just observed running the following suspicious<br />

command: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Microsoft SQL Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5388 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Microsoft SQL client was just observed running the following suspicious<br />

command: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Microsoft SQL Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5389 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Microsoft SQL client was just observed running the following suspicious<br />

command: \n %L<br />

Family Internet Services 1443


Solution: N/A<br />

CVE Not available<br />

Microsoft SQL Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5390 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Microsoft SQL client was just observed running the following suspicious<br />

command: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Microsoft SQL Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5391 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Microsoft SQL client was just observed running a command which<br />

would modify the server configuration: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Microsoft SQL Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5392 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Microsoft SQL client was just observed running a command which<br />

would modify the server configuration: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Microsoft SQL Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5393 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Microsoft SQL client was just observed running a command which<br />

would modify the server configuration: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Microsoft SQL Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5394 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1444


Description: The remote Microsoft SQL client was just observed running a command which<br />

would modify the server configuration: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Microsoft SQL Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5395 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Microsoft SQL client was just observed running a command which would drop<br />

a database: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Microsoft SQL Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5396 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Microsoft SQL client was just observed running a command which would<br />

create a new database: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Microsoft SQL Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5397 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Microsoft SQL client was just observed running a command which would alter<br />

the database: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Microsoft SQL Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5398 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Microsoft SQL client was just observed running a command which would<br />

modify the server configuration by adding a login: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1445


Microsoft SQL Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5399 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Microsoft SQL client was just observed running a command which would<br />

modify the server configuration by dropping a login: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Microsoft SQL Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5400 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Microsoft SQL client was just observed running a command which would<br />

modify the server configuration by adding a user: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Microsoft SQL Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5401 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Microsoft SQL client was just observed running a command which would<br />

modify the server configuration by dropping a user account: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Microsoft SQL Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5402 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Microsoft SQL client was just observed running a command which<br />

would modify the server configuration: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Microsoft SQL Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5403 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Microsoft SQL client was just observed running a command which<br />

would modify the server configuration: \n %L<br />

Family Internet Services 1446


Solution: N/A<br />

CVE Not available<br />

MySQL Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5404 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote MySQL client was just observed running the following suspicious command:<br />

\n %L<br />

Solution: N/A<br />

CVE Not available<br />

MySQL Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5405 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote MySQL client was just observed running the following suspicious command:<br />

\n %L<br />

Solution: N/A<br />

CVE Not available<br />

MySQL Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5406 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote MySQL client was just observed running a command which would alter the<br />

system table: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

MySQL Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5407 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote MySQL client was just observed running the following suspicious command:<br />

\n %L<br />

Solution: N/A<br />

CVE Not available<br />

MySQL Server Suspicious Command Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5408 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1447


Description: The remote MySQL client was just observed running the following suspicious command:<br />

\n %L<br />

Solution: N/A<br />

CVE Not available<br />

MySQL Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5409 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote MySQL client was just observed running the following suspicious command:<br />

\n %L<br />

Solution: N/A<br />

CVE Not available<br />

MySQL Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5410 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote MySQL client was just observed running the following suspicious command:<br />

\n %L<br />

Solution: N/A<br />

CVE Not available<br />

MySQL Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5411 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote MySQL client was just observed running the following suspicious command:<br />

\n %L<br />

Solution: N/A<br />

CVE Not available<br />

MySQL Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5412 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote MySQL client was just observed running the following suspicious command:<br />

\n %L<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1448


MySQL Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5413 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote MySQL client was just observed running the following suspicious command:<br />

\n %L<br />

Solution: N/A<br />

CVE Not available<br />

MySQL Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5414 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote MySQL client was just observed running the following command. Such a<br />

command would grant a user escalated privileges: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

MySQL Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5415 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote MySQL client was just observed running the following suspicious command:<br />

\n %L<br />

Solution: N/A<br />

CVE Not available<br />

MySQL Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5416 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote MySQL client was just observed running the following suspicious command:<br />

\n %L<br />

Solution: N/A<br />

CVE Not available<br />

MySQL Server Suspicious Command Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5417 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote MySQL client was just observed running the following suspicious command:<br />

\n %L<br />

Family Internet Services 1449


Solution: N/A<br />

CVE Not available<br />

MySQL Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5418 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote MySQL client was just observed running the following suspicious command:<br />

\n %L<br />

Solution: N/A<br />

CVE Not available<br />

MySQL Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5419 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote MySQL client was just observed running the following suspicious command:<br />

\n %L<br />

Solution: N/A<br />

CVE Not available<br />

Oracle Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5420 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Oracle client was just observed running the following audit procedure: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Oracle Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5421 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Oracle client was just observed running the following audit procedure: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Oracle Server Suspicious Command Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5422 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1450


Description: The remote Oracle client was just observed disabling the native auditing: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Oracle Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5423 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Oracle client was just observed running the following suspicious command: \n<br />

%L<br />

Solution: N/A<br />

CVE Not available<br />

Oracle Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5424 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Oracle client was just observed running the following suspicious command: \n<br />

%L<br />

Solution: N/A<br />

CVE Not available<br />

Oracle Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5425 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Oracle client was just observed running the following system table<br />

change: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Oracle Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5426 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Oracle client was just observed running the following audit procedure: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Oracle Server Suspicious Command Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1451


<strong>PVS</strong> ID: 5427 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Oracle client was just observed running the following audit procedure: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Oracle Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5428 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Oracle client was just observed running the following policy change: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Oracle Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5429 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Oracle client was just observed running the following suspicious command: \n<br />

%L<br />

Solution: N/A<br />

CVE Not available<br />

Oracle Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5430 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Oracle client was just observed running the following suspicious command: \n<br />

%L<br />

Solution: N/A<br />

CVE Not available<br />

Oracle Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5431 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Oracle client was just observed running the following suspicious command: \n<br />

%L<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1452


Oracle Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5432 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Oracle client was just observed running the following suspicious command: \n<br />

%L<br />

Solution: N/A<br />

CVE Not available<br />

Oracle Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5433 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Oracle client was just observed running the following suspicious command: \n<br />

%L<br />

Solution: N/A<br />

CVE Not available<br />

Oracle Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5434 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Oracle client was just observed making the following configuration change: \n<br />

%L<br />

Solution: N/A<br />

CVE Not available<br />

Oracle Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5435 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Oracle client was just observed making the following configuration change: \n<br />

%L<br />

Solution: N/A<br />

CVE Not available<br />

Oracle Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5436 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Oracle client was just observed running the following system command: \n %L<br />

Solution: N/A<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1453


CVE Not available<br />

Oracle Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5437 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Oracle client was just observed running the following database configuration<br />

command: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Oracle Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5438 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Oracle client was just observed running the following system configuration<br />

change: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Oracle Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5439 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Oracle client was just observed running the following command to add a user:<br />

\n %L<br />

Solution: N/A<br />

CVE Not available<br />

Oracle Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5440 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Oracle client was just observed running the following command to delete a user<br />

account: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Oracle Server Suspicious Command Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5441 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1454


Description: The remote Oracle client was just observed running the following command to alter a users<br />

privileges: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Oracle Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5442 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Oracle client was just observed running the following configuration change: \n<br />

%L<br />

Solution: N/A<br />

CVE Not available<br />

Oracle Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5443 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Oracle client was just observed making the following configuration change: \n<br />

%L<br />

Solution: N/A<br />

CVE Not available<br />

Oracle Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5444 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Oracle client was just observed making the following changes to a procedure:<br />

\n %L<br />

Solution: N/A<br />

CVE Not available<br />

Sybase ASE Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5445 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Sybase ASE client was just observed running the following suspicious<br />

command: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1455


Sybase ASE Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5446 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Sybase ASE client was just observed running the following suspicious<br />

command: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Sybase ASE Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5447 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Sybase ASE client was just observed running the following suspicious<br />

command: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Sybase ASE Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5448 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Sybase ASE client was just observed running the following suspicious<br />

command: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Sybase ASE Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5449 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Sybase ASE client was just observed running the following suspicious<br />

command: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Sybase ASE Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5450 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Sybase ASE client was just observed running the following suspicious<br />

command: \n %L<br />

Family Internet Services 1456


Solution: N/A<br />

CVE Not available<br />

Sybase ASE Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5451 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Sybase ASE client was just observed running the following suspicious<br />

command: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Sybase ASE Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5452 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Sybase ASE client was just observed running the following suspicious<br />

command: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Sybase ASE Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5453 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Sybase ASE client was just observed running the following suspicious<br />

command: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Sybase ASE Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5454 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Sybase ASE client was just observed running the following suspicious<br />

command: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Sybase ASE Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5455 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1457


Description: The remote Sybase ASE client was just observed running the following suspicious<br />

command: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Sybase ASE Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5456 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Sybase ASE client was just observed running the following suspicious<br />

command: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Sybase ASE Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5457 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Sybase ASE client was just observed running the following suspicious<br />

command: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Sybase ASE Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5458 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Sybase ASE client was just observed running the following suspicious<br />

command: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Sybase ASE Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5459 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Sybase ASE client was just observed running the following suspicious<br />

command: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1458


Sybase ASE Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5460 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Sybase ASE client was just observed running the following suspicious<br />

command: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Sybase ASE Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5461 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Sybase ASE client was just observed running the following suspicious<br />

command: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Sybase SQL Anywhere Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5462 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Sybase SQL Anywhere client was just observed running the following<br />

suspicious command: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Sybase SQL Anywhere Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5463 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Sybase SQL Anywhere client was just observed running the following<br />

suspicious command: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Sybase SQL Anywhere Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5464 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Sybase SQL Anywhere client was just observed running the following<br />

suspicious command: \n %L<br />

Family Internet Services 1459


Solution: N/A<br />

CVE Not available<br />

Sybase SQL Anywhere Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5465 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Sybase SQL Anywhere client was just observed running the following<br />

suspicious command: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Sybase SQL Anywhere Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5466 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Sybase SQL Anywhere client was just observed running the following<br />

suspicious command: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Sybase SQL Anywhere Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5467 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Sybase SQL Anywhere client was just observed running the following<br />

suspicious command: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Sybase SQL Anywhere Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5468 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Sybase SQL Anywhere client was just observed running the following<br />

suspicious command: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Sybase SQL Anywhere Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5469 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1460


Description: The remote Sybase SQL Anywhere client was just observed running the following<br />

suspicious command: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Sybase SQL Anywhere Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5470 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Sybase SQL Anywhere client was just observed running the following<br />

suspicious command: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Sybase SQL Anywhere Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5471 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Sybase SQL Anywhere client was just observed running the following<br />

suspicious command: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Sybase SQL Anywhere Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5472 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Sybase SQL Anywhere client was just observed running the following<br />

suspicious command: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Sybase SQL Anywhere Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5473 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Sybase SQL Anywhere client was just observed running the following<br />

suspicious command: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1461


Sybase SQL Anywhere Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5474 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Sybase SQL Anywhere client was just observed running the following<br />

suspicious command: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Sybase SQL Anywhere Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5475 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Sybase SQL Anywhere client was just observed running the following<br />

suspicious command: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Sybase SQL Anywhere Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5476 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Sybase SQL Anywhere client was just observed running the following<br />

suspicious command: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Sybase SQL Anywhere Server Suspicious Command Detection<br />

<strong>PVS</strong> ID: 5477 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Sybase SQL Anywhere client was just observed running the following<br />

suspicious command: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

DB2 Audited Procedure Accessed<br />

<strong>PVS</strong> ID: 5478 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote DB2 client was just observed running the following Audited procedure<br />

Solution: N/A<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1462


CVE Not available<br />

Mozilla SeaMonkey < 1.1.19 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5479 FAMILY: Web Clients RISK: HIGH NESSUS ID:45111<br />

Description: Synopsis : \n\nThe remote host is running a web browser that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running a version of Mozilla SeaMonkey earlier than<br />

1.1.19. Such versions are potentially affected by multiple vulnerabilities : \n\n - The<br />

columns of a XUL tree element could be manipulated in a particular way which would<br />

leave a pointer owned by the column pointing to freed memory. (MFSA 2009-49)\n\n - A<br />

heap-based overflow exists in Mozilla's string to floating point number conversion routines.<br />

(MFSA 2009-59)\n\n - It is possible to obfuscate the name of files to be downloaded by<br />

using a right-to-left override character (RTL). (MFSA 2009-62)\n\n - Mozilla's NTLM<br />

implementation is vulnerable to reflection attacks in which NTLM credentials from one<br />

application could be forwarded to another arbitrary application. (MFSA 2009-68)\n\n -<br />

Scriptable plugin content, such as Flash objects, can be loaded and executed by embedding<br />

the content in an iframe inside the message. (MFSA 2010-06)\n\n - Multiple memory<br />

corruption vulnerabilities which could potentially lead to the execution of arbitrary code.<br />

(MFSA 2010-07)\n\nFor your information, the observed version of SeaMonkey is: \n %L<br />

Solution: Upgrade to SeaMonkey 1.1.19 or later.<br />

CVE-2010-0163<br />

Mozilla Thunderbird < 2.0.0.24 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5480 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:45110<br />

Description: Synopsis : \n\nThe remote host contains a mail client that is vulnerable to multiple attack<br />

vectors.\n\nThe isntalled version of Mozilla Thunderbird is earlier than 2.0.0.24. Such<br />

version are potentially affected by multiple vulnerabilities : \n\n - The columns of a XUL<br />

tree element can be manipulated in a particular way which would leave a pointer owned by<br />

the column pointing to freed memory. (MFSA 2009-49)\n\n - A heap-based buffer<br />

overflow exists in Mozilla's string to floating point number conversion routines. (MFSA<br />

2009-59)\n\n - It is possible to obfuscate the name of files to be downloaded by using a<br />

right-to-left override character (RTL). (MFSA 2009-62)\n\nFor your information, the<br />

observed version of Mozilla Thunderbird is: \n %L<br />

Solution: Upgrade to Mozilla Thunderbird 2.0.0.24 or later.<br />

CVE-2010-0163<br />

Mozilla Firefox Unsupported Version Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5481 FAMILY: Web Clients RISK: HIGH NESSUS ID:40362<br />

Description: Synopsis : \n\nThe remote host contains an out of date application.\n\nThe version of<br />

Mozilla Firefox installed on the remote host is no longer supported by the Mozilla<br />

Foundation. The following versions of Firefox are no longer supported : \n\n - 3.0.x\n\n -<br />

Family Internet Services 1463


2.0.0.x\n\n - 1.5.0.x\n\n - 1.0.x\n\n - 0.x\n\nThese versions have publicly known security<br />

vulnerabilities, but are no longer maintained by Mozilla. For your information, the<br />

observed version of Firefox is: \n %L<br />

Solution: Upgrade to an actively maintained version.<br />

CVE Not available<br />

Mozilla SeaMonkey Unsupported Version Detection<br />

<strong>PVS</strong> ID: 5482 FAMILY: Web Clients RISK: HIGH NESSUS ID:40362<br />

Description: Synopsis : \n\nThe remote host contains an out of date application.\n\nThe version of<br />

SeaMonkey installed on the remote host is no longer supported by the Mozilla Foundation.<br />

The following versions of SeaMonkey are no longer supported : \n\n - 1.1.x\n\n - 1.0.x\n\n -<br />

0.x\n\nThese versions have publicly known security vulnerabilities, but are no longer<br />

maintained by Mozilla. For your information, the observed version of SeaMonkey is: \n %L<br />

Solution: Upgrade to an actively maintained version.<br />

CVE Not available<br />

Mozilla Thunderbird Unsupported Version Detection<br />

<strong>PVS</strong> ID: 5483 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:40362<br />

Description: Synopsis : \n\nThe remote host contains an out of date application.\n\nThe version of<br />

Mozilla Thunderbird installed on the remote host is no longer supported by the Mozilla<br />

Foundation. The following versions of Thunderbird are no longer supported : \n\n -<br />

3.0.x\n\n - 2.0.x\n\n - 1.5.x\n\n - 1.0.x\n\n - 0.x\n\nThese versions have publicly known<br />

security vulnerabilities, but are no longer maintained by Mozilla. For your information, the<br />

observed version of Thunderbird is: \n %L<br />

Solution: Upgrade to an actively maintained version.<br />

CVE Not available<br />

Opera < 10.51 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5484 FAMILY: Web Clients RISK: HIGH NESSUS ID:45121<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

Opera installed on the remote host is earlier than 10.51. Such versions are potentially<br />

affected by multiple vulnerabilities : \n\n - Large values in the HTTP Content-Length<br />

header can be used to execute arbitrary code. (948)\n\n - XSLT can be used to retrieve<br />

random contents of unrelated documents. (949)\n\nFor your information, the observed<br />

version of Opera is: \n %L<br />

Solution: Upgrade to Opera 10.51 or later.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1464


CVE-2010-1349<br />

Mozilla Firefox < 3.6.2 Multiple Vulnerabilities.<br />

<strong>PVS</strong> ID: 5485 FAMILY: Web Clients RISK: HIGH NESSUS ID:45133<br />

Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running a version of Mozilla Firefox 3.6.x earlier than<br />

3.6.2. Such versions are potentially affected by multiple security issues : \n\n - The WOFF<br />

decoder contains an integer overflow in a font decrompression routine. (MFSA<br />

2010-08)\n\n - Deleted image frames are reused when handling 'multipart/x-mixed-replace'<br />

images. (MFSA 2010-09)\n\n - The 'window.location' object is made a normal overridable<br />

object. (MFSA 2010-10)\n\n - Multiple crashes can result in arbitrary code execution.<br />

(MFSA 2010-11)\n\n - A cross-site scripting issue when using 'addEventListener' and<br />

'setTimeout' on a wrapped object. (MFSA 2010-12)\n\n - Documents fail to call certain<br />

security checks when attempting to preload images. (MFSA 2010-13)\n\n - It is possible to<br />

corrupt a user's XUL cache. (MFSA 2010-14)\n\n - The asynchronous Authorization<br />

Prompt is not always attached to the correct window. (MFSA 2010-15)\n\n - Multiple<br />

crashes cna result in arbitrary code execution. (MFSA 2010-16)\n\n - An error exists in the<br />

way '' elements are inserted into a XUL tree ''. (MFSA 2010-18)\n\n -<br />

An error exists in the implementation of the 'windows.navigator.plugins' object. (MFSA<br />

2010-19)\n\n - A browser applet can be used to turn a simple mouse click into a<br />

drag-and-drop action, potentially resulting in the unintended loading of resources in a user's<br />

browser. (MFSA 2010-20)\n\n - Session renegotiations are not handled properly, which can<br />

be exploited to insert arbitrary plaintext by a man-in-the-middle. (MFSA 2010-22)\n\n -<br />

When an image points to a resource that redirects to a 'mailto: ' URL, the external mail<br />

handler application is launched. (MFSA 2010-23)\n\n - XML documents fail to call certain<br />

security checks when loading new content. (MFSA 2010-24)\n\nFor your information, the<br />

observed version of Firefox is: \n %L<br />

Solution: Upgrade to Mozilla Firefox 3.6.2 or later.<br />

CVE-2010-1028<br />

Serv-U < 9.4.0.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5486 FAMILY: FTP Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:45140<br />

Description: Synopsis : \n\nThe remote FTP server is vulnerable to multiple attack vectors.\n\nThe<br />

remote host is running Serv-U File Server, an FTP server for Windows. According to its<br />

banner, the installed version of Serv-U is earlier than 9.4.0.0, and is therefore potentially<br />

affected by the following issues : \n\n - When importing users, restricted administrators<br />

could create user accounts outside their home directory.\n\n - When exporting users,<br />

restricted administrators could see a user's full path for home directory, virtual paths, and<br />

directory access rules.\n\n - A restricted domain administrator could create a user or group<br />

that was not locked in the user's home directory.\n\n - A denial of service issue when<br />

handling a large number of concurrent HTTP requests.\n\nFor your information, the<br />

observed version of Serv-U is: \n %L<br />

Solution: Upgrade to Serv-U version 9.4.0.0 or later.<br />

Family Internet Services 1465


CVE Not available<br />

OpenSSL < 0.9.8n Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5487 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:45359<br />

Description: Synopsis : \n\nThe remote web server is vulnerable to multiple attack<br />

vectors.\n\nAccording to its banner, the remote web server is running a version of<br />

OpenSSL older than 0.9.8n. Such versions have the following vulnerabilities : \n\n -<br />

Kerberos-enabled versions of OpenSSL do not check the return value when Kerberos<br />

configuration files cannot be opened, leading to a crash. (CVE-2010-0433)\n\n - Rejecting<br />

a SSL/TLS record with and incorrect version number can lead to a crash. This only affects<br />

version 0.9.8m if a 'short' is 1 bits. Otherwise it affects all versions back to and including<br />

0.9.8f. (CVE-2010-0740)\n\nFor your information, the observed version of OpenSSL is: \n<br />

%L<br />

Solution: Upgrade to OpenSSL 0.9.8n or later.<br />

CVE-2010-0740<br />

Interchange HTTP Response Splitting Vulnerability<br />

<strong>PVS</strong> ID: 5488 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server is affected by a HTTP response splitting<br />

vulnerability.\n\nThe remote web server is running Interchange, a web-based application<br />

server. The installed version is potentially affected by an HTTP response splitting<br />

vulnerability when the 'BounceReferrals' or 'BounceRobotSessionURL' directives are<br />

enabled.\nFor your information, the observed version of Interchange is: \n %L<br />

Solution: Upgrade to Interchange 5.4.5, 5.6.3, 5.7.6, or later.<br />

CVE Not available<br />

Mac OS X < 10.6.3 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5489 FAMILY: Generic RISK: HIGH NESSUS ID:45440<br />

Description: Synopsis :\n\nThe remote host is missing a Mac OS X update that fixes various security<br />

issues.\n\nThe remote host is running a version of Mac OS X 10.6 that is older than version<br />

10.6.3. Mac OS X 10.6.3 contains security fixes for the following products :\n\n - AFP<br />

Server\n\n - Apache\n\n - CoreAudio\n\n - CoreMedia\n\n - CoreTypes\n\n - CUPS\n\n -<br />

DesktopServices\n\n - Disk Images\n\n - Directory Services\n\n - Dovecot\n\n - Event<br />

Monitor\n\n - FreeRADIUS\n\n - FTP Server\n\n - iChat Server\n\n - ImageIO\n\n - Image<br />

RAW\n\n - Libsystem\n\n - Mail\n\n - MySQL\n\n - OS Services\n\n - Password Server\n\n<br />

- PHP\n\n - Podcast Producer\n\n - Preferences\n\n - PS Normalizer\n\n - QuickTime\n\n -<br />

Ruby\n\n - Server Admin\n\n - SMB\n\n - Tomcat\n\n - Wiki Server\n\n - X11\n\nFor your<br />

information, the observed version of Mac OS X is\n%L\nIAVA Reference :<br />

Family Internet Services 1466


2010-A-0066\nIAVB Reference : 2009-B-0050\nSTIG Finding Severity : Category I<br />

Solution: Upgrade to Mac OS X 10.6.3 or later.<br />

CVE-2010-0537<br />

Trac < 0.11.7 <strong>Security</strong> Bypass Vulnerability<br />

<strong>PVS</strong> ID: 5490 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server is hosting an application that is vulnerable to a<br />

security bypass attack.\n\nThe remote web server is hosting Trac, a web-based software<br />

management application. The installed version of Trac is earlier than 0.11.7. Such versions<br />

are potentially affected by a security bypass flaw which allows unauthorized users to<br />

modify the status and resolution of a ticket.\nFor your information, the observed version of<br />

Trac is: \n %L<br />

Solution: Upgrade to Trac 0.11.7 or later.<br />

CVE Not available<br />

iTunes < 9.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5491 FAMILY: Web Clients RISK: HIGH NESSUS ID:45391<br />

Description: Synopsis : \n\nThe remote host contains an application that is vulnerable to multiple attack<br />

vectors.\n\nThe remote version of iTunes is older than 9.1. Such versions may be affected<br />

by multiple vulnerabilities : \n\n - A buffer underflow in ImageIO's handling of TIFF<br />

images may lead to an application crash or arbitrary code execution. (CVE-2009-2285)\n\n<br />

- An integer overflow in the application's handling of images with an embedded color<br />

profile may lead to an application crash or arbitrary code execution. (CVE-2010-0040)\n\n<br />

- An uninitialized memory access issue in ImageIO's handling of BMP images may result<br />

in sending data from Safari's memory to a website under an attacker's control.<br />

(CVE-2010-0041)\n\n - An uninitialized memory access issue in ImageIO's handling of<br />

TIFF images may result in sending data from Safari's memory to a website under an<br />

attacker's control. (CVE-2010-0042)\n\n - A memory corruption issue in the application's<br />

handling of TIFF images may lead to an application crash or arbitrary code execution.<br />

(CVE-2010-0043)\n\n - An infinite loop in the application's handling of imported MP4<br />

podcast files may lead to an application crash and prevent subsequent operation.<br />

(CVE-2010-0531)\n\n - A race condition during the installation process may allow a local<br />

user modify a file that is then executed with SYSTEM privileges. (CVE-2010-0532)\n\n -<br />

A path searching issue may allow code execution if an attacker can place a specially crafted<br />

DLL in a directory and have a user open anothe file using iTunes in that directory.<br />

(CVE-2010-1795)\n\n - Syncing a mobile device may allow a local user to gain the<br />

priviliges of the console user due to an insecure file operation in the handling of log files.<br />

(CVE-2010-1768)\n\nFor your information, the observed version of iTunes is: \n %L<br />

Solution: Upgrade to iTunes 9.1 or later.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1467


CVE-2010-1795<br />

QuickTime < 7.6.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5492 FAMILY: Web Clients RISK: HIGH NESSUS ID:45388<br />

Description: Synopsis : \n\nThe remote host contains an application that is vulnerable to multiple attack<br />

vectors.\n\nThe version of QuickTime installed on the remote host is older than 7.6.6. Such<br />

versions contain several vulnerabilities : \n\n - A heap buffer overflow in QuickTime's<br />

handling of PICT images may lead to an application crash or arbitrary code execution.<br />

(CVE-2009-2837)\n\n - A memory corruption issue in QuickTime's handling of QDM2<br />

encoded audio content may lead to an application crash or arbitrary code execution.<br />

(CVE-2010-0059)\n\n - A memory corruption issue in QuickTime's handling of QDMC<br />

encoded audio content may lead to an application crash or arbitrary code execution.<br />

(CVE-2010-060)\n\n - A heap buffer overflow in QuickTime's handling of H.263 encoded<br />

movie file may lead to an application crash or arbitrary code execution.<br />

(CVE-2010-0062)\n\n - A heap buffer overflow in QuickTime's handling of H.261 encoded<br />

movie files may lead to an application crash or arbitrary code execution.<br />

(CVE-2010-0514)\n\n - A memory corruption issue in QuickTime's handling of H.264<br />

encoded movie files may lead to an application crash or arbitrary code execution.<br />

(CVE-2010-0515)\n\n - A heap buffer overflow in QuickTime's handling of RLE encoded<br />

movie files may lead to an application crash or arbitrary code execution.<br />

(CVE-2010-0516)\n\n - A heap buffer overflow in QuickTime's handling of M-JPEG<br />

encoded movie files may lead to an application crash or arbitrary code execution.<br />

(CVE-2010-0517)\n\n - A memory corruption issue in QuickTime's handling of Sorensen<br />

encoded movie files may lead to an application crash or arbitrary code execution.<br />

(CVE-2010-0518)\n\n - An integer overflow in QuickTime's handling of FlashPix encoded<br />

movie files may lead to an application crash or arbitrary code execution.<br />

(CVE-2010-0519)\n\n - A heap buffer overflow in QuickTime's handling of FLC encoded<br />

movie files may lead to an application crash or arbitrary code execution.<br />

(CVE-2010-0520)\n\n - A heap buffer overflow in QuickTime's handling of MPEG<br />

encoded movie files may lead to an application crash or arbitrary code execution.<br />

(CVE-2010-0526)\n\n - An integer overflow in QuickTime's handling of PICT images may<br />

lead to an application crash or arbitrary code execution. (CVE-2010-0527)\n\n - A memory<br />

corruption issue in QuickTime's handling of color tables in movie files may lead to an<br />

application crash or arbitrary code execution. (CVE-2010-0528)\n\n - A heap buffer<br />

overflow in QuickTime's handling of PICT images may lead to an application crash or<br />

arbitrary code execution. (CVE-2010-0529)\n\n - A memory corruption issue in<br />

QuickTime's handling of BMP images may lead to an application crash or arbitrary code<br />

execution. (CVE-2010-0536)\n\nFor your information, the observed version of QuickTime<br />

is: \n %L<br />

Solution: Upgrade to QuickTime 7.6.6 or later.<br />

CVE-2010-0536<br />

Mozilla Firefox < 3.0.19 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5493 FAMILY: Web Clients RISK: HIGH NESSUS ID:45392<br />

Family Internet Services 1468


Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running a version of Mozilla Firefox earlier than<br />

3.0.19. Such versions are potentially affected by multiple security issues : \n\n - Multiple<br />

crashes can result in arbitrary code execution. (MFSA 2010-16)\n\n - A select event<br />

handler for XUL tree items can be called after the item is deleted. (MFSA 2010-17)\n\n -<br />

An error exists in the way '' elements are inserted into a XUL tree ''.<br />

(MFSA 2010-18)\n\n - An error exists in the implementation of the<br />

'windows.navigator.plugins' object. (MFSA 2010-19)\n\n - A browser applet can be used to<br />

turn a simple mouse click into a drag-and-drop action, potentially resulting in the<br />

unintended loading of resources in a user's browser. (MFSA 2010-20)\n\n - The<br />

XMLHttpRequestSpy module in the Firebug add-on exposes an underlying chrome<br />

privilege escalation vulnerability. (MFSA 2010-21)\n\nFor your information, the observed<br />

version of Firefox is: \n %L<br />

Solution: Upgrade to Mozilla Firefox 3.0.19 or later.<br />

CVE-2010-0179<br />

Mozilla Firefox < 3.5.9 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5494 FAMILY: Web Clients RISK: HIGH NESSUS ID:45393<br />

Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running a version of Mozilla Firefox earlier than<br />

3.5.9. Such versions are potentially affected by multiple security issues : \n\n - Multiple<br />

crashes can result in arbitrary code execution. (MFSA 2010-16)\n\n - A select event<br />

handler for XUL tree items can be called after the item is deleted. (MFSA 2010-17)\n\n -<br />

An error exists in the way '' elements are inserted into a XUL tree ''.<br />

(MFSA 2010-18)\n\n - An error exists in the implementation of the<br />

'windows.navigator.plugins' object. (MFSA 2010-19)\n\n - A browser applet can be used to<br />

turn a simple mouse click into a drag-and-drop action, potentially resulting in the<br />

unintended loading of resources in a user's browser. (MFSA 2010-20)\n\n Session<br />

renegotiations are not handled properly, which can be exploited to insert arbitrary plaintext<br />

by a man-in-the-middle. (MFSA 2010-22)\n\n - When an image points to a resource that<br />

redirects to a 'mailto: ' URL, the external mail handler application is launched. (MFSA<br />

2010-23)\n\n - XML documents fail to call certain security checks when loading new<br />

content. (MFSA 2010-24)\n\nFor your information, the observed version of Firefox is: \n<br />

%L \nIAVA Reference : 2011-A-0107\nIAVB Reference : 2012-B-0038\nSTIG Finding<br />

Severity : Category I<br />

Solution: Upgrade to Mozilla Firefox 3.5.9 or later.<br />

CVE-2010-0182<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla SeaMonkey < 2.0.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5495 FAMILY: Web Clients RISK: HIGH NESSUS ID:45395<br />

Family Internet Services 1469


Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running a version of Mozilla SeaMonkey earlier than<br />

2.0.4. Such versions are potentially affected by multiple security issues : \n\n - Multiple<br />

crashes can result in arbitrary code execution. (MFSA 2010-16)\n\n - A select event<br />

handler for XUL tree items can be called after the item is deleted. (MFSA 2010-17)\n\n -<br />

An error exists in the way '' elements are inserted into a XUL tree ''.<br />

(MFSA 2010-18)\n\n - An error exists in the implementation of the<br />

'windows.navigator.plugins' object. (MFSA 2010-19)\n\n - A browser applet can be used to<br />

turn a simple mouse click into a drag-and-drop action, potentially resulting in the<br />

unintended loading of resources in a user's browser. (MFSA 2010-20)\n\n Session<br />

renegotiations are not handled properly, which can be exploited to insert arbitrary plaintext<br />

by a man-in-the-middle. (MFSA 2010-22)\n\n - When an image points to a resource that<br />

redirects to a 'mailto: ' URL, the external mail handler application is launched. (MFSA<br />

2010-23)\n\n - XML documents fail to call certain security checks when loading new<br />

content. (MFSA 2010-24)\n\nFor your information, the observed version of SeaMonkey is:<br />

\n %L \nIAVA Reference : 2011-A-0107\nIAVB Reference : 2012-B-0038\nSTIG Finding<br />

Severity : Category I<br />

Solution: Upgrade to Mozilla SeaMonkey 2.0.4 or later.<br />

CVE-2010-0182<br />

Mozilla Thunderbird < 3.0.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5496 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:45394<br />

Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running a version of Mozilla Thunderbird earlier than<br />

3.0.4. Such versions are potentially affected by multiple security issues : \n\n - Multiple<br />

crashes can result in arbitrary code execution. (MFSA 2010-16)\n\n - A select event<br />

handler for XUL tree items can be called after the item is deleted. (MFSA 2010-17)\n\n -<br />

An error exists in the way '' elements are inserted into a XUL tree ''.<br />

(MFSA 2010-18)\n\n Session renegotiations are not handled properly, which can be<br />

exploited to insert arbitrary plaintext by a man-in-the-middle. (MFSA 2010-22)\n\n - XML<br />

documents fail to call certain security checks when loading new content. (MFSA<br />

2010-24)\n\nFor your information, the observed version of Thunderbird is: \n %L \nIAVA<br />

Reference : 2011-A-0107\nIAVB Reference : 2012-B-0038\nSTIG Finding Severity :<br />

Category I<br />

Solution: Upgrade to Mozilla Thunderbird 3.0.4 or later.<br />

CVE-2010-0182<br />

DNS Generic Query Detection<br />

<strong>PVS</strong> ID: 5497 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: DNS query for:<br />

realtimeonly<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1470


Solution: N/A<br />

CVE Not available<br />

DNS Generic Query Detection<br />

<strong>PVS</strong> ID: 5498 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: DNS query for:<br />

Solution: N/A<br />

DNS Query Failed<br />

realtimeonly<br />

CVE Not available<br />

<strong>PVS</strong> ID: 5499 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: DNS query failed for:<br />

Solution: N/A<br />

DNS Query Failed<br />

realtimeonly<br />

CVE Not available<br />

<strong>PVS</strong> ID: 5500 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: DNS query failed for:<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

ViewVC < 1.0.11 / 1.1.5 Regex Search Cross-Site Scripting Vulnerability<br />

<strong>PVS</strong> ID: 5501 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:45406<br />

Description: Synopsis : \n\nThe remote web server is vulnerable to multiple attack vectors.\n\nThe<br />

remote web server is running ViewVC, a web-based interface for CVS and Subversion. The<br />

installed version of ViewVC is earlier than 1.0.11 or 1.1.5. Such versions are potentially<br />

affected by a cross-site scripting vulnerability because the application fails to properly<br />

sanitize user supplied data to the regular expression search feature.\nFor your information,<br />

Family Internet Services 1471


the observed version of ViewVC is: \n %L<br />

Solution: Upgrade to ViewVC 1.0.11, 1.1.5, or later.<br />

CVE-2010-0132<br />

Firefox < 3.6.3 Remote Code Execution Vulnerability<br />

<strong>PVS</strong> ID: 5502 FAMILY: Web Clients RISK: HIGH NESSUS ID:45403<br />

Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to a remote<br />

code execution attack.\n\nThe remote host is running a version of Mozilla Firefox 3.6.x<br />

earlier than 3.6.3. Such versions are potentially affected by a memory corruption flaw<br />

caused by the re-use of a freed object when moving DOM nodes between documents. A<br />

remote attacker, exploiting this flaw, could execute arbitrary code on the remote host<br />

subject to the privileges of the user running the affected application.\nFor your information,<br />

the observed version of Firefox is: \n %L<br />

Solution: Upgrade to Firefox 3.6.3 or later.<br />

CVE-2010-1121<br />

CouchDB < 0.11.0 Timing Attack Vulnerability<br />

<strong>PVS</strong> ID: 5503 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:45435<br />

Description: Synopsis : \n\nThe remote host is affected by an information disclosure<br />

vulnerability.\n\nThe remote host is running CouchDB, a document-oriented database. The<br />

installed version of CouchDB is earlier than 0.11.0. Such versions are potentially affected<br />

by an information disclosure vulnerability via a timing attack caused by a break-on-equality<br />

string comparison when verifying hashes or passwords.\nFor your information, the<br />

observed version of CouchDB is: \n %L<br />

Solution: Upgrade to CouchDB 0.11.0 or later.<br />

CVE-2010-0009<br />

Moodle < 1.8.12 / 1.9.8 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5504 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

Moodle installed on the remote host is potentially vulnerable to multiple flaws.\n\n -<br />

Multiple unspecified cross-site scripting vulnerabilities in the KSES text cleaning library.<br />

(MSA-10-0001)\n\n - A cross-site scripting vulnerability exists in the PHP CAS client<br />

library. Note that this only affects Moodle installations that use CAS authentication.<br />

(MSA-10-0002)\n\n - An issue exists in the course profile page which allows ordinary users<br />

to find out the names of other users. (MSA-10-0003)\n\n - The restoring of courses<br />

sometimes results in creation of new roles. (MSA-10-0004)\n\n - A SQL injection<br />

vulnerability exists in several forms. (MSA-10-0005)\n\n - Data passed to the 'add_to_log()'<br />

Family Internet Services 1472


function in the wiki module is not properly sanitized which could allow SQL injection<br />

attacks. (MSA-10-0006)\n\n - A problem exists in the handling of user submitted data in<br />

global search forms. (MSA-10-0007)\n\n - A persistent cross-site scripting issue exists<br />

when an admin uses the Login-as feature. (MSA-10-0008)\n\n - The 'Regenerate session id<br />

during login' setting is not enabled by default. (MSA-10-0009)\n\nFor your information, the<br />

observed version of Moodle is: \n %L<br />

Solution: Upgrade to Moodle version 1.8.12, 1.9.8, or later.<br />

CVE Not available<br />

ClamAV < 0.96 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5505 FAMILY: Web Clients RISK: HIGH NESSUS ID:45437<br />

Description: Synopsis : \n\nThe remote host is running an anti-virus application that is vulnerable to<br />

multiple attack vectors.\n\naccording to its version, the clamd anti-virus daemon on the<br />

remote host is earlier than 0.96. Such versions are reportedly affected by multiple<br />

vulnerabilities : \n\n - An attacker could bypass anti-virus detection by embedding<br />

malicious code in a specially crafted 'CAB' file. (1826)\n\n - An error in the<br />

'qtm_decompress()' function in 'libclamav/mspack.c' could lead to memory corruption<br />

when scanning a specially crafted Quantum-compressed file. (1771)\n\nFor your<br />

information, the observed version of ClamAV is: \n %L<br />

Solution: Upgrade to ClamAV 0.96 or later.<br />

CVE-2010-1311<br />

AjaXplorer < 2.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5506 FAMILY: CGI RISK: HIGH NESSUS ID:45489<br />

Description: Synopsis : \n\nThe remote web server is hosting a web application that is vulnerable to<br />

multiple attack vectors.\n\nThe remote web server is hosting AjaXplorer, a web-based file<br />

management application. The installed version is earlier than 2.6. Such versions are<br />

potentially affected by multiple vulnerabilities : \n\n - A command-injection vulnerability<br />

via the 'destserver' parameter of the 'plugins/access.ssh/checkInstall.php' script.\n\n -<br />

Unspecified input is not properly validated before being used to read files.\n\nFor your<br />

information, the observed version of AjaXplorer is: \n %L<br />

Solution: Upgrade to AjaXplorer 2.6 or later.<br />

CVE Not available<br />

LogMeIn Listening Server Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5507 FAMILY: Policy RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 1473


Description: The remote client is actually a LogMeIn server awaiting remote connection.<br />

LogMeIn is an application which allows users to access their computers (work or<br />

home) from anywhere in the world via a web browser. LogMeIn works by installing<br />

an agent on the computer that is to be access remotely. The application then<br />

establishes a client connection to an Internet server and awaits the user to connect<br />

over the established HTTPS connection. As such, LogMeIn has the ability to bypass<br />

firewalls and proxies.<br />

Solution: Ensure that such usage is in alignment with Corporate policies regarding remote access.<br />

CVE Not available<br />

Possible RBL/CBL Blacklisting Message Detected<br />

<strong>PVS</strong> ID: 5508 FAMILY: SMTP Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is either a client sending email or a server forwarding email. The<br />

monitored host appears to be sending email which is being flagged, remotely, as spam.<br />

Please examine the following error code to ensure that your network is not being<br />

blacklisted. %P<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Possible RBL/CBL Blacklisting Message Detected<br />

<strong>PVS</strong> ID: 5509 FAMILY: SMTP Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is either a client sending email or a server forwarding email. The<br />

monitored host appears to be sending email which is being flagged, remotely, as spam.<br />

Please examine the following error code to ensure that your network is not being<br />

blacklisted. %L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

MS10-024: Vulnerabilities in Microsoft Exchange and Windows SMTP Service Could Allow Denial of<br />

Service (981832)<br />

<strong>PVS</strong> ID: 5510 FAMILY: SMTP Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:45517<br />

Family Internet Services 1474


Description: Synopsis : \n\nThe remote mail server may be affected by multiple vulnerabilities.\n\nThe<br />

installed version of Windows SMTP Service is affected by at least one vulnerability : \n\n -<br />

Incorrect parsing of DNS Mail Exchanger (MX) resource records could cause the Windows<br />

Simple Mail Transfer Protocol (SMTP) component to stop responding until the service is<br />

restarted. (CVE-2010-0024)\n\n - Improper allocation of memory for interpreting SMTP<br />

command responses may allow an attacker to read random e-mail message fragments<br />

stored on the affected server. (CVE-2010-0025)\n\nFor your information, the observed<br />

version of the SMTP service is : \n %L \nIAVB Reference : 2010-B-0029\nSTIG Finding<br />

Severity : Category II<br />

Solution: Microsoft has released a set of patches for Windows 2000, XP, 2003, and 2008.<br />

CVE-2010-0025<br />

Real<strong>Network</strong>s Helix Server 11.x / 12.x / 13.x Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5511 FAMILY: Generic RISK: HIGH NESSUS ID:45543<br />

Description: Synopsis : \n\nThe remote media streaming server is affected by multiple<br />

vulnerabilities.\n\nAccording to its banner, the remote host is running version 11.x, 12.x, or<br />

13.x of Real<strong>Network</strong>s Helix Server / Helix Mobile Server. Such versions are potentially<br />

affected by multiple vulnerabilities.\n\n - A heap overflow exists in the NTLM<br />

authentication code related to invalid Base64 encoding. (CVE-2010-1317)\n\n - A<br />

stack-based buffer overflow within AgentX++ could lead to arbitrary code execution.<br />

(CVE-2010-1318)\n\n - An integer overflow within AgentX++ could lead to arbitrary code<br />

execution. (CVE-2010-1319)\n\nFor your information, the observed version of Helix<br />

Server is: \n %L<br />

Solution: Upgrade to Real<strong>Network</strong>s Helix Server / Helix Mobile Server 14.0.0 or later.<br />

CVE-2010-1319<br />

CUPS < 1.4.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5512 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:45554<br />

Description: Synopsis : \n\nThe remote host is running a web application that is affected by multiple<br />

attack vectors.\n\nAccording to its banner, the version of CUPS installed on the remote host<br />

is earlier than 1.4.3. Such versions are affected by several vulnerabilities : \n\n - A pointer<br />

use-after-free vulnerability exists in the abstract file descriptor handling code in the<br />

'cupsdDoSelect' function in scheduler/select.c. A remote attacker may be able to leverage<br />

this to hang or crash the cupsd daemon by disconnecting while receiving a listing with a<br />

large number of print jobs. (STR #3200)\n\n - The lppasswd utility, when its setuid bit is<br />

enabled, allows a local user to escalate his or her privileges because it uses an environment<br />

variable to override CUPS' default directories and determine the location of a file with<br />

localized message strings. (STR #3482)\n\nFor your information, the observed version of<br />

CUPS is: \n %L<br />

Solution: Upgrade to CUPS version 1.4.3 or later.<br />

Family Internet Services 1475


CVE-2010-0393<br />

MyBB < 1.4.12 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5513 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server is running a PHP application that is vulnerable to<br />

multiple attack vectors.\n\nThe remote web server is running a version of MyBB earlier<br />

than 1.4.12. Such versions are potentially affected by multiple issues : \n\n - There is a<br />

weakness in the mechanism for generating random passwords. (Bug 843)\n\n - It is possible<br />

to inject arbitrary headers into email sent to MyBB users.\n\n - An unspecified XSRF issue<br />

exists in the usercp2.php script. (Bug 852)\n\nFor your information, the observed version of<br />

MyBB is: \n %L<br />

Solution: Upgrade to MyBB 1.4.12 or later.<br />

CVE Not available<br />

Memcached < 1.4.3 No Newline Memory Consumption DoS<br />

<strong>PVS</strong> ID: 5514 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:45579<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a denial of service attack.\n\nThe remote<br />

host is running memcached, a distributed memory object caching system. The installed<br />

version of memcached is earlier than 1.4.3. Such versions are potentially affected by a<br />

denial of service vulnerability because the application continues to read in new data,<br />

reallocating its input buffer until a newline character is received which could lead to<br />

excessive memory consumption. An attacker, exploiting this flaw, could crash the affected<br />

service.\nFor your information, the observed version of memcached is: \n %L<br />

Solution: Upgrade to memcached 1.4.3 or later.<br />

CVE-2010-1152<br />

Altiris Deployment Solution < 6.9 SP4 DBManager DoS (SYM10-007)<br />

<strong>PVS</strong> ID: 5515 FAMILY: Generic<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:45592<br />

Description: Synopsis : \n\nThe remote Windows host has a deployment server that is affected by a<br />

denial of service vulnerability.\n\nThe version of Altiris Deployment Solution installed on<br />

the remote host is earlier than 6.9 SP4. Such versions are reportedly affected by a denial of<br />

service vulnerability. The DBManager component has a user-after-free error when<br />

processing specially crafted 'CreateSession' and 'PXEManagerSignOn' requests. A remote<br />

attacker could exploit this to crash the DBManager service.\nFor your information, the<br />

observed version of Altiris Deployment Solution is: \n %L<br />

Solution: Upgrade to Altiris Deployment Solution Server 6.9 SP4 or later.<br />

Family Internet Services 1476


CVE-2010-0109<br />

Google Chrome < 4.1.249.1059 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5516 FAMILY: Web Clients RISK: HIGH NESSUS ID:45610<br />

Description: Synopsis : \n\nThe remote host is using a web client that is vulnerable to multiple attack<br />

vectors.\n\nThe version of Google Chrome installed on the remote host is earlier than<br />

4.1.249.1059. Such versions are reportedly affected by multiple vulnerabilities : \n\n - An<br />

error related to type confusion with forms. (39443)\n\n - An HTTP request error leading to<br />

a possible cross-site request forgery. (39698)\n\n - A local file reference through developer<br />

tools. (40136)\n\n - A cross-site scripting issue in chrome: //net-internals. (40137)\n\n - A<br />

cross-site scripting issue in chrome: //downloads. (40138)\n\n - Pages might load with the<br />

privileges of the new tab page. (40575)\n\n - A memory corruption vulnerability in the V8<br />

bindings. (40635)\n\nFor your information, the observed version of Google Chrome is: \n<br />

%L<br />

Solution: Upgrade to Google Chrome 4.1.249.1059 or later.<br />

CVE-2010-1767<br />

Alt-N MDaemon < 11.0.1 Multiple Remote DoS Vulnerabilities<br />

<strong>PVS</strong> ID: 5517 FAMILY: POP Server<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:45627<br />

Description: Synopsis : \n\nThe remote Windows host contains a program that is vulnerable to multiple<br />

attack vectors.\n\nThe remote Windows host is running the Alt-N MDaemon mail server.<br />

The installed version of MDaemon is earlier than 11.0.1. Such versions are potentially<br />

affected by multiple unspecified denial of service vulnerabilities.\nFor your information,<br />

the observed version of MDaemon is: \n %L<br />

Solution: Upgrade to MDaemon 11.0.1 or later.<br />

CVE Not available<br />

Joomla! < 1.5.16 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5518 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server has an application installed that is vulnerable to<br />

multiple attack vectors.\n\nThe remote web server is hosting a version of Joomla! earlier<br />

than 1.5.16. Such versions are potentially affected by multiple security issues : \n\n - If a<br />

user enters a URL with a negative query limit or offset, a PHP notice displays revealing<br />

information about the system.\n\n - The migration script in the Joomla! installer does not<br />

check the file type being uploaded.\n\n - A user's session ID doesn't get modified when the<br />

user logs on.\n\n - When a user requests a password reset, the reset token is stored in plain<br />

text in the database.\n\nFor your information, the observed version of Joomla! is: \n %L<br />

Solution: Upgrade to Joomla! 1.5.16 or later.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1477


CVE Not available<br />

Zabbix 1.8.x < 1.8.2 'DBCondition' Parameter SQL Injection<br />

<strong>PVS</strong> ID: 5519 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is running a web application that is vulnerable to a<br />

SQL-injection attack.\n\nThe remote host is running Zabbix, an IT monitoring service. The<br />

installed version of Zabbix is earlier than 1.8.2. Such versions are potentially affected by a<br />

SQL-injection vulnerability in the 'user' parameter of the 'api.jsonrpc.php' script. A remote,<br />

unauthenticated attacker could exploit this flaw to gain control of the affected<br />

application.\nFor your information, the observed version of Zabbix Front-end is: \n %L<br />

Solution: Upgrade to Zabbix 1.8.2 or later.<br />

CVE-2010-1277<br />

Google Chrome < 4.1.249.1064 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5520 FAMILY: Web Clients RISK: HIGH NESSUS ID:46171<br />

Description: Synopsis : \n\nThe remote host is using a web client that is vulnerable to multiple attack<br />

vectors.\n\nThe version of Google Chrome installed on the remote host is earlier than<br />

4.1.249.1064. Such versions are reportedly affected by multiple vulnerabilities : \n\n - A<br />

cross-origin bypass in Google URL. (40445)\n\n - A memory corruption vulnerability in<br />

HTML5 media handling. (40487)\n\n - A memory corruption vulnerability in font handling.<br />

(42294)\n\nFor your information, the observed version of Google Chrome is: \n %L<br />

Solution: Upgrade to Google Chrome 4.1.249.1064 or later.<br />

CVE-2010-1665<br />

JBoss EAP < 4.2.0.CP09 / 4.3.0.CP08 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5521 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:53337<br />

Description: Synopsis : \n\nThe remote web server is vulnerable to multiple attack vectors.\n\nThe<br />

remote host is running JBoss Enterprise Application Platform (JBEAP) < 4.2.0.CP09 /<br />

4.3.0.CP08. Such versions are potentially affected by multiple vulnerabilities.\n\n - The<br />

JMX Console configuration only specified an authentication requirement for requests that<br />

used the GET and POST HTTP 'verbs'. A remote attacker could create an HTTP request<br />

that does not specify GET or POST, causing it to be executed by the default GET handler<br />

without authentication. (CVE-2010-0738)\n\n - It is possible to bypass authentication for<br />

/web-console by specifying a HTTP method other than GET or POST.<br />

(CVE-2010-1428)\n\n - An information disclosure vulnerability that allows attackers to<br />

acquired details about deployed web contexts. (CVE-2010-1429)\n\nFor your information,<br />

the observed version of JBoss Enterprise Application Platform is: \n %L \nIAVB Reference<br />

: 2010-B-0042\nSTIG Finding Severity : Category I<br />

Family Internet Services 1478


Solution: Upgrade to JBoss EAP version 4.2.0.CP09, 4.3.0.CP08, or later.<br />

CVE-2010-1429<br />

MODx < 1.0.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5522 FAMILY: CGI RISK: HIGH NESSUS ID:46183<br />

Description: Synopsis : \n\nThe remote web server is hosting a web application that is vulnerable to<br />

multiple attack vectors.\n\nThe remote web server is hosting MODx, a content management<br />

system written in PHP. The installed version of MODx is earlier than 1.0.3. Such versions<br />

are potentially affected by multiple vulnerabilities : \n\n - A cross-site scripting<br />

vulnerability in the 'SearchHighlight' plugin. (CVE-2010-1427)\n\n - A SQL-injection<br />

vulnerability related to WebLogin. (CVE-2010-1426)\n\nFor your information, the<br />

observed version of MODx is: \n %L<br />

Solution: Upgrade to MODx 1.0.3 or later.<br />

CVE-2010-1427<br />

Wing FTP Server < 3.4.1 Multiple Information Disclosure Vulnerabilities<br />

<strong>PVS</strong> ID: 5523 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Wing FTP server. The installed version of Wing FTP is earlier than 3.4.1. Such<br />

versions are potentially affected by multiple information disclosure vulnerabilities : \n\n -<br />

Input passed to the web client is not properly sanitized before being used.\n\n - An<br />

unspecified error when using the HTTP protocol can be exploited to disclose sensitive<br />

information.\n\nFor your information, the observed version of Wing FTP Server is: \n %L<br />

Solution: Upgrade to Wing FTP Server 3.4.1 or later.<br />

CVE Not available<br />

Wing FTP Server < 3.4.5 HTTP Request Directory Traversal<br />

<strong>PVS</strong> ID: 5524 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a directory traversal attack.\n\nThe remote<br />

host is running Wing FTP server. The installed version of Wing FTP is earlier than 3.4.5.<br />

Such versions are potentially affected by a directory traversal vulnerability over the HTTP<br />

protocol. An attacker, exploiting this flaw, could access arbitrary files on the affected<br />

host..\n\nFor your information, the observed version of Wing FTP Server is: \n %L<br />

Solution: Upgrade to Wing FTP Server 3.4.5 or later.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1479


Microsoft Media Server Version Detection<br />

<strong>PVS</strong> ID: 5525 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Microsoft Media Server.<br />

Solution: N/A<br />

CVE Not available<br />

Trojan/Backdoor - Storm/Pecoan.AG Worm Detection<br />

<strong>PVS</strong> ID: 5526 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'Backdoor'<br />

program\n\nActivity generated by the Storm/Pecoan.AG worm have been detected by <strong>PVS</strong>.<br />

This activity indicates that the host in question is currently communicating with a Storm<br />

Command and Control server, and is likely participating in spamming activities.<br />

realtime<br />

Solution: Update your Antivirus and perform a full scan of the remote operating system.<br />

CVE Not available<br />

Opera < 10.53 Asynchronous Content Modification Uninitialized Memory Access<br />

<strong>PVS</strong> ID: 5527 FAMILY: Web Clients RISK: HIGH NESSUS ID:46204<br />

Description: Synopsis : \n\nThe version of Opera installed on the remote host is earlier than 10.53. Such<br />

versions are potentially affected by the following issue : \n\n - Multiple asynchronous calls<br />

to a script that modifies document content can be abused to reference an uninitialized value,<br />

leading to an application crash or possibly allowing execution of arbitrary code.<br />

(953)\n\nFor your information, the observed version of Opera is: \n %L<br />

Solution: Upgrade to Opera 10.53 or later.<br />

X Server Detection<br />

CVE-2010-1728<br />

<strong>PVS</strong> ID: 5528 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the X Server software.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Beyond Compare < 3.1.11 Zip File Buffer Overflow<br />

Family Internet Services 1480


<strong>PVS</strong> ID: 5529 FAMILY: Web Clients RISK: HIGH NESSUS ID:46242<br />

Description: Synopsis : \n\nThe remote host contains an application that is vulnerable to a buffer<br />

overflow attack.\n\nThe remote host contains Beyond Compare, a file comparison<br />

application. The installed version of Beyond Compare is earlier than 3.1.11. Such version<br />

are potentially affected by a buffer overflow vulnerability when handling zip files with an<br />

overly large filename. An attacker, exploiting this flaw, could potentially execute arbitrary<br />

code on the remote host subject to the privileges of the user running the application.\nFor<br />

your information, the observed version of Beyond Compare is: \n %L<br />

Solution: Upgrade to Beyond Compare 3.1.11 or later.<br />

CVE Not available<br />

CMS Made Simple < 1.7.1 Cross-Site Scripting Vulnerability<br />

<strong>PVS</strong> ID: 5530 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server is running a PHP application that is affected by a<br />

cross-site scripting vulnerability.\n\nThe remote host is running CMS Made Simple, a<br />

web-based content management application written in PHP. The installed version of CMS<br />

Made Simple is earlier than 1.7.1. Such versions are potentially affected by a cross-site<br />

scripting vulnerability because the application fails to properly sanitize user supplied input<br />

to the 'date_format_string' variable of the 'admin/editprefs.php' script. An attacker with<br />

administrator privileges, could exploit this flaw to execute arbitrary script code in a user's<br />

browser.\nFor your information, the observed version of CMS Made Simple is: \n %L<br />

Solution: Upgrade to CMS Made Simple 1.7.1 or later.<br />

CVE-2010-1482<br />

OrangeHRM < 2.5.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5531 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors\n\nThe remote host<br />

is running OrangeHRM, a human resource management system written in PHP. The<br />

reported version of OrangeHRM is: \n %L \n\nThe version of OrangeHRM installed on the<br />

remote host fails to sanitize input to multiple forms which would allow an attacker to insert<br />

HTML, execute cross-site-scripting (XSS) attacks, execute SQL injection attacks, and<br />

execute arbitrary commands. In all instances, code/commands would be executed with the<br />

privileges of the web process.<br />

Solution: Upgrade to version 2.5.5 or higher when available. In the interim, either disable the service<br />

or only allow trusted users access to the application.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Drupal Context module < 6.x-2.0-rc4 HTML Injection<br />

<strong>PVS</strong> ID: 5532 FAMILY: Web Servers NESSUS ID:Not Available<br />

Family Internet Services 1481


RISK:<br />

MEDIUM<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML Injection attack\n\nThe remote<br />

host is running an older version of the Drupal Context module. Context is a module used to<br />

manage contextual conditions for different portions of the Drupal web site. The reported<br />

version ( %L ) is reported vulnerable to an HTML injection flaw wherein a remote attacker,<br />

with certain administrative rights, can insert HTML script code that would be executed<br />

within the browser of clients.<br />

Solution: Upgrade to Context version 6.x-2.0-rc4 or later<br />

CVE-2010-1584<br />

NETBIOS Domain/workgroup Detection<br />

<strong>PVS</strong> ID: 5533 FAMILY: Generic<br />

RISK: Risk<br />

not available<br />

NESSUS ID:Not Available<br />

Description: The remote host is a NETBIOS workstation which is a part of the following Domain or<br />

workgroup<br />

realtime<br />

Solution: N/A<br />

CVE Not available<br />

Samba < 3.5.2/3.4.8 Multiple DoS<br />

<strong>PVS</strong> ID: 5534 FAMILY: Samba RISK: HIGH NESSUS ID:46351<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS)<br />

attack\n\nAccording to its banner, the version of Samba Server on the remote host is<br />

potentially affected by a flaw which would allow a remote attacker to disable the service.<br />

An attacker, exploiting this flaw, would need network access to the SAMBA server.<br />

Solution: upgrade to Samba 3.5.2 or 3.4.8<br />

CVE-2010-1642<br />

Movable Type < 5.02 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5535 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a cross-site scripting (XSS) attack\n\nThe<br />

remote host is running Movable Type, a blogging software for Unix and Windows<br />

platforms. The installed version is earlier than 5.02. Such versions are reportedly affected<br />

by a cross-site scripting flaw. An attacker, exploiting this flaw, would be able to post script<br />

code which would be executed in the browser of the blog readers.<br />

Family Internet Services 1482


Solution: Upgrade to Movable Type 5.02 or later.<br />

CVE Not available<br />

Drupal AutoAssign Role Module < 6.x-1.2 Authentication Bypass<br />

<strong>PVS</strong> ID: 5536 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw which allows for the bypassing of<br />

Authentication\n\nThe remote host is running an older version of the Drupal AutoAssign<br />

Role module. The reported version of AutoAssign Role is %L\n\nThere is a flaw in this<br />

version of AutoAssign which would allow a valid user to access controls and data which<br />

belong to another user.<br />

Solution: Upgrade to Drupal AutoAssign Role 6.x-1.2.<br />

CVE Not available<br />

Drupal Services Module < 6.x-2.1 Authentication Bypass<br />

<strong>PVS</strong> ID: 5537 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw which allows for the bypassing of<br />

Authentication\n\nThe remote host is running an older version of the Drupal Services<br />

module. The reported version of Services is %L\n\nThere is a flaw in this version of<br />

Services which would allow a valid user to access controls and data which belong to<br />

another user.<br />

Solution: Upgrade to Drupal Services 6.x-2.1<br />

CVE Not available<br />

Microsoft Group Policy Client Detection<br />

<strong>PVS</strong> ID: 5538 FAMILY: Samba RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is a Microsoft Group Policy client.<br />

Solution: N/A<br />

CVE Not available<br />

Konqueror < 4.4.3 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5539 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors\n\nThe remote host<br />

is running Konqueror version '%L'\n\nThis version of Konqueror shipped with an<br />

application called 'Kget' which is prone to a security-bypass flaw as well as a<br />

directory-traversal flaw. An attacker would need to be able to entice a user into browsing to<br />

Family Internet Services 1483


a malicious website. Successful exploitation would result in the remote site gaining partial<br />

access to the filesystem on the client machine.<br />

Solution: Upgrade to version 4.4.3 or newer<br />

CVE-2010-1511<br />

Microsoft Group Policy File Download Detection<br />

<strong>PVS</strong> ID: 5540 FAMILY: Samba RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is a Microsoft Group Policy client.<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Microsoft Group Policy File Download Detection<br />

<strong>PVS</strong> ID: 5541 FAMILY: Samba RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is a Microsoft Group Policy client.<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Microsoft Group Policy File Download Detection<br />

<strong>PVS</strong> ID: 5542 FAMILY: Samba RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is a Microsoft Group Policy client.<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Microsoft Group Policy File Download Detection<br />

<strong>PVS</strong> ID: 5543 FAMILY: Samba RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is a Microsoft Group Policy client.<br />

realtimeonly<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1484


Solution: N/A<br />

CVE Not available<br />

Microsoft Group Policy File Download Detection<br />

<strong>PVS</strong> ID: 5544 FAMILY: Samba RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is a Microsoft Group Policy client.<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

PHPGroupWare < 0.9.16.016 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5545 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack\n\nThe remote host<br />

appears to be running PHPGroupWare, a groupware system implemented in PHP. The<br />

reported version is: %L\n\nThis version is reported to be vulnerable to a SQL injection<br />

flaw. An attacker, exploiting this flaw, would be able to execute arbitrary SQL commands<br />

against the database server. In addition, there is a local 'file-include' vulnerability which<br />

would allow a valid user the ability to modify the integrity of files used by the web server.<br />

Solution: Upgrade to PHPGroupWare 0.9.16.016 or higher.<br />

CVE-2010-0404<br />

PostgreSQL < 8.4.4/8.3.11/8.2.17/8.1.21/8.0.25/7.4.29 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5546 FAMILY: Database<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote database server is vulnerable to multiple attack vectors.\n\nThe<br />

remote host is running PostgreSQL earlier than 8.4.4, 8.3.11, 8.2.17, 8.1.21, 8.0.25, or<br />

7.4.29. The reported version of PostgreSQL is %L. Such versions are potentially affected<br />

by multiple vulnerabilities.\n\n - A vulnerability in Safe.pm and PL/Perl can allow an<br />

authenticated user to run arbitrary Perl code on the database server if PL/Perl is installed<br />

and enabled. (CVE-2010-1169)\n\n - Insecure permissions on the pltcl_modules table could<br />

allow an authenticated user to run arbitrary Tcl code on the database server i PL/Tcl is<br />

installed and enabled. (CVE-2010-1170)\n\n - The application does not properly check<br />

privileges during certain RESET ALL operations, which could allow a remote<br />

authenticated ser to remove arbitrary parameter settings via ALTER USER or ALTER<br />

DATABASE statements.<br />

Solution: Upgrade to PostgreSQL 8.4.4, 8.3.11, 8.2.17, 8.1.21, 8.0.25, 7.4.29, or later.<br />

Family Internet Services 1485


CVE-2010-1975<br />

MySQL Community Server 5.1 < 5.1.46 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5547 FAMILY: Database RISK: LOW NESSUS ID:46328<br />

Description: Synopsis :\n\nThe remote database server is vulnerable to multiple attack vectors.\n\nThe<br />

reported version of MySQL Community Sever 5.1 on the remote host is %L.\n\nVersions<br />

of MySQL Community Server 5.1 earlier than 5.1.46 are potentially affected by the<br />

following vulnerabilities :\n\n - A local user may be able to issue a 'DROP TABLE'<br />

command for one MyISAM table and remove the data and index files of a different<br />

MyISAM table. (Bug #40980)\n\n - The application does not correct check privileges in<br />

calls to 'UNINSTALL PLUGIN', which could be abused by an unprivileged user to<br />

uninstall plugins loaded dynamically. (BUG #51770)<br />

Solution: Upgrade to MySQL Community Server 5.1.46 or later.<br />

CVE-2010-1626<br />

ClamAV < 0.96.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5548 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:46706<br />

Description: Synopsis :\n\nThe remote host is running an anti-virus application that is vulnerable to<br />

multiple attack vectors.\n\nThe reported version of ClamAV on the remote host is %L.<br />

Versions of ClamAV earlier than 0.96.1 are potentially affected by multiple vulnerabilities<br />

:\n\n - An error exists within the 'cli_pdf()' function in 'libclamav/pdf.c' when processing<br />

certain PDF files. (2016)\n\n - An error exists within the 'parseicon()' function in<br />

'libclamav/pe_icons.c' when processing PE icons. This can be exploited to trigger an<br />

out-of-bounds access when reading data and potentially cause a crash via a specially crafted<br />

PE file. (2031)<br />

Solution: Upgrade to ClamAV 0.96.1 or later.<br />

CVE-2010-1640<br />

Trojan/Backdoor - Warbot Detection<br />

<strong>PVS</strong> ID: 5549 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'Backdoor'<br />

program\n\nA host is making HTTP requests that are formatted as a Warbot command<br />

would be. This is indicitive of an infection by the Warbot trojan. The Warbot trojan allows<br />

for arbitrary code to be executed on the system, as well as enables it to be used in various<br />

DDoS attacks.<br />

realtime<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Solution: Update your Antivirus and perform a full scan of the remote operating system.<br />

Family Internet Services 1486


CVE Not available<br />

Microsoft SQL client Detection (TDS)<br />

<strong>PVS</strong> ID: 5550 FAMILY: Database<br />

Description: Detects Microsoft SQL clients<br />

Solution: N/A<br />

CVE Not available<br />

Microsoft SQL Server Detection (TDS)<br />

<strong>PVS</strong> ID: 5551 FAMILY: Database<br />

Description: Detects Microsoft SQL servers<br />

Solution: N/A<br />

CVE Not available<br />

Database Client Detection<br />

RISK: Risk<br />

not available<br />

RISK: Risk<br />

not available<br />

NESSUS ID:Not Available<br />

NESSUS ID:Not Available<br />

<strong>PVS</strong> ID: 5552 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote SQL command issued the following command: %L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Google Chrome < 5.0.375.55 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5553 FAMILY: Web Clients RISK: HIGH NESSUS ID:46732<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the reported version of Google Chrome installed on the<br />

remote host is : %L\n\nVersions of Google Chrome earlier than 5.0.357.55 are potentially<br />

affected by multiple vulnerabilities :\n\n - URLs do not closely enough match the Safe<br />

Browsing specification. (Bug 7713)\n\n - It is possible to spoof URLs with unload event<br />

handlers. (Bug 16535)\n\n - A memory error exists in the Safe Browsing interaction. (Bug<br />

30079)\n\n - It is possible to bypass the whitelist-mode plugin blocker. (Bug 39740)\n\n - A<br />

memory error exists with drag and drop. (Bug 41469)\n\n - Javascript is incorrectly<br />

executed in the extension context. (Bug 42228)<br />

Solution: Upgrade to Google Chrome 5.0.375.55 or later.<br />

Family Internet Services 1487


CVE Not available<br />

Apache Axis2 < 1.5 'xsd' Parameter Directory Traversal<br />

<strong>PVS</strong> ID: 5554 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:46741<br />

Description: Synopsis :\n\nThe remote web server hosts a web application that is vulnerable to a<br />

directory traversal attack.\n\nThe remote web server is hosting Axis2, a web services<br />

engine. For your information, the observed version of Axis2 is : %L\n\nVersions of Axis2<br />

earlier than 1.5 are potentially affected by a directory traversal vulnerability in the 'xsd'<br />

parameter in activated services. An attacker, exploiting this flaw, can read arbitrary files on<br />

the affected host.<br />

Solution: Upgrade to Apache Axis2 1.5 or later.<br />

CVE Not available<br />

Acme thttpd Version Detection<br />

<strong>PVS</strong> ID: 5555 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: N/A<br />

Solution: N/A<br />

CVE Not available<br />

DB2 9.7 < Fix Pack 2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5556 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:46766<br />

Description: Synopsis :\n\nThe remote database server is vulnerable to multiple attack vectors.\n\nFor<br />

your information, the observed version of IBM DB2 is %L\n\nVersions of IBM DB2 9.7<br />

earlier than Fix Pack 2 are potentially affected by multiple vulnerabilities :\n\n - If the<br />

database configuration parameter 'AUTO_REVAL' is set to 'IMMEDIATE', system granted<br />

privileges are note regenerated. (IC67008)\n\n - 'Monitor Administrative Views' available<br />

in the SYSIBMADM schema are publicly viewable. (IC67819)\n\n - A weakness in the<br />

SSL v3 / TLS protocol involving session renegotiation may allow an attacker to inject an<br />

arbitrary amount of plaintext into the beginning of the application protocol stream, which<br />

could facilitate man-in-the-middle attacks. (IC68055)\n\n - By sending a specially crafted<br />

packet to Tivoli Monitoring Agent (KUDDB2) listening on TCP port 6014, it may be<br />

possible to trigger a denial of service condition. (IC68762)<br />

Solution: Upgrade to IBM DB2 9.7 Fix Pack 2<br />

CVE-2010-0472<br />

Exim < 4.72 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1488


<strong>PVS</strong> ID: 5557 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:46783<br />

Description: Synopsis :\n\nThe remote mail server is vulnerable to multiple attack vectors.\n\nThe<br />

remote host is running Exim, a message transfer agent. For your information, the observed<br />

version of Exim is %L.\n\nVersions of Exim earlier than 4.72 are potentially affected by<br />

multiple vulnerabilities :\n\n - An error when handling hardlinks within the mail directory<br />

during the email delivery process can be exploited to perform unauthorized actions.<br />

(CVE-2010-2023)\n\n - When MBX locking is enabled, a race condition exists which could<br />

allow an attacker to change permissions of other non-rot users' files, leading to<br />

denial-of-service conditions or potentially privilege escalation. (CVE-2010-2024)<br />

Solution: Upgrade to Exim 4.72 or later when it becomes available.<br />

CVE-2010-2024<br />

Mozilla Thunderbird Version Detection<br />

<strong>PVS</strong> ID: 5558 FAMILY: SMTP Clients RISK: INFO NESSUS ID:Not Available<br />

Description: N/A<br />

Solution: N/A<br />

CVE Not available<br />

OpenSSL < 0.9.8o / 1.0.0a Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5559 FAMILY: Web Servers RISK: HIGH NESSUS ID:46801<br />

Description: Synopsis :\n\nThe remote web server is vulnerable to multiple attack vectors.\n\nFor your<br />

information, the observed version of OpenSSL is %L.\n\nVersions of OpenSSL earlier than<br />

0.9.8o and 1.0.0a are potentially affected by multiple vulnerabilities :\n\n - CMS structures<br />

containing 'OriginatorInfo' are mishandled which can cause the application to write to<br />

invalid memory addresses or free up memory twice. Note that this only affects OpenSSL<br />

with CMS code present. (CVE-2010-0742)\n\n - When verification recovery fails for RSA<br />

keys, an uninitialized buffer with an undefined length is returned instead of an error code.<br />

Note that this only affects OpenSSL 1.0.0. (CVE-2010-1633)<br />

Solution: Upgrade to OpenSSL 0.9.8o, 1.0.0, or later.<br />

CVE-2010-1633<br />

MySQL Version Detection<br />

<strong>PVS</strong> ID: 5560 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: N/A<br />

Solution: N/A<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1489


CVE Not available<br />

Kerio MailServer / Connect < 7.0.1 Administration Console File Disclosure and File Corruption<br />

Vulnerability<br />

<strong>PVS</strong> ID: 5561 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:47140<br />

Description: Synopsis :\n\nThe remote mail server is vulnerable to a file disclosure and corruption<br />

vulnerability.\n\nFor your information, the observed version of Kerio Mail Server /<br />

Connect is %L.\n\nVersions of Kerio Mail Server / Connect earlier than 7.0.1 are<br />

potentially affected by a file disclosure and corruption vulnerability. An attacker, with full<br />

administrative rights, can modify the administrative console to change the product<br />

configuration to read or corrupt arbitrary files on the server.<br />

Solution: Upgrade to Kerio Connect 7.0.1 or later.<br />

CVE Not available<br />

nginx 8.3 Filename Alias Request Access Rules / Authentication Bypass<br />

<strong>PVS</strong> ID: 5562 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw which allows attackers to retrieve<br />

sensitive files or data\n\nFor your information, the observed version of nginx is<br />

%L.\n\nVersions of nginx earlier than 0.7.65 are potentially affected by a security bypass<br />

vulnerability. By appending %20 to a requested file, an attacker can view the source code<br />

of potentially sensitive scripts.<br />

Solution: Upgrade to nginx 0.7.65 or later.<br />

CVE Not available<br />

OpenSSL Version Detection<br />

<strong>PVS</strong> ID: 5563 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: N/A<br />

Solution: N/A<br />

CVE Not available<br />

OpenOffice < 3.2.1 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5564 FAMILY: Generic RISK: HIGH NESSUS ID:46814<br />

Family Internet Services 1490


Description: Synopsis :\n\nThe remote host has a program that is affected by multiple<br />

vulnerabilities.\n\nThe version of OpenOffice installed on the remote host is earlier than<br />

3.2.1. Such version are affected by several issues :\n\n - There is a TLS/SSL renegotiation<br />

vulnerability in the included third-party OpenSSL library. (CVE-2009-3555)\n\n - There is<br />

a python scripting vulnerability which may lead to undesired code execution when using<br />

the OpenOffice scripting IDE. (CVE-2010-0395)\nIAVA Reference : 2011-A-0107\nIAVB<br />

Reference : 2012-B-0038\nSTIG Finding Severity : Category I<br />

Solution: Upgrade to OpenOffice version 3.2.1 or later.<br />

PHP Version Detection<br />

CVE-2010-0395<br />

<strong>PVS</strong> ID: 5565 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: N/A<br />

Solution: N/A<br />

CVE Not available<br />

Safari < 4.1 / 5.0 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5566 FAMILY: Web Clients RISK: HIGH NESSUS ID:46838<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Safari is %L.\n\nVersions of<br />

Safari earlier than 4.1 / 5.0 are potentially affected by multiple vulnerabilities :\n\n - A heap<br />

buffer overflow exists in the handling of images with an embedded ColorSync profile.<br />

(CVE-2009-1726)\n\n - Safari supports the inclusion of user information in URLs, which<br />

allows the URL to specify a username and password to authenticate the user to the named<br />

server. (CVE-2010-1384)\n\n - A use after free issue exists in Safari's management of<br />

windows. (CVE-2010-1750)\n\n - An implementation issue exists in WebKit's handling of<br />

URLs in the clipboard. (CVE-2010-1388)\n\n - Dragging or pasting a selection from one<br />

site to another may allow scripts contained in the selection to be executed in the context of<br />

the new site. (CVE-2010-1389)\n\n - A cononicalization issue exists in WebKit's handling<br />

of UTF-7 encoded text. (CVE-2010-1390)\n\n - A path traversal issue exists in WebKit's<br />

support for Local Storage and Web SQL database. (CVE-2010-1391)\n\n - A use after free<br />

issue exists in WebKit's rendering of HTML buttons. (CVE-2010-1392)\n\n - An<br />

information disclosure issue exists in WebKit's handling of Cascading Stylesheets.<br />

(CVE-2010-1393)\n\n - A use after free issue exists in WebKit's handling of attribute<br />

manipulation. (CVE-2010-1119)\n\n - A design issue exists in WebKit's handling of HTML<br />

document fragments. (CVE-2010-1394)\n\n - An implementation issue exists in WebKit's<br />

handling of keyboard focus. (CVE-2010-1422)\n\n - A scope management issue exists in<br />

WebKit's handling of DOM constructor objects. (CVE-2010-1395)\n\n - A use after free<br />

issue exists in WebKit's handling of the removal of container elements.<br />

(CVE-2010-1396)\n\n - A use after free issue exists in WebKit's rendering of a selection<br />

when the layout changes. (CVE-2010-1397)\n\n - A memory corruption issue exists in<br />

WebKit's handling of ordered list insertions. (CVE-2010-1398)\n\n - An uninitialized<br />

Family Internet Services 1491


memory access issue exists in WebKit's handling of selection changes on form input<br />

elements. (CVE-2010-1399)\n\n - A use after free issue exists in WebKit's handling of<br />

caption elements. (CVE-2010-1400)\n\n - A use after free issue exists in WebKit's handling<br />

of the ':first-letter' pseudo-element in cascading stylesheets. (CVE-2010-1401)\n\n - a<br />

double free issue exists in WebKit's handling of event listeners in SVG documents.<br />

(CVE-2010-1402)\n\n - An uninitialized memory access issue exists in WebKit's handling<br />

of 'use' elements in SVG documents. (CVE-2010-1403)\n\n - A use after free issue exists in<br />

WebKit's handling of SVG documents with multiple 'use' elements. (CVE-2010-1404)\n\n -<br />

A memory corruption issue exists in WebKit's handling of nested 'use' elements in SVG<br />

documents. (CVE-2010-1410)\n\n - A use after free issue exists in WebKit's handling of<br />

CSS run-ins. (CVE-2010-1749)\n\n - A use after free issue exists in WebKit's handling of<br />

HTML elements with custom vertical positioning. (CVE-2010-1405)\n\n - When WebKit is<br />

redirected from an HTTPS site to an HTTP site, the Referer header is passed to the HTTP<br />

site. (CVE-2010-1406)\n\n - An integer truncation issue exists in WebKit's handling of<br />

requests to non-default TCP ports. (CVE-2010-1408)\n\n - Common IRC service ports are<br />

not included in WebKit's port blacklist. (CVE-2010-1409)\n\n - A use after free issue exists<br />

in WebKit's handling of hover events. (CVE-2010-1412)\n\n - In certain circumstances,<br />

WebKit may send NTLM credentials in plain text. (CVE-2010-1413)\n\n - A use after free<br />

issue exists in WebKit's handling of the removeChild DOM method. (CVE-2010-1414)\n\n<br />

- An API abuse issue exists in WebKit's handling of libxml contexts. (CVE-2010-1415)\n\n<br />

- A cross-site image capture issue exists in WebKit. (CVE-2010-1416)\n\n - A memory<br />

corruption issue exists in WebKit's rendering of CSS-styled HTML content with multiple<br />

:after pseudo-selectors. (CVE-2010-1417)\n\n - An input validation issue exists in WebKit's<br />

handling of the src attribute of the frame element (CVE-2010-1418)\n\n - A use after free<br />

issue exists in WebKit's handling of drag and drop when the window acting as a source of a<br />

drag operation is closed before the drag operation is completed. (CVE-2010-1419)\n\n - A<br />

design issue exists in the implementation of the JavaScript function execCommand.<br />

(CVE-2010-1421)\n\n - An issue in WebKit's handling of malformed URLs may result in a<br />

cross-site scripting attack when visiting a maliciously crafted website.<br />

(CVE-2010-0544)\n\n - A use after free issue exists in WebKit's handling of DOM Range<br />

objects. (CVE-2010-1758)\n\n - A use after free issue exists in WebKit's handling of the<br />

Node.normalize method. (CVE-2010-1759)\n\n - A use after free issue exist sin WebKit's<br />

rendering of HTML document subtrees. (CVE-2010-1761)\n\n - A design issue exists in the<br />

handling of HTML contained in textarea elements. (CVE-2010-1762)\n\n - A design issue<br />

exists in WebKit's handling of HTTP redirects. (CVE-2010-1764)\n\n - A type checking<br />

issue exists in WebKit's handling of text nodes. (CVE-2010-1770)\n\n - A use after free<br />

issue exists in WebKit's handling of fonts. (CVE-2010-1771)\n\n - An out of bounds<br />

memory access issue exists in WebKit's handling of HTML tables. (CVE-2010-1774)\n\n -<br />

A design issue exists in WebKit's handling of the CSS :visited pseudo-class.<br />

Solution: Upgrade to Safari 4.1, 5.0, or later.<br />

CVE-2010-2264<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Google Chrome < 5.0.375.70 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5567 FAMILY: Web Clients RISK: HIGH NESSUS ID:46850<br />

Family Internet Services 1492


Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Google Chrome installed on the<br />

remote host is : %L\n\nVersions of Google Chrome earlier than 5.0.375.70 are potentially<br />

affected by multiple vulnerabilities :\n\n - A cross-origin keystroke redirection<br />

vulnerability. (Bug 15766)\n\n - A cross-origin bypass in DOM methods. (Bug 39985)\n\n -<br />

A memory error exists in table layout. (Bug 42723)\n\n - It is possible to escape the<br />

sandbox in Linux. (Bug 43304)\n\n - A stale pointer exists in bitmap. (Bug 43307) - A<br />

memory corruption vulnerability exists in DOM mode normalization. (Bug 43315)\n\n - A<br />

memory corruption vulnerability exists in text transforms. (Bug 43487)\n\n - A cross-site<br />

scripting vulnerability exists in the innerHTML property of textarea. (Bug 43902)\n\n - A<br />

memory corruption vulnerability exists in font handling. (Bug 44740)\n\n - Geolocation<br />

events fire after document deletion. (Bug 44868)\n\n - A memory corruption vulnerability<br />

exists in the rendering of list markers. (44955)<br />

Solution: Upgrade to Google Chrome 5.0.375.70 or later.<br />

CVE-2010-1773<br />

PRTG Traffic Grapher < 6.2.1.963 / 9.2.1.964 Cross-Site Scripting Vulnerability<br />

<strong>PVS</strong> ID: 5568 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:46857<br />

Description: Synopsis :\n\nThe remote host contains a web application that is vulnerable to a cross-site<br />

scripting attack.\n\nThe remote host is running PRTG Traffic Grapher, a web-based<br />

application for monitoring network traffic. For your information, the observed version of<br />

PRTG Traffic Grapher on the remote host is %L.\n\nVersions of PRTG Traffic Graher<br />

earlier than 6.2.1.963 / 9.2.1.964 are potentially affected by a cross-site scripting<br />

vulnerability in the 'url' parameter of the 'login.htm' script. An unauthenticated remote<br />

attacker, exploiting this flaw, could execute arbitrary script code in a user's browser.<br />

Solution: Upgrade to PRTG Traffic Grapher 6.2.1.963, 6.2.1.964, or later.<br />

CVE Not available<br />

Flash Player < 10.1.53.64 / 9.0.277.0 Multiple Vulnerabilities (APSB10-14)<br />

<strong>PVS</strong> ID: 5569 FAMILY: Web Clients RISK: HIGH NESSUS ID:46859<br />

Description: Synopsis :\n\nThe remote host contains a browser plug-in that is vulnerable to multiple<br />

attack vector.\n\nFor your information, the observed version of Flash player is<br />

%L.\n\nVersions of Flash Player earlier than 10.1.53.64 are potentially affected by multiple<br />

vulnerabilities, such as memory corruption, buffer overflows, and memory exhaustion, that<br />

could be exploited to cause an application crash or even allow execution of arbitrary code.<br />

Solution: Upgrade to Flash Player 10.1.53.64 / 9.0.277.0 or later.<br />

CVE-2010-2189<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Novell eDirectory < 8.8 SP5 Patch 4 Multiple Vulnerabilities<br />

Family Internet Services 1493


<strong>PVS</strong> ID: 5570 FAMILY: Generic RISK: HIGH NESSUS ID:47022<br />

Description: Synopsis :\n\nThe remote directory service is vulnerable to multiple attack vectors.\n\nThe<br />

remote host is running eDirectory, a directory service software from Novell. For your<br />

information, the observed version of eDirectory is :%L.\n\nVersions of eDirectory earlier<br />

than 8.8 SP5 Patch 4 are potentially affected by multiple vulnerabilities :\n\n - A<br />

denial-of-service vulnerability in NDSD when handling a malformed verb. (Bug<br />

571244)\n\n - A stack-based buffer overflow in the dhost module for Windows. (Bug<br />

588883)\n\n - A predictable session cookie in DHOST. (Bug 586854)<br />

Solution: Upgrade to eDirectory 8.8 SP5 Patch 4 or later.<br />

CVE-2009-4653<br />

Mac OS X 10.6 < 10.6.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5571 FAMILY: Generic RISK: HIGH NESSUS ID:47024<br />

Description: Synopsis :\n\nThe remote host is missing a Mac OS X update that fixes various security<br />

issues.\n\nFor your information, the observed version of Mac OS X is %L.\n\nVersions of<br />

Mac OS X 10.6 earlier than 10.6.4 are potentially affected by multiple vulnerabilities. Mac<br />

OS X 10.6.4 contains security fixes for the following products :\n\n - CUPS\n\n -<br />

DesktopServices\n\n - Flash Player plug-in\n\n - Folder Manager\n\n - Help Viewer\n\n -<br />

iChat\n\n - ImageIO\n\nKerberos\n\n - libcurl\n\n - <strong>Network</strong> Authorization\n\n - Open<br />

Directory\n\n - Printer Setup\n\n - Printing\n\n - Ruby\n\n - SMB File Server\n\n -<br />

SquirrelMail\n\n - Wiki Server\nIAVB Reference : 2010-B-0035\nSTIG Finding Severity :<br />

Category I<br />

Solution: Upgrade to Mac OS X 10.6.4 or later.<br />

CVE-2010-1748<br />

Samba 3.x < 3.3.13 SMB1 Packet Chaining Memory Corruption<br />

<strong>PVS</strong> ID: 5572 FAMILY: Samba RISK: HIGH NESSUS ID:47036<br />

Description: Synopsis :\n\nThe remote service is affected by a memory corruption vulnerability.\n\nFor<br />

your information, the observed version of Samba is :%L\n\nVersions of Samba 3.x earlier<br />

than 3.3.13 are potentially affected by a memory corruption vulnerability when handling<br />

specially crafted SMB1 packets. A remote unauthenticated attacker, exploiting this flaw,<br />

could crash the affected service or potentially execute arbitrary code subject to the<br />

privileges of the user running the affected application.<br />

Solution: Upgrade to Samba 3.3.13 or later.<br />

CVE-2010-2063<br />

iTunes < 9.2 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5573 FAMILY: Web Clients RISK: HIGH NESSUS ID:47038<br />

Family Internet Services 1494


Description: Synopsis :\n\nThe remote host contains an application that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of iTunes is %L.\n\nVersions of<br />

iTunes older than 9.2 are potentially affected by multiple vulnerabilities :\n\n - A heap<br />

buffer overflow in the handling of images with an embedded ColorSync profile may lead to<br />

an application crash or arbitrary code execution. (CVE-2009-1726)\n\n - Multiple integer<br />

overflows in ImageIO's handling of TIFF files may lead to an application crash or arbitrary<br />

code execution. (CVE-2010-1411)\n\n - Multiple vulnerabilities in WebKit may have a<br />

variety of effects, including arbitrary code execution. (CVE-2010-0544, CVE-2010-1119,<br />

CVE-2010-1387, CVE-2010-1390, CVE-2010-1392, CVE-2010-1393, CVE-2010-1395,<br />

CVE-2010-1396, CVE-2010-1397, CVE-2010-1398, CVE-2010-1399, CVE-2010-1400,<br />

CVE-2010-1401, CVE-2010-1402, CVE-2010-1403, CVE-2010-1404, CVE-2010-1405,<br />

CVE-2010-1408, CVE-2010-1409, CVE-2010-1410, CVE-2010-1412, CVE-2010-1414,<br />

CVE-2010-1415, CVE-2010-1416, CVE-2010-1417, CVE-2010-1418, CVE-2010-1419,<br />

CVE-2010-1421, CVE-2010-1422, CVE-2010-1749, CVE-2010-1758, CVE-2010-1759,<br />

CVE-2010-1761, CVE-2010-1763, CVE-2010-1769, CVE-2010-1770, CVE-2010-1771,<br />

CVE-2010-1774)<br />

Solution: Upgrade to iTune 9.2 or later.<br />

CVE-2010-1774<br />

CUPS < 1.4.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5574 FAMILY: Web Servers RISK: HIGH NESSUS ID:47683<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running CUPS, an open source print server. For your information, the observed version<br />

of CUPS is %L.\n\nVersions of CUPS earlier than 1.4.4 are potentially affected by multiple<br />

vulnerabilities.\n\n - The texttops filter does not check the results of memory allocations.<br />

(STR #3715)\n\n - A use-after-free vulnerability in the abstract file-descriptor handling<br />

interface. Note that this is related to an incomplete patch for CVE-2009-3553. (STR<br />

#3490)\n\n - In certain instances, the web interface can disclose the contents of memory.<br />

(STR #3577)\n\n - CUPS can overwrite files as root in directories not owned or writeable<br />

by non-root users. (STR #3510)\n\n - An infinite loop can occur when CUPS is not<br />

compiled with HAVE_GSSAPI. (STR #3518)<br />

Solution: Upgrade to CUPS 1.4.4 or later.<br />

CVE-2010-2432<br />

Moodle < 1.8.13 / 1.9.9 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5575 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote web<br />

server hosts Moodle, an open-source course management system. For your information, the<br />

observed version of Moodle is %L.\n\nVersions of Moodle prior to 1.8.13 or 1.9.9 are<br />

potentially affected by multiple vulnerabilities :\n\n - A persistent cross-site scripting<br />

vulnerability in the MNET access control interface. (MSA-10-0010)\n\n - A cross-site<br />

scripting vulnerability in blog/index.php. (MSA-10-0011)\n\n - The KSES text cleaning<br />

Family Internet Services 1495


filter may allow registered users to launch persistent cross-site scripting attacks.<br />

(MSA-10-012)\n\n - A potential cross-site request forgery vulnerability exists in Quiz<br />

reports.\n\n (MSA-10-013)<br />

Solution: Upgrade to Moodle version 1.8.13, 1.9.9, or later.<br />

CVE Not available<br />

Opera < 10.54 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5576 FAMILY: Web Clients RISK: HIGH NESSUS ID:47113<br />

Description: Synopsis :\n\nThe remote host has a web browser that is vulnerable to multiple attack<br />

vectors.\n\nThe remote host is running the Opera web browser. For your information, the<br />

observed version of Opera is %L.\n\nVersions of Opera earlier than 10.54 are potentially<br />

affected by multiple vulnerabilities :\n\n - Opera may be used as a vector for a font issue in<br />

the underlying operating system. (KB 954)\n\n - An extremely severe issue due to an<br />

undisclosed error.\n\n - A highly severe issue due to an undisclosed error.\n\n - A<br />

moderately severe issue due to an undisclosed issue.\n\n - A less severe issue due to an<br />

undisclosed error.<br />

Solution: Upgrade to Opera 10.54 or later.<br />

CVE-2010-2666<br />

Atlassian JIRA < 4.1.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5577 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:47114<br />

Description: Synopsis :\n\nThe remote web server hosts an application that is vulnerable to multiple<br />

attack vectors.\n\nAtlassian JIRA, a web-based application for bug tracking, issue tracking,<br />

and project management is installed on the remote web server. For your information, the<br />

observed version of Atlassian JIRA is %L.\n\nVersions of JIRA earlier than 4.1.2 are<br />

potentially affected by multiple vulnerabilities :\n\n - Multiple cross-site scripting<br />

vulnerabilities in URL query strings.\n\n - JIRA standalone fails to properly protect<br />

sensitive cookie data with the 'HTTPOnly' protection mechanism.\n\n - Users without the<br />

'JIRA Users' permission can login via crowd single-sign-on.\n\nA cross-site request forgery<br />

in the 'logout' action.\n\n - Multiple vulnerabilities in the FishEye plugin.\n\n - A security<br />

vulnerability in the Bamboo plugin.<br />

Solution: Upgrade to Atlassian JIRA 4.1.2.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Apple iPhone/iPad OS < 4.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5578 FAMILY: Mobile Devices RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1496


Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe<br />

remote host is an iPhone, iPod Touch, or iPad running iOS. For your information,<br />

the observed version of iOS is %L.\n\nVersions of iOS earlier than 4.0 are<br />

potentially affected by multiple vulnerabilities. iOS 4.0 contains security fixes for<br />

the following products :\n\n - Application Sandbox\n\n - CF<strong>Network</strong>\n\n -<br />

ImageIO\n\n - LibSystem\n\n - libxml\n\n - Passcode Lock\n\n - Safari\n\n -<br />

Settings\n\n - WebKit<br />

Solution: Upgrade to iOS 4.0 or later.<br />

CVE-2010-2660<br />

Firefox < 3.5.10 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5579 FAMILY: Web Clients RISK: HIGH NESSUS ID:47123<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Firefox is %L.\n\nVersions<br />

of Firefox earlier than 3.5.10 are potentially affected by multiple vulnerabilities :\n\n - A<br />

re-use of a freed object due to scope confusion. (MFSA 2010-25)\n\n - Multiple crashes can<br />

result in code execution. (MFSA 2010-26)\n\n - A use-after-free error in<br />

nsCycleCollector::MarkRoots(). (MFSA 2010-27)\n\n - Freed object reuse across plugin<br />

instances. (MFSA 2010-28)\n\n - A heap buffer overflow in<br />

nsGenericDOMDataNode::SetTextInternal. (MFSA 2010-29)\n\n - An integer overflow in<br />

XSLT node sorting. (MFSA 2010-30)\n\n The focus() behavior can be used to inject or<br />

steal keystrokes. (MFSA 2010-31)\n\n- The 'Content-Disposition: attachment' HTTP<br />

header is ignored when 'Content-Type: multipart' is also present. (MFSA 2010-32)\n\nIt is<br />

possible to reverse engineer the value used to seed Math.random(). (MFSA 2008-33)<br />

Solution: Upgrade to Mozilla Firefox 3.5.10 or later.<br />

CVE-2010-1203<br />

Firefox 3.6.x < 3.6.4 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5580 FAMILY: Web Clients RISK: HIGH NESSUS ID:47124<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Firefox is %L.\n\nVersions<br />

of Firefox 3.6.x earlier than 3.6.4 are potentially affected by multiple vulnerabilities :\n\n -<br />

Multiple crashes can result in code execution. (MFSA 2010-26)\n\n - Freed object reuse<br />

across plugin instances. (MFSA 2010-28)\n\n - A heap buffer overflow in<br />

nsGenericDOMDataNode::SetTextInternal. (MFSA 2010-29)\n\n - An integer overflow in<br />

XSLT node sorting. (MFSA 2010-30)\n\n The focus() behavior can be used to inject or<br />

steal keystrokes. (MFSA 2010-31)\n\n- The 'Content-Disposition: attachment' HTTP<br />

header is ignored when 'Content-Type: multipart' is also present. (MFSA 2010-32)\n\nIt is<br />

possible to reverse engineer the value used to seed Math.random(). (MFSA 2008-33)<br />

Solution: Upgrade to Mozilla Firefox 3.6.4 or later.<br />

Family Internet Services 1497


CVE-2010-1203<br />

SeaMonkey < 2.0.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5581 FAMILY: Web Clients RISK: HIGH NESSUS ID:47126<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of SeaMonkey is<br />

%L.\n\nVersions of SeaMonkey earlier than 2.0.5 are potentially affected by multiple<br />

vulnerabilities :\n\n A re-use of a freed object due to scope confusion. (MFSA 2010-25)\n\n<br />

- Multiple crashes can result in code execution. (MFSA 2010-26)\n\n - A use-after-free<br />

error in nsCycleCollector::MarkRoots(). (MFSA 2010-27)\n\n - Freed object reuse across<br />

plugin instances. (MFSA 2010-28)\n\n - A heap buffer overflow in<br />

nsGenericDOMDataNode::SetTextInternal. (MFSA 2010-29)\n\n - An integer overflow in<br />

XSLT node sorting. (MFSA 2010-30)\n\n The focus() behavior can be used to inject or<br />

steal keystrokes. (MFSA 2010-31)\n\n- The 'Content-Disposition: attachment' HTTP<br />

header is ignored when 'Content-Type: multipart' is also present. (MFSA 2010-32)\n\nIt is<br />

possible to reverse engineer the value used to seed Math.random(). (MFSA 2008-33)<br />

Solution: Upgrade to Mozilla SeaMonkey 2.0.5 or later.<br />

CVE-2010-1203<br />

Mozilla Thunderbird < 3.0.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5582 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:47125<br />

Description: Synopsis :\n\nThe remote host has an email client that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Thunderbird is %L.\n\nVersions<br />

of Thunderbird earlier than 3.0.5 are potentially affected by multiple vulnerabilities :\n\n -<br />

A re-use of a freed object due to scope confusion. (MFSA 2010-25)\n\n - Multiple crashes<br />

can result in arbitrary code execution. (MFSA 2010-26)\n\n - A heap buffer overflow in<br />

nsGenericDOMDataNode::SetTextInternal. (MFSA 2010-29)\n\nAn integer overflow in<br />

XSLT node sorting. (MFSA 2010-30)<br />

Solution: Upgrade to Mozilla Thunderbird 3.0.5 or later.<br />

CVE-2010-1203<br />

EvoCam < 3.6.8 GET Request Buffer Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5583 FAMILY: Web Servers RISK: HIGH NESSUS ID:47682<br />

Description: Synopsis :\n\nThe remote host contains an application that is affected by a buffer overflow<br />

vulnerability.\n\nThe remote host is running EvoCam, a webcam application for Mac OS<br />

X. For your information, the observed version of EvoCam is %L.\n\nVersions of EvoCam<br />

earlier than 3.6.8 are potentially affected by a buffer overflow vulnerability in the web<br />

server when handling specially crafted GET requests. An attacker, exploiting this flaw,<br />

could execute arbitrary code on the remote host subject to the privileges of the user running<br />

the affected software.<br />

Family Internet Services 1498


Solution: Upgrade to EvoCam 3.6.8 or later.<br />

CVE-2010-2309<br />

Google Chrome < 5.0.375.86 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5584 FAMILY: Web Clients RISK: HIGH NESSUS ID:47139<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Google Chrome installed on the<br />

remote host is : %L\n\nVersions of Google Chrome earlier than 5.0.375.86 are potentially<br />

affected by multiple vulnerabilities :\n\n - A cross-site scripting vulnerability in<br />

'application/json' responses. (Bug 38105)\n\n - A memory error in video handling. (Bug<br />

43322)\n\n - A subresource is displayed in omnibox loading. (Bug 43967)\n\n - A memory<br />

error in video handling. (Bug 45267)\n\n - A stale pointer in x509-user-cert response. (Bug<br />

46126)<br />

Solution: Upgrade to Google Chrome 5.0.375.86 or later.<br />

CVE Not available<br />

Bugzilla < 3.2.7 / 3.4.7 / 3.6.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5585 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:47166<br />

Description: Synopsis :\n\nThe remote web server is hosting an application that is vulnerable to multiple<br />

attack vectors.\n\nThe remote web server is hosting Bugzilla, a web-based bug tracking<br />

application. For your information, the observed version of Bugzilla is %L.\n\nVersions of<br />

Bugzilla earlier than 3.2.7, 3.4.x earlier than 3.4.7, and 3.6.x earlier than 3.6.1 are<br />

potentially affected by multiple vulnerabilities :\n\n - It is possible to determine<br />

time-tracking information for bugs through specially crafted search URLs.<br />

(CVE-2010-1204)\n\n - If '$use_suexec' is set to '1' in the localconfig file, the localconfig<br />

file's permissions were set as world-readable by checksetup.pl. (CVE-2010-0180)<br />

Solution: Upgrade to Bugzilla 3.2.7, 3.4.7, 3.6.1, or later.<br />

Web Server Detection<br />

CVE-2010-1204<br />

<strong>PVS</strong> ID: 5586 FAMILY: Web Servers RISK: NONE NESSUS ID:Not Available<br />

Description: A web server is running on this port : %L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1499


MySQL Community Server < 5.1.47 / 5.0.91 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5587 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:46702<br />

Description: Synopsis :\n\nThe remote database server is vulnerable to multiple attack vectors.\n\nFor<br />

your information, the observed version of MySQL Community Server is %L.\n\nVersions<br />

of MySQL server earlier than 5.1.47 / 5.0.91 are potentially affected by the following<br />

vulnerabilities :\n\n - The server may continue reading packets indefinitely if it receives a<br />

packet larger than the maximum size of one packet, which could allow an unauthenticated<br />

remote attacker to consume a high level of CPU and bandwidth. (Bug #50974)\n\n - Using<br />

an overly long table name argument to the 'COM_FIELD_LIST' command, an<br />

authenticated user can overflow a buffer and execute arbitrary code on the affected host.<br />

(Bug #53237)\n\n - Using a specially crafted table name argument to 'COM_FIELD_LIST',<br />

an authenticated user can bypass almost all forms of checks for privileges and table-level<br />

grants. (Bug #53371)<br />

Solution: Upgrade to MySQL Community Server 5.0.91, 5.1.47, or later.<br />

CVE-2010-1850<br />

MySQL Community Server 5.1 < 5.1.48 Denial of Service Vulnerability<br />

<strong>PVS</strong> ID: 5588 FAMILY: Database RISK: HIGH NESSUS ID:47158<br />

Description: Synopsis :\n\nThe remote database server is vulnerable to a denial of service attack.\n\nFor<br />

your information, the observed version of MySQL Community Server is %L.\nVersions of<br />

MySQL Community Server 5.1 earlier than 5.1.48 are potentially affected by a<br />

denial-of-service vulnerability. The 'ALTER DATABASE' command can be misused by a<br />

user with 'ALTER' privileges to cause the MySQL data directory to become unusable.<br />

Solution: Upgrade to MySQL Community Server 5.1.48 or later.<br />

CVE-2010-2008<br />

Opera < 10.60 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5589 FAMILY: Web Clients RISK: HIGH NESSUS ID:47583<br />

Description: Synopsis :\n\nThe remote host has a web browser that is vulnerable to multiple attack<br />

vectors.\n\nThe remote host is running the Opera web browser. For your information, the<br />

observed version of Opera is %L.\n\nVersions of Opera earlier than 10.60 are potentially<br />

affected by multiple vulnerabilities :\n\n - Double clicking a link can unexpectedly run a<br />

program from the Internet. (KB 957)\n\n - Users can be tricked into uploading unexpected<br />

files. (KB 958)<br />

Solution: Upgrade to Opera 10.60 or later.<br />

CVE-2010-2664<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Snare for Windows < 3.1.8 Web Interface Cross-Site Request Forgery<br />

Family Internet Services 1500


<strong>PVS</strong> ID: 5590 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a cross-site request forgery attack.\n\nThe<br />

remote host is running Snare for Windows, a central logging application with the web<br />

interface enabled. For your information, the observed version of Snare is :%L\n\nVersions<br />

of Snare for Windows earlier than 3.1.8 are potentially affected by a cross-site request<br />

forgery vulnerability in the web administration interface. An attacker, exploiting this flaw,<br />

could execute arbitrary script code in a user's browser.<br />

Solution: Upgrade to Snare for Windows 3.1.8 or later.<br />

CVE-2010-2594<br />

Google Chrome < 5.0.375.99 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5591 FAMILY: Web Clients RISK: HIGH NESSUS ID:47595<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Google Chrome installed on the<br />

remote host is %L.\n\nVersions of Google Chrome earlier than 5.0.375.99 are potentially<br />

affected by multiple vulnerabilities :\n\n - An unspecified issue in WebGL can trigger an<br />

OOB read. (Bug 42396)\n\n - Sandboxed iframes are not isolated strongly enough. (Bug<br />

42575)\n\n - A memory corruption issue exists with invalid SVGs. (Bug 43488)\n\n - A<br />

memory corruption issue exists in the bidi algorithm. (Bug 44424)\n\n - A memory<br />

corruption issue exists with invalid PNGs. (Bug 45983)\n\n - A memory corruption exists<br />

in CSS style rendering. (Bug 46360)\n\n - An unspecified issue with print dialogs. (Bug<br />

46575)\n\n - An unspecified crash relating to modal dialogs. (Bug 47056)<br />

Solution: Upgrade to Google Chrome 5.0.375.99 or later.<br />

CVE-2010-2652<br />

WordPress WP-UserOnline plugin URL HTML Injection Vulnerability<br />

<strong>PVS</strong> ID: 5592 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server hosts a web application that is vulnerable to an<br />

HTML-injection vulnerability.\n\nThe remote web server hosts WordPress with the<br />

WP-UserOnline plugin, a plugin to display how many users are online with detailed<br />

statistics. For your information, the observed version of the WP-UserOnline plugin is<br />

%L.\n\nVersions of WP-UserOnline earlier than 2.70 are potentially affected by an<br />

HTML-injection vulnerability. An attacker, exploiting this flaw, could potentially execute<br />

arbitrary script code in a user's browser.<br />

Solution: Upgrade to WP-UserOnline 2.70 or later.<br />

CVE Not available<br />

XLight FTP Server SFTP Directory Traversal<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5593 FAMILY: SSH NESSUS ID:47680<br />

Family Internet Services 1501


RISK:<br />

MEDIUM<br />

Description: Synopsis :\n\nThe remote SFTP service is vulnerable to a directory traversal attack.\n\nThe<br />

remote host is running XLight FTP server with the SFTP service enabled. For your<br />

information, the observed version of XLight SFTP is %L.\n\nVersions of XLight FTP<br />

server 3.x earlier than 3.6.0 are potentially affected by a directory traversal vulnerability in<br />

the SFTP service. A remote authenticated attacker, exploiting this flaw, can read arbitrary<br />

files on the affected host.<br />

Solution: Upgrade to XLight FTP Server 3.6 or later.<br />

CVE-2010-2695<br />

Bugzilla 3.7.x < 3.7.2 Information Disclosure Vulnerability<br />

<strong>PVS</strong> ID: 5594 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:47748<br />

Description: Synopsis :\n\nThe remote web server is hosting an application that is affected by an<br />

information disclosure vulnerability.\n\nThe remote web server is hosting Bugzilla, a<br />

web-based bug tracking application. For your information, the observed version of Bugzilla<br />

is %L.\n\nVersions of Bugzilla 3.7.x earlier than 3.7.2 fail to restrict access to bugs created<br />

with the inboud email interface (email_in.pl) or with the 'Bug.create' method in the<br />

WebServices interface to the 'mandatory; or 'Default' groups. This could allow bug<br />

information to become publicly available instead of being restricted to certain groups.<br />

Solution: Upgrade to Bugzilla 3.7.2 or later.<br />

CVE Not available<br />

Database Client Login Detection<br />

<strong>PVS</strong> ID: 5595 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is logging in with the following credentials<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Database Client Login Detection<br />

<strong>PVS</strong> ID: 5596 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is logging in with the following credentials<br />

realtimeonly<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1502


Solution: N/A<br />

CVE Not available<br />

Winamp < 5.58 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5597 FAMILY: Generic RISK: HIGH NESSUS ID:47717<br />

Description: Synopsis :\n\nThe remote host has a media player installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running Winamp, a media player for Windows. For<br />

your information, the observed version of Winamp is %L.\n\nVersions of Winamp earlier<br />

than 5.58 are potentially affected by multiple vulnerabilities :\n\n - A stack-based buffer<br />

overflow when loading a malformed whatsnew.txt file.\n\n - A stack-based buffer overflow<br />

when parsing VP6 video content.\n\nAn attacker, exploiting these flaws, can execute<br />

arbitrary code in the context of the affected application.<br />

Solution: Upgrade to Winamp version 5.58 or later.<br />

CVE Not available<br />

CMS Made Simple < 1.8.1 Local File Include Vulnerability<br />

<strong>PVS</strong> ID: 5598 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server is running a PHP application that is affected by a<br />

local file include vulnerability.\n\nThe remote host is running CMS Made Simple, a<br />

web-based content-management application written in PHP. For your information, the<br />

observed version of CMS Made Simple is %L.\n\nVersions of CMS Made Simple earlier<br />

than 1.8.1 are potentially affected by a local file include vulnerability because the<br />

application fails to properly sanitize user supplied input to the 'default_lang' parameter of<br />

the 'translation.functions.php' script. A remote, authenticated attacker, exploiting this flaw<br />

could execute arbitrary code subject to the privileges of the user running the affected web<br />

server.<br />

Solution: Upgrade to CMS Made Simple 1.8.1 or later.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

IBM Solid Database < 6.5 Service Pack 2 Handshake Request Username Field Remote Code<br />

Execution<br />

<strong>PVS</strong> ID: 5599 FAMILY: Database RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote database server is vulnerable to a remote code execution<br />

attack.\n\nThe remote host is running IBM SolidDB. For your information, the observed<br />

version of SolidDB is :%L.\n\nVersions of SolidDB earlier than 6.5.0.2 are potentially<br />

affected by a remote code execution vulnerability because the application fails to properly<br />

validate the length of the username field. An attacker, exploiting this flaw, could execute<br />

arbitrary code subject to the privileges of the user running the affected application.<br />

Family Internet Services 1503


Solution: Upgrade to IBM SolidDB 6.5 SP2 or later.<br />

CVE-2010-2771<br />

Ipswitch IMail Server < 11.02 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5600 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:47743<br />

Description: Synopsis :\n\nThe remote mail server is vulnerable to multiple attack vectors.\n\nThe<br />

remote host is running Ipswitch IMail server. For your information, the observed version of<br />

Ipswitch IMail is %L.\n\nVersions of IMail earlier than 11.02 are potentially affected by<br />

multiple vulnerabilities :\n\n - By sending a specially crafted message to imailsrv.exe with<br />

multiple 'Reply-To' headers set, it may be possible for a remote unauthenticated attacker to<br />

execute arbitrary code on the remote system. (ZDI-10-126)\n\n - By sending a specially<br />

crafted message containing '?Q' operator, it may be possible for a remote authenticated<br />

attacker to execute arbitrary code on the remote system with SYSTEM privileges.<br />

(ZDI-10-127)\n\n - By sending a specially crafted message with an overly long '-NOTIFY'<br />

argument, it may be possible for a remote unauthenticated attacker to execute arbitrary<br />

code on the remote system. (ZDI-10-128)<br />

Solution: Upgrade to Ipswitch IMail Server version 11.02 or later.<br />

CVE Not available<br />

BIND 9.7.1 < 9.7.1 P2 'RRSIG' Record Type Remote DoS<br />

<strong>PVS</strong> ID: 5601 FAMILY: DNS Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:47760<br />

Description: Synopsis :\n\nThe remote DNS server is vulnerable to a remote denial of service<br />

attack.\n\nThe remote host is running BIND, an open source name server. For your<br />

information, the observed version of BIND is %L.\n\nVersions of BIND 9.7.1 earlier than<br />

9.7.1 P2 are potentially affected by a remote denial of service vulnerability when handling<br />

specially crafted queries for 'RRSIG' records.<br />

Solution: Upgrade to BIND 9.7.1 P2 or later.<br />

CVE-2010-0213<br />

Client .dat Download Detection<br />

<strong>PVS</strong> ID: 5602 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client was just observed download the following '.dat' file: \n %L<br />

Solution: Ensure that this application is in alignment with existing policies and guidelines<br />

CVE Not available<br />

Client .dat Download Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1504


<strong>PVS</strong> ID: 5603 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client was just observed download the following '.dat' file: \n %L<br />

Solution: Ensure that this application is in alignment with existing policies and guidelines<br />

CVE Not available<br />

Joomla! < 1.5.20 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5604 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server has an application that is vulnerable to multiple attack<br />

vectors.\n\nThe remote web server is hosting Joomla!, a content management system<br />

written in PHP. For your information, the observed version of Joomla! is %L.\n\nVersions<br />

of Joomla earlier than 1.5.20 are potentially affected by multiple vulnerabilities :\n\n - A<br />

back-end user can inject SQL code which will lead to a MySQL error which shows internal<br />

path information. (Bug 20100701)\n\n - Multiple cross-site scripting vulnerabilities in<br />

various administrative screens. (Bug 20100702, Bug 201000703, Bug 20100704)<br />

Solution: Upgrade to Joomla! 1.5.20 or later.<br />

CVE Not available<br />

iTunes < 9.2.1 'itpc:' Buffer Overflow Vulnerability<br />

<strong>PVS</strong> ID: 5605 FAMILY: Web Clients RISK: HIGH NESSUS ID:47764<br />

Description: Synopsis :\n\nThe remote host contains an application that is vulnerable to multiple attack<br />

vectors.\n\nThe remote host has iTunes installed, a popular media player for Windows and<br />

Mac OS. For your information, the observed version of iTunes is %L.\n\nVersions of<br />

iTunes earlier than 9.2.1 are potentially affected by a buffer overflow vulnerability in the<br />

handling of 'itpc:' URLs which may allow an attacker to execute arbitrary code on the<br />

remote host. To exploit this flaw, an attacker would need to send a malformed itpc: link to a<br />

user on the remote host and wait for him to click on it.<br />

Solution: Upgrade to iTunes 9.2.1 or later.<br />

CVE-2010-1777<br />

Firefox 3.5.x < 3.5.11 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5606 FAMILY: Web Clients RISK: HIGH NESSUS ID:47781<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Firefox is %L.\n\nVersions<br />

of Firefox 3.5.x earlier than 3.5.11 are potentially affected by multiple vulnerabilities :\n\n<br />

Multiple memory safety bugs could result in memory corruption, potentially resulting in<br />

arbitrary code execution. (MFSA 2010-34)\n\n - An error in DOM attribute cloning could<br />

result in arbitrary code execution. (MFSA 2010-35)\n\n - An error in Mozilla's<br />

Family Internet Services 1505


'NodeIterator' implementation could lead to arbitrary code execution. (MFSA 2010-36)\n\n<br />

An error in the code to store the names and values of plugin parameters could lead to<br />

arbitrary code execution. (MFSA 2010-37)\n\n - The array class used to store CSS values is<br />

affected by an integer overflow vulnerability. (MFSA 2010-39)\n\n - An integer overflow<br />

vulnerability exists in the 'selection' attribute of the XUL tree element. (MFSA<br />

2010-40)\n\n - A buffer overflow exists in Mozilla graphics code could lead to arbitrary<br />

code execution. (MFSA 2010-41)\n\n - It is possible to read and parse resources from other<br />

domains even when the content is not valid javascript leading to cross-domain data<br />

disclosure. (MFSA 2010-42)\n\n - Multiple location bar spoofing vulnerabilities exist.<br />

(MFSA 2010-45)\n\n - It is possible to read data across domains by injecting bogus CSS<br />

selectors into a target site. (MFSA 2010-46)\n\n - Potentially sensitive URL parameters<br />

could be leaked across domains via script errors. (MFSA 2010-47)<br />

Solution: Upgrade to Mozilla Firefox 3.5.11 or later.<br />

CVE-2010-2754<br />

Firefox 3.6.x < 3.6.7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5607 FAMILY: Web Clients RISK: HIGH NESSUS ID:47782<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Firefox is %L.\n\nVersions<br />

of Firefox 3.6.x earlier than 3.6.7 are potentially affected by multiple vulnerabilities :\n\n<br />

Multiple memory safety bugs could result in memory corruption, potentially resulting in<br />

arbitrary code execution. (MFSA 2010-34)\n\n - An error in DOM attribute cloning could<br />

result in arbitrary code execution. (MFSA 2010-35)\n\n - An error in Mozilla's<br />

'NodeIterator' implementation could lead to arbitrary code execution. (MFSA 2010-36)\n\n<br />

An error in the code to store the names and values of plugin parameters could lead to<br />

arbitrary code execution. (MFSA 2010-37)\n\n - It may be possible to run arbitrary<br />

JavaScript with chrome privileges using SJOW and fast native function. (MFSA<br />

2010-38)\n\n - The array class used to store CSS values is affected by an integer overflow<br />

vulnerability. (MFSA 2010-39)\n\n - An integer overflow vulnerability exists in the<br />

'selection' attribute of the XUL tree element. (MFSA 2010-40)\n\n - A buffer overflow<br />

exists in Mozilla graphics code could lead to arbitrary code execution. (MFSA<br />

2010-41)\n\n - It is possible to read and parse resources from other domains even when the<br />

content is not valid javascript leading to cross-domain data disclosure. (MFSA<br />

2010-42)\n\n - The canvas element can be used to read data from another site leading to a<br />

same-origin bypass vulnerability. (MFSA 2010-43)\n\n - Characters mapped to U+FFFD in<br />

8 bit encodings cause subsequent characteres to dissapear, potentially contributing to<br />

cross-site scripting issues on certain websites. (MFSA 2010-44)\n\n - Multiple location bar<br />

spoofing vulnerabilities exist. (MFSA 2010-45)\n\n - It is possible to read data across<br />

domains by injecting bogus CSS selectors into a target site. (MFSA 2010-46)\n\n -<br />

Potentially sensitive URL parameters could be leaked across domains via script errors.<br />

(MFSA 2010-47)<br />

Solution: Upgrade to Mozilla Firefox 3.6.7 or later.<br />

CVE-2010-2754<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1506


Thunderbird 3.0.x < 3.0.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5608 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:47783<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Thunderbird is<br />

%L.\n\nVersions of Thunderbird 3.0.x earlier than 3.0.6 are potentially affected by multiple<br />

vulnerabilities :\n\n Multiple memory safety bugs could result in memory corruption,<br />

potentially resulting in arbitrary code execution. (MFSA 2010-34)\n\n - The array class<br />

used to store CSS values is affected by an integer overflow vulnerability. (MFSA<br />

2010-39)\n\n - An integer overflow vulnerability exists in the 'selection' attribute of the<br />

XUL tree element. (MFSA 2010-40)\n\n - A buffer overflow exists in Mozilla graphics<br />

code could lead to arbitrary code execution. (MFSA 2010-41)\n\n - It is possible to read<br />

and parse resources from other domains even when the content is not valid javascript<br />

leading to cross-domain data disclosure. (MFSA 2010-42)\n\n - It is possible to read data<br />

across domains by injecting bogus CSS selectors into a target site. (MFSA 2010-46)\n\n -<br />

Potentially sensitive URL parameters could be leaked across domains via script errors.<br />

(MFSA 2010-47)<br />

Solution: Upgrade to Mozilla Thunderbird 3.0.6 or later.<br />

CVE-2010-2754<br />

Thunderbird 3.1.x < 3.1.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5609 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:47784<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Thunderbird is<br />

%L.\n\nVersions of Thunderbird 3.1.x earlier than 3.1.1 are potentially affected by multiple<br />

vulnerabilities :\n\n Multiple memory safety bugs could result in memory corruption,<br />

potentially resulting in arbitrary code execution. (MFSA 2010-34)\n\n - It may be possible<br />

to run arbitrary JavaScript with chrome privileges using SJOW and fast native function.<br />

(MFSA 2010-38)\n\n - The array class used to store CSS values is affected by an integer<br />

overflow vulnerability. (MFSA 2010-39)\n\n - An integer overflow vulnerability exists in<br />

the 'selection' attribute of the XUL tree element. (MFSA 2010-40)\n\n - A buffer overflow<br />

exists in Mozilla graphics code could lead to arbitrary code execution. (MFSA<br />

2010-41)\n\n - It is possible to read and parse resources from other domains even when the<br />

content is not valid javascript leading to cross-domain data disclosure. (MFSA<br />

2010-42)\n\n - The canvas element can be used to read data from another site leading to a<br />

same-origin bypass vulnerability. (MFSA 2010-43)\n\n - Characters mapped to U+FFFD in<br />

8 bit encodings cause subsequent characteres to dissapear, potentially contributing to<br />

cross-site scripting issues on certain websites. (MFSA 2010-44)\n\n - It is possible to read<br />

data across domains by injecting bogus CSS selectors into a target site. (MFSA<br />

2010-46)\n\n - Potentially sensitive URL parameters could be leaked across domains via<br />

script errors. (MFSA 2010-47)<br />

Solution: Upgrade to Mozilla Thunderbird 3.1.1 or later.<br />

CVE-2010-2754<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1507


SeaMonkey 2.0.x < 2.0.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5610 FAMILY: Web Clients RISK: HIGH NESSUS ID:47785<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of SeaMonkey is<br />

%L.\n\nVersions of SeaMonkey 2.0.x earlier than 2.0.6 are potentially affected by multiple<br />

vulnerabilities :\n\n Multiple memory safety bugs could result in memory corruption,<br />

potentially resulting in arbitrary code execution. (MFSA 2010-34)\n\n - An error in DOM<br />

attribute cloning could result in arbitrary code execution. (MFSA 2010-35)\n\n - An error<br />

in Mozilla's 'NodeIterator' implementation could lead to arbitrary code execution. (MFSA<br />

2010-36)\n\n An error in the code to store the names and values of plugin parameters could<br />

lead to arbitrary code execution. (MFSA 2010-37)\n\n - The array class used to store CSS<br />

values is affected by an integer overflow vulnerability. (MFSA 2010-39)\n\n - An integer<br />

overflow vulnerability exists in the 'selection' attribute of the XUL tree element. (MFSA<br />

2010-40)\n\n - A buffer overflow exists in Mozilla graphics code could lead to arbitrary<br />

code execution. (MFSA 2010-41)\n\n - It is possible to read and parse resources from other<br />

domains even when the content is not valid javascript leading to cross-domain data<br />

disclosure. (MFSA 2010-42)\n\n - Multiple location bar spoofing vulnerabilities exist.<br />

(MFSA 2010-45)\n\n - It is possible to read data across domains by injecting bogus CSS<br />

selectors into a target site. (MFSA 2010-46)\n\n - Potentially sensitive URL parameters<br />

could be leaked across domains via script errors. (MFSA 2010-47)<br />

Solution: Upgrade to Mozilla SeaMonkey 2.0.6 or later.<br />

CVE-2010-2754<br />

MapServer < 5.6.4 / 4.10.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5611 FAMILY: CGI RISK: HIGH NESSUS ID:47861<br />

Description: Synopsis :\n\nThe remote web server contains a CGI script that is vulnerable to multiple<br />

attack vectors.\n\nThe remote web server hosts MapServer, an open source platform for<br />

publishing spacial data and interactive mapping applications to the web. For your<br />

information, the observed version of MapServer is %L.\n\nVersions of MapServer earlier<br />

than 5.6.4, or 4.10.6 are potentially affected by multiple vulnerabilities :\n\n - A buffer<br />

overflow vulnerability in the 'ForcedTmpBase' parameter of 'msTmpFile()'. (Ticket<br />

3484)\n\n - Unspecified security vulnerabilities in multiple debug command-line<br />

arguments. (Ticket 3485)<br />

Solution: Upgrade to MapServer 4.10.6, 5.6.4, or later.<br />

CVE-2010-2540<br />

Axon Virtual PBX < 2.13 /logon Multiple Parameter XSS<br />

<strong>PVS</strong> ID: 5612 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:42475<br />

Family Internet Services 1508


Description: Synopsis :\n\nThe remote web server hosts an application that is vulnerable to a cross-site<br />

scripting attack.\n\nThe remote web server is the internal web server component included<br />

with Axon Virtual PBX, a Windows application used to manage phone calls. For your<br />

information, the observed version of Axon Virtual PBX is %L.\n\nVersions of Axon<br />

Virtual PBX earlier than 2.13 are potentially affected by a cross-site scripting vulnerability<br />

in multiple parameters of the '/logon' script. An attacker, exploiting this flaw, can execute<br />

arbitrary script code in a user's browser.<br />

Solution: Upgrade to Axon Virtual PBX 2.13 or later.<br />

CVE-2009-4038<br />

Firefox 3.6.7 Remote Code Execution Vulnerability<br />

<strong>PVS</strong> ID: 5613 FAMILY: Web Clients RISK: HIGH NESSUS ID:47829<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Firefox is %L.\n\nFirefox<br />

3.6.7 is potentially affected by a memory corruption vulnerability that could lead to<br />

arbitrary cod execution.<br />

Solution: Upgrade to Mozilla Firefox 3.6.8 or later.<br />

CVE-2010-2755<br />

Google Chrome < 5.0.375.125 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5614 FAMILY: Web Clients RISK: HIGH NESSUS ID:47859<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Google Chrome installed on the<br />

remote host is %L.\n\nVersions of Google Chrome earlier than 5.0.375.125 are potentially<br />

affected by multiple vulnerabilities :\n\n - It is possible for memory contents to be disclosed<br />

in layout code. (Bug 42735)\n\n - An unspecified issue with large canvases. (Bug<br />

43813)\n\n - A memory corruption issue in rendering code. (Bug 47866)\n\n - A memory<br />

corruption issue in SVG handling. (Bug 48284)\n\n - It is possible for hostnames to be<br />

truncated. (Bug 48597)<br />

Solution: Upgrade to Google Chrome 5.0.375.125 or later.<br />

CVE-2010-2903<br />

Apache 2.2 < 2.2.16 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5615 FAMILY: Web Servers RISK: HIGH NESSUS ID:48205<br />

Description: Synopsis :\n\nThe remote web server is vulnerable to multiple attack vectors.\n\nFor your<br />

information, the observed version of Apache HTTP server is %L.\n\nVersions of Apache<br />

2.2 earlier than 2.2.16 are potentially affected by multiple vulnerabilities :\n\n - A<br />

denial-of-service vulnerability in mod_cache and mod_dav. (CVE-2010-1452)\n\n - An<br />

information disclosure vulnerability in mod_proxy_http relating to timeout conditions.<br />

Family Internet Services 1509


(CVE-2010-2068)<br />

Solution: Either ensure the affected module is not in use or upgrade to Apache version 2.2.16 or later.<br />

CVE-2010-2068<br />

PHP < 5.3.3 / 5.2.14 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5616 FAMILY: Web Servers RISK: HIGH NESSUS ID:48245<br />

Description: Synopsis :\n\nThe remote web server uses a version of PHP that is affected by multiple<br />

vulnerabilities.\n\nAccording to its banner the version of PHP installed on the remote host<br />

is earlier than 5.3.3 / 5.2.14. Such version are potentially affected by multiple<br />

vulnerabilities :\n\n - An information disclosure vulnerability in var_export() when a fatal<br />

error occurs.\n\n - A resource destruction issue in shm_put_var().\n\n - A possible<br />

information leak because of an interruption of XOR operator.\n\n - A memory corruption<br />

issue caused by an unexpected call-time pass by reference and the following memory<br />

clobbering through callbacks.\n\n - A memory corruption issue in<br />

ArrayObject::uasort().\n\n - A memory corruption issue in parse_str().\n\n - A memory<br />

corruption issue in pack().\n\n - A memory corruption issue in substr_replace().\n\n - A<br />

memory corruption issue in addcslashes().\n\n - A stack exhaustion issue in fnmatch().\n\n -<br />

A buffer overflow vulnerability in the dechunking filter.\n\n - An arbitrary memory access<br />

issue in the sqlite extension.\n\n - A string format validation issue in the phar extension.\n\n<br />

- An unspecified issue relating to the handling of session variable serialization on certain<br />

prefix characters.\n\n - A NULL pointer dereference issue when processing invalid<br />

XML-RPC requests.\n\n - An unserialization issue in SplObjectStorage.\n\n - Buffer<br />

overflow vulnerabilities in mysqlnd_list_fields and mysqlnd_change_user.\n\n - Buffer<br />

overflows when handling error packets in mysqlnd.<br />

Solution: Upgrade to PHP version 5.2.14, 5.3.3, or later.<br />

CVE-2010-2531<br />

Safari < 4.1.1 / 5.0.1 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5617 FAMILY: Web Clients RISK: HIGH NESSUS ID:47888<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Safari is %L.\n\nThe remote host<br />

has Safari installed. For your information, the observed version of Safari is<br />

%L.\n\nVersions of Safari earlier than 4.1.1 / 5.0.1 are potentially affected by multiple<br />

vulnerabilities :\n\n - Safari's AutoFill feature may disclose information to websites without<br />

user interaction. (CVE-2010-1796)\n\n - A use after free issue exists in WebKit's handling<br />

of element focus may lead to an application crash or arbitrary code execution.<br />

(CVE-2010-1780)\n\n - A memory corruption issue exists in WebKit's rendering of inline<br />

elements . (CVE-2010-1782)\n\n - A memory corruption issue exists in WebKit's handling<br />

of dynamic modifications to text nodes .\n\n - A memory corruption issue exists in<br />

WebKit's handling of CSS counters . (CVE-2010-1784)\n\n - An uninitialized memory<br />

access issue exists in WebKit's handling of the ':first-letter' and ':first-line' pseudo-elements<br />

in SVG text elements . (CVE-2010-1785)\n\n - A use after free issue exists in WebKit's<br />

Family Internet Services 1510


handling of foreignObject elements in SVG documents. (CVE-2010-1786)\n\n - A memory<br />

corruption issue exists in WebKit's handling of floating elements in SVG documents.<br />

(CVE-2010-1787)\n\n - A memory corruption issue exists in WebKit's handling of 'use'<br />

elements in SVG documents. (CVE-2010-1788)\n\n - A heap buffer overflow exist sin<br />

WebKit's handling of JavaScript string objects. (CVE-2010-1789)\n\n - A re-entrancy issue<br />

exists in WebKit's handling of just-in-time compiled JavaScript stubs.<br />

(CVE-2010-1790)\n\n - A signedness issue exists in WebKit's handling of JavaScript<br />

arrays. (CVE-2010-1791)\n\n - A memory corruption issue exists in WebKit's handling of<br />

regular expressions. (CVE-2010-1792)\n\n - A use after free issue exists in WebKit's<br />

handling of 'font-face' and 'use' elements in SVG documents. (CVE-2010-1793)<br />

Solution: Upgrade to Safari 4.1.1, 5.0.1, or later.<br />

CVE-2010-1796<br />

Piwik 0.6 < 0.6.4 Remote File Include Vulnerability<br />

<strong>PVS</strong> ID: 5618 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server is hosting a PHP application that is<br />

vulnerable to a remote file include attack.\n\nThe remote web server is hosting<br />

Piwik, a web analytics application written in PHP. For your information, the<br />

observed version of Piwik is %L.\n\nVersions of Piwik 0.6 < 0.6.4 are potentially<br />

affected by an unspecified remote file include vulnerability. An attacker,<br />

exploiting this flaw, could read arbitrary files or potentially execute arbitrary script<br />

code subject to the privileges of the affected web server.<br />

Solution: Upgrade to Piwik 0.6.4 or later.<br />

CVE-2010-2786<br />

Mantis 1.2.x < 1.2.2 Cross-Site Scripting Vulnerability<br />

<strong>PVS</strong> ID: 5619 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server is hosting a web application that is vulnerable to a<br />

cross-site scripting attack.\n\nThe remote web server is hosting Mantis, an open source<br />

bugtracking application written in PHP. For your information, the observed version of<br />

Mantis is %L.\n\nVersions of Mantis 1.2.x are potentially affected by a cross-site scripting<br />

vulnerability. The application does not properly validate inline attachments before<br />

rendering them. An attacker, exploiting this flaw, could execute arbitrary script code in a<br />

users browser.<br />

Solution: Upgrade to Mantis 1.2.2 or later.<br />

CVE Not available<br />

SSL Server Certificate Exchange Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1511


<strong>PVS</strong> ID: 5620 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is an SSL/TLS server<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

VxWorks 'debug' Port Detection<br />

<strong>PVS</strong> ID: 5621 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the VxWorks 'debug' service on port 17185/udp. The reported<br />

version number is: %L<br />

Solution: Manually inspect the service to ensure that it is patched and necessary on your network<br />

VxWorks Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 5622 FAMILY: FTP Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running VxWorks embedded Operating System. The reported version<br />

number is: %L<br />

Solution: Manually inspect the service to ensure that it is patched and necessary on your network<br />

VxWorks Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 5623 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running VxWorks embedded Operating System. The reported version<br />

number is: %L<br />

Solution: Manually inspect the service to ensure that it is patched and necessary on your network<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Adobe Flash Media server < 3.0.6 / 3.5.4 Multiple Vulnerabilities (APSB10-19)<br />

<strong>PVS</strong> ID: 5624 FAMILY: Web Servers RISK: HIGH NESSUS ID:48298<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Adobe Flash Media Server. For your information, the observed version of Adobe<br />

Flash Media Server is %L.\n\nVersions of Adobe Flash Media Server earlier than 3.0.6 /<br />

3.5.4 are potentially affected by multiple vulnerabilities :\n\n - An issue in a JS method<br />

Family Internet Services 1512


could result in a denial of service condition. (CVE-2010-2218)\n\n - An issue in a JS<br />

method could allow arbitrary code execution. (CVE-2010-2217)\n\n - A memory<br />

exhaustion issue could lead to a denial of service condition. (CVE-2010-2219)\n\n - An<br />

input validation issue could lead to a denial of service condition. (CVE-2010-2220)<br />

Solution: Upgrade to Flash Media Server 3.0.6, 3.5.4, or later.<br />

CVE-2010-2220<br />

Flash Player Multiple Vulnerabilities (APSB10-16)<br />

<strong>PVS</strong> ID: 5625 FAMILY: Web Clients RISK: HIGH NESSUS ID:48300<br />

Description: Synopsis :\n\nThe remote host contains a browser plug-in that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host has Adobe Flash Player installed. For your information,<br />

the observed version of Adobe Flash Player is %L.\n\nVersions of Flash Player 9.x earlier<br />

than 9.0.280 and 10.x earlier than 10.1.82.76 are potentially affected by multiple memory<br />

corruption issues and a click-jacking vulnerability.<br />

Solution: Upgrade to Flash Player 10.1.82.76 / 9.0.280 or later.<br />

CVE-2010-2216<br />

Opera < 10.61 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5626 FAMILY: Web Clients RISK: HIGH NESSUS ID:48317<br />

Description: Synopsis :\n\nThe remote host has a web browser that is vulnerable to multiple attack<br />

vectors.\n\nThe remote host is running the Opera web browser. For your information, the<br />

observed version of Opera is %L.\n\nVersions of Opera earlier than 10.61 are potentially<br />

affected by multiple vulnerabilities :\n\n - A heap overflow when performing painting<br />

operations on an HTML5 canvas can result in execution of arbitrary code, (KB 966)\n\n -<br />

An issue with tab focus is open to an attack where it is used to obscure a download dialog<br />

that is in another tab. The user can be tricked into clicking buttons in the dialog, resulting in<br />

the downloaded file being executed. (KB 967)\n\n - Certain types of content concerning the<br />

news feed preview do not have their scripts removed properly, possibly resulting in<br />

subscription of feeds without the user's consent. (KB 968)\n\nLoading an animated PNG<br />

image may cause high CPU usage with no response from the browser.<br />

(CVE-2010-3021)\n\nA memory corruption issue exists when handling an html page with a<br />

very large SIZE parameter in the SELECT tag. (CVE-2011-1824)<br />

Solution: Upgrade to Opera 10.61 or later.<br />

CVE-2011-1824<br />

Bugzilla < 3.2.8 / 3.4.8 / 3.6.2 / 3.7.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5627 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:48316<br />

Family Internet Services 1513


Description: Synopsis :\n\nThe remote web server is hosting an application that is vulnerable to multiple<br />

attack vectors.\n\nThe remote web server is hosting Bugzilla, a web-based bug tracking<br />

application. For your information, the observed version of Bugzilla is %L.\n\nVersions of<br />

Bugzilla 3.2.x earlier than 3.2.8, 3.4.x earlier than 3.4.8, 3.6.x earlier than 3.6.2, and 3.7.x<br />

earlier than 3.7.3 are potentially affected by multiple vulnerabilities :\n\n - It is possible to<br />

(at least partially) determine the membership of any group using the Search interface.<br />

(CVE-2010-2756).\n\n - It is possible to use the 'sudo' feature without sending a<br />

notification to the user being impersonated. (CVE-2010-2757)\n\n - The 'Reports' and<br />

'Duplicates' pages let you guess the name of products you can't see, due to the error<br />

message that is thrown. (CVE-2010-2758)\n\n - For installations using PostgreSQL,<br />

specifying "bug X" or "Attachment X" in a comment can deny access to the bug if X is<br />

larger than the maximum 32-bit signed integer size. (CVE-2010-2759)<br />

Solution: Upgrade to Bugzilla 3.2.8, 3.4.8, 3.6.2, 3.7.3, or later.<br />

CVE-2010-2759<br />

QuickTime < 7.6.7 QuickTimeStreaming.qtx SMIL File Debug Logging Overflow (Windows)<br />

<strong>PVS</strong> ID: 5628 FAMILY: Web Clients RISK: HIGH NESSUS ID:48323<br />

Description: Synopsis :\n\nThe remote host contains an application that is affected by a stack overflow<br />

vulnerability.\n\nFor your information, the observed version of QuickTime is<br />

%L.\n\nVersions of QuickTime earlier than 7.6.7 are potentially affected by a stack<br />

overflow in the application's error logging when debug logging is enabled. If an attacker<br />

can trick a user on the host into viewing a specially crafted movie file, he may be able to<br />

cause an application crash or even execute arbitrary code subject to the user's privileges.<br />

Note that this issue only affects QuickTime on Windows.<br />

Solution: Upgrade to QuickTime 7.6.7 or later.<br />

CVE-2010-1799<br />

SquirrelMail < 1.4.21 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5629 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server if vulnerable to a denial-of-service attack.\n\nThe<br />

remote host is running SquirrelMail, a web-based email client. For your information, the<br />

observed version of SquirrelMail is %L.\n\nVersions of SquirrelMail earlier than 1.4.21 are<br />

potentially affected by a denial-of-service vulnerability. By submitting a random login with<br />

8-bit characters in the password, it is possible to cause SquirrelMail to create a preferences<br />

file even if the login is not valid. An attacker, exploiting this flaw, could create enough files<br />

to cause the server to run out of disk space.<br />

Solution: Upgrade to SquirrelMail 1.4.21 or later.<br />

CVE-2010-2813<br />

Zoiper < 2.24 SIP INVITE Request Remote DoS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1514


<strong>PVS</strong> ID: 5630 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:48273<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a denial-of-service attack.\n\nThe remote<br />

host is running Zoiper, a cross-platform VoIP solution. For your information, the observed<br />

library version of Zoiper %L.\n\nVersions of Zoiper earlier than 2.24 Library 5324 are<br />

potentially affected by a denial-of-service vulnerability because the application fails to<br />

properly handle specially crafted SIP INVITE Requests. An attacker, exploiting this flaw,<br />

could potentially crash the affected application.<br />

Solution: Upgrade to Zoiper 2.24 Library 5324 or later.<br />

CVE-2009-3704<br />

Drupal Devel module < 6.x-1.22 Cross-Site Scripting Vulnerability<br />

<strong>PVS</strong> ID: 5631 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server is hosting a web application that is vulnerable to a<br />

cross-site scripting attack.\n\nThe remote web server hosts a Drupal install that uses the<br />

Devel module, a performance logging component. For your information, the observed<br />

version of the Devel Module is %L.\n\nVersions of the Drupal Devel module earlier than<br />

6.x-1.22 are potentially affected by a cross-site scripting vulnerability because the<br />

application fails to properly sanitize URLs comprised of node paths. A remote attacker with<br />

the ability to to add URL aliases could exploit this flaw to execute arbitrary script code in a<br />

user's browser.<br />

Solution: Upgrade to Drupal Devel module 6.x-1.22 or later.<br />

CVE-2010-3022<br />

Drupal OpenID module < 5.x-1.5 Authentication Bypass Vulnerability<br />

<strong>PVS</strong> ID: 5632 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server is hosting a web application that is affected by an<br />

authentication bypass vulnerability.\n\nThe remote web server hosts a Drupal install that<br />

uses the OpenID module, a module that allows users to authenticate via OpenID. For your<br />

information, the observed version of the Drupal OpenID module is %L.\n\nVersions of<br />

Drupal OpenID module earlier than 5.x-1.5 are potentially affected by an authentication<br />

bypass vulnerability because the application fails to implement all the required verifications<br />

from the OpenID 2.0 protocol. A remote attacker, exploiting this flaw, could gain<br />

unauthorized access to the affected Drupal install.<br />

Solution: Upgrade to Drupal OpenID module 5.x-1.5 or later.<br />

CVE-2010-3686<br />

MySQL Server Failed Login Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1515


<strong>PVS</strong> ID: 5633 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The <strong>PVS</strong> has observed a failed SQL login to an MySQL server. The following UserID has<br />

just failed to login: %L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Drupal Ubercart Module < 5.x-1.10 / 6.x-2.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5634 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server is hosting a web application that is affected by an<br />

authentication bypass vulnerability.\n\nThe remote web server hosts a Drupal install that<br />

uses the Ubercart, an e-commerce module for Drupal CMS. For your information, the<br />

observed version of Drupal Ubercart module is %L.\n\nVersions of Ubercart earlier than<br />

5.x-1.10 / 6.x-2.4 are potentially affected by multiple vulnerabilities :\n\n - The 2Checkout<br />

gateway module does not properly verify payment notification information. Note that this<br />

module must be enabled for the Drupal install to be affected.\n\n - The Paypal module's<br />

WPS payment method does not properly verify the payment notification information. Note<br />

that this module must be enabled for the Drupal install to be affected.\n\n - The Ubercart<br />

Cart Links module is vulnerable to both an Access Bypass and Cross Site Request Forgery<br />

where a malicious user can trick other users into adding or removing items from their cart<br />

and add items to a cart which are not published on the site. Note that this module must be<br />

enabled for the Drupal install to be affected.<br />

Solution: Upgrade to Drupal Ubercart Module 5.x-1.10 / 6.x-2.4 or later.<br />

CVE Not available<br />

Serv-U < 10.2.0.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5635 FAMILY: FTP Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:48435<br />

Description: Synopsis :\n\nThe remote FTP server is vulnerable to multiple attack vectors.\n\nThe<br />

remote host is running Serv-U File Server, an FTP Server for Windows. For your<br />

information, the observed version Serv-U is %L.\n\nVersions of Serv-U earlier than<br />

10.2.0.0 are potentially affected by multiple vulnerabilities :\n\n - It is possible to create a<br />

directory, when using virtual paths and various combinations of permissions, where the<br />

end-user does not have permission to create the directory. Note that this issue was<br />

introduced in Serv-U 9.2.0.1 and does not affect earlier version.\n\n - Certain web client<br />

invalid URL parameters could cause the affected application to crash.<br />

Solution: Upgrade to Serv-U version 10.2.0.0 or later.<br />

Family Internet Services 1516


CVE Not available<br />

Drupal FileField Source Module < 6.x-1.2 Arbitrary Code Execution<br />

<strong>PVS</strong> ID: 5636 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server is hosting a web application that is vulnerable to a<br />

remote code execution attack.\n\nThe remote web server hosts a Drupal install that uses the<br />

FileField Source module. For your information, the observed version of Drupal FileField<br />

Sources module is %L.\n\nVersions of FileField Sources earlier than 6.x-1.2 are potentially<br />

affected by a remote code execution vulnerability because the application fails to properly<br />

sanitize the file extensions of files that have been transferred from remote servers.<br />

Solution: Upgrade to Drupal FileField Sources module 6.x-1.2 or later.<br />

QNX Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 5637 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the QNX embedded Operating System.<br />

Solution: Manually inspect the service to ensure that it is patched and necessary on your network<br />

CVE Not available<br />

QNX 'debug' Service Detection<br />

<strong>PVS</strong> ID: 5638 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: A QNX 'debug' service is listening on this port.<br />

Solution: Manually inspect the service to ensure that it is patched and necessary on your network<br />

CVE Not available<br />

QNX qconn Service Detection<br />

<strong>PVS</strong> ID: 5639 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: A QNX qconn service is listening on this port.<br />

Solution: Manually inspect the service to ensure that it is patched and necessary on your network<br />

CVE Not available<br />

QCONN Version Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5640 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1517


Description: The remote host is running the QNX embedded operating system. The reported version<br />

information (via the qconn service) is: %L<br />

Solution: Verify that the software is up to date<br />

QNX Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 5641 FAMILY: FTP Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the QNX embedded Operating System.<br />

Solution: Manually inspect the service to ensure that it is patched and necessary on your network<br />

CVE Not available<br />

CouchDB < 0.11.2 Futon Admin Interface Cross-Site Request Forgery<br />

<strong>PVS</strong> ID: 5642 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:48382<br />

Description: Synopsis :\n\nThe remote database server is vulnerable to a cross-site request forgery<br />

attack.\n\nThe remote host is running CouchDB, a document-oriented database. For your<br />

information, the observed version of CouchDB is %L.\n\nVersions of CouchDB earlier<br />

than 0.11.2 are potentially affected by a cross-site request forgery vulnerability. The<br />

application fails to properly sanitize user-supplied input before it is used in the Futon<br />

administrative interface.\n\n remote attacker could exploit this to execute arbitrary script<br />

code in the security context of CouchDB's admin interface.<br />

Solution: Upgrade to CouchDB 0.11.2 or later.<br />

CVE-2010-2234<br />

Drupal CCK "Node Reference" Module < 6.x-2.8 <strong>Security</strong> Bypass Vulnerability<br />

<strong>PVS</strong> ID: 5643 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server is hosting a web application that is vulnerable to a<br />

security bypass attack.\n\nThe remote web server hosts a Drupal install that uses the CCK<br />

"Node Reference" module. Versions of the CCK Module earlier than 6.x-2.8 are potentially<br />

affected by a security bypass vulnerability. The application provides a backend URL that is<br />

used for asynchronous requests by the 'autocomplete' widget which fails to correctly check<br />

that the user had field level access to the source field.<br />

Solution: Upgrade to Drupal CCK module 6.x-2.8 or later.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1518


Google Chrome < 5.0.375.127 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5644 FAMILY: Web Clients RISK: HIGH NESSUS ID:48383<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Google Chrome installed on the<br />

remote host is %L.\n\nVersions of Google Chrome earlier than 5.0.375.127 are potentially<br />

affected by multiple vulnerabilities :\n\nA memory corruption issue with file dialog. (Bug<br />

45400)\n\nA memory corruption issue with SVGs. (Bug 49596)\n\nAn issue relating to a<br />

bad cast with text editing. (Bug 49268)\n\n - A possible address bar spoofing vulnerability<br />

caused by a history bug. (Bug 49964)\n\n - A memory corruption issue in MIME type<br />

handling. (Bugs 50515, 51835)\n\nA crash on shutdown due to a notifications bug. (Bug<br />

50553)\n\nOmnibox autosuggest is enabled when a user might be typing a password. (Bug<br />

51146)\n\nA memory corruption issue in Ruby support. (Bug 51654)\n\nA memory<br />

corruption issue in Geolocation support. (51670)<br />

Solution: Upgrade to Google Chrome 5.0.375.127 or later.<br />

CVE-2010-3120<br />

Database TDS Failed Login Detection<br />

<strong>PVS</strong> ID: 5645 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The following UserID just failed a SQL login<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

MySQL Community Server 5.1 < 5.1.49 Multiple Denial of Service Vulnerabilities<br />

<strong>PVS</strong> ID: 5646 FAMILY: Database<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:48759<br />

Description: Synopsis :\n\nThe remote database server is vulnerable to multiple denial of service<br />

attacks.\n\nFor your information, the observed version of MySQL Community Server is<br />

%L.\n\nVersions of MySQL Community Server 5.1 earlier than 5.1.49 are potentially<br />

affected by multiple vulnerabilities :\n\n - After changing the values of the<br />

'innodb_file_format' or 'innodb_file_per_table' configuration parameters, DDL statements<br />

could cause a server crash. (Bug #55039)\n\nJoins involving a table with a unique SET<br />

column could cause a server crash. (Bug #54575)\n\nIncorrect handling of NULL<br />

arguments could lead to a crash for IN() or CASE operations when ULL arguments were<br />

either passed explicitly as arguments (for IN()) or implicitly generated by the WITH<br />

ROLLUP modifier which could lead to a crash. (Bug #54477)\n\n - A malformed argument<br />

to the BINLOG statement could result in Valgrind warnings or a server crash. (Bug<br />

#54393)\n\n - Use of TEMPORARY InnoDB tables with nullabale columns could cause a<br />

server crash. (Bug #54044)\n\n - The server could crash if there were alternate reads from<br />

two indexes on a table using the HANDLER interface. (Bug #54007)\n\n - Using<br />

Family Internet Services 1519


EXPLAIN with specially crafted queries could lead to a crash. (Bug #52711)\n\n - 'LOAD<br />

DATA INFILE' did not check for SQL errors and sent an OK packet even when errors were<br />

already reported. (Bug #52512)<br />

Solution: Upgrade to MySQL Community Server 5.1.49 or later.<br />

CVE-2010-3683<br />

Novell iPrint Client < 5.42 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5647 FAMILY: Web Clients RISK: HIGH NESSUS ID:48364<br />

Description: Synopsis :\n\nThe remote host contains an application that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Novell iPrint Client is<br />

%L\n\nVersions of Novell iPrint Client earlier than 5.42 are potentially affected by<br />

multiple vulnerabilities :\n\n - Due to a flaw in the nipplib.dll module, it may be possible<br />

for a remote attacker to delete arbitrary files from the remote system via the<br />

'CleanUploadFiles' method provided by an ActiveX control. (TPTI-10-05)\n\n - By passing<br />

a specially crafted value to the 'debug' parameter in the ActiveX control ienipp.ocx, it may<br />

be possible for an attacker to trigger a stack-based buffer overflow, potentially resulting in<br />

arbitrary code execution within the context of the user running the browser.<br />

(TPTI-10-06)\n\n - Due to improper validation of plugin parameters, it may be possible for<br />

an attacker to trigger a buffer overflow condition resulting in arbitrary code execution<br />

within the context of the user running the browser. (ZDI-10-139)\n\nDue to improper<br />

validation of plugin parameters it may be possible for an attacker to trigger a stack-based<br />

buffer overflow, potentially resulting in arbitrary code execution within the context of the<br />

user running the browser. (ZDI-10-140)<br />

Solution: Upgrade to Novell iPrint Client 5.42 or later.<br />

CVE-2010-3109<br />

Novell iPrint Client < 5.44 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5648 FAMILY: Web Clients RISK: HIGH NESSUS ID:48407<br />

Description: Synopsis :\n\nThe remote host contains an application that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Novell iPrint Client is<br />

%L.\n\nVersions of Novell iPrint Client earlier than 5.44 are potentially affected by<br />

multiple vulnerabilities :\n\n - A buffer overflow was discovered in how iPrint client<br />

handles the 'call-back-url' parameter value for a 'op-client-interface-version' operation<br />

where the 'result-type' parameter is set to 'url'.\n\n - An uninitialized pointer vulnerability in<br />

ienipp.ocx was discovered and allows an attacker to exploit an issue where the uninitialized<br />

pointer is called and the process jumps to an address space controllable by the attacker.<br />

Solution: Upgrade to Novell iPrint Client 5.44 or later.<br />

CVE-2010-3105<br />

Linksys WAP Default Credentials Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1520


<strong>PVS</strong> ID: 5649 FAMILY: Web Servers RISK: HIGH NESSUS ID:49646<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials\n\nThe remote host is a wireless access point (WAP). This version of Linksys<br />

shipped with a default userID and password which can be used to gain elevated access to<br />

the device. In this case, the credentials are Gemtek/gemtekswd . Since these credentials are<br />

hard coded into the device image, there is not a way to change them via the administrative<br />

tools.<br />

Solution: obtain a fix from the vendor<br />

CVE-2010-1573<br />

Real <strong>Network</strong>s RealPlayer SP < 1.1.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5650 FAMILY: Web Clients RISK: HIGH NESSUS ID:48907<br />

Description: Synopsis :\n\nThe remote host is running an application that is vulnerable to multiple attack<br />

vectors.\n\nThe remote host is running RealPlayer, a multi-media application. For your<br />

information, the observed build of RealPlayer SP is %L.\n\nRealPlayer SP builds earlier<br />

than 12.0.0.879 are potentially affected by multiple vulnerabilities :\n\n - A RealPlayer<br />

malformed 'IVR' pointer index code execution vulnerability exists. (CVE-2010-2996,<br />

CVE-2010-2998)\n\nA RealPlayerActiveX unauthorized file access vulnerability exists.<br />

(CVE-2010-3002)\n\nA RealPlayer 'QCP' file parsing integer overflow vulnerability exists.<br />

(CVE-2010-0116)\n\nA vulnerability exists in the way RealPlayer processes the<br />

dimensions in the 'YUV420' transformation of 'MP4' content. (CVE-2010-0117)\n\nA<br />

heap-based buffer overflow vulnerability exists in RealPlayer's 'QCP' parsing.<br />

(CVE-20010-0120)\n\nA vulnerability exists in the ActiveX IE plugin relating to the<br />

opening of multiple browser windows. (CVE-2010-3001)\n\n - An uninitialized pointer<br />

vulnerability exists in the CDDA URI ActiveX Control. (CVE-2010-3747) - A remote code<br />

execution vulnerability exists in RJMDSections. (CVE-210-3750) - A RealPlayer 'QCP'<br />

parsing heap-based buffer overflow vulnerability exists. (CVE-2010-2578)\n\n - A remote<br />

code execution issue exists in multiple protocol handlers for the RealPlayer ActiveX<br />

control. (CVE-2010-3751)\n\n - A stack overflow vulnerability exists in the RichFX<br />

component. (CVE-2010-3748)\n\n - A paramenter injection vulnerability exists in the<br />

RecordClip browser extension. (CVE-2010-3749)<br />

Solution: Upgrade to RealPlayer SP 1.1.5 or later.<br />

CVE-2010-3751<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

VLC Media Player < 1.1.4 Patch Subversion Arbitrary DLL Injection Code Execution<br />

<strong>PVS</strong> ID: 5651 FAMILY: Web Clients RISK: HIGH NESSUS ID:48906<br />

Description: Synopsis :\n\nThe remote host contains an application that allows arbitrary code<br />

execution.\n\nThe remote host contains VLC player, a multi-media application. For your<br />

information, the observed version of VLC is %L.\n\nVersions of VLC media player earlier<br />

than 1.1.4 are potentially affected by a code execution vulnerability. The application<br />

insecurely looks in its current working directory when resolving DLL dependencies, such<br />

as for 'wintab32.dll'. If a malicious DLL with the same name as a required DLL is located<br />

Family Internet Services 1521


in the application's current working directory, the malicious DLL will be loaded.<br />

Solution: Upgrade to VLC Media Player version 1.1.4 or later.<br />

CVE-2010-3124<br />

phpMyAdmin 3.x < 3.3.6 Cross-Site Scripting Vulnerability<br />

<strong>PVS</strong> ID: 5652 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a PHP application that is vulnerable to a<br />

cross-site scripting attack.\n\nFor your information, the observed version of phpMyAdmin<br />

is %L.\n\nVersions of phpMyAdmin earlier than 3.3.6 are potentially affected by a<br />

cross-site scripting vulnerability via error messages in PHP backtrace.<br />

Solution: Upgrade to phpMyAdmin 3.3.6 or later.<br />

CVE Not available<br />

iTunes < 10.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5653 FAMILY: Web Clients RISK: HIGH NESSUS ID:49087<br />

Description: Synopsis :\n\nThe remote host contains an application that is vulnerable to multiple attack<br />

vectors.\n\nThe remote host has iTunes installed, a popular media player for Windows and<br />

Mac OS. For your information, the observed version of iTunes is %L.\n\nVersions of<br />

iTunes earlier than 10.0 are potentially affected by multiple vulnerabilities in the WebKit<br />

component. Note that these issues only affect WebKit for Windows.<br />

Solution: Upgrade to iTunes 10.0 or later.<br />

CVE-2010-1793<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Google Chrome < 6.0.472.53 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5654 FAMILY: Web Clients RISK: HIGH NESSUS ID:49089<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Google Chrome installed on the<br />

remote host is %L.\n\nVersions of Google Chrome earlier than 6.0.472.53 are potentially<br />

affected by multiple vulnerabilities :\n\n - It is possible to bypass the pop-up blocker with a<br />

blank frame target. (Bug 34414)\n\n - It is possible to visually spoof the URL bar with<br />

homographic sequences. (Bug 37201)\n\n - Restrictions on setting clipboard content are not<br />

strict enough. (Bug 41654)\n\n - A stale pointer exists in SVG filters. (Bug 45659)\n\n - It<br />

may be possible to enumerate installed extensions. (Bug 45876)\n\n - An unspecified<br />

vulnerability in WebSockets could lead to a browser NULL crash. (Bugs 46750, 51846)\n\n<br />

- A use-after-free error exists in the Notifications presenter. (Bug 50386)\n\n - An<br />

unspecified memory corruption issue exists in Notification permissions. (Bug 50839)\n\n -<br />

Multiple unspecified integer errors exists in WebSockets. (Bugs 51360, 51739)\n\n - A<br />

memory corruption issue exists with counter nodes. (Bug 51653)\n\n - Chrome may store<br />

Family Internet Services 1522


an excessive amount of autocomplete entries. (Bug 51727)\n\n - A stale pointer exists in<br />

focus handling. (Bug 52433)\n\n - A Sandbox parameter deserialization error exists. (Bug<br />

52682)\n\n - An unspecified cross-origin image theft issue exists. (Bug 53001)<br />

Solution: Upgrade to Google Chrome 6.0.472.53 or later.<br />

CVE Not available<br />

Safari < 4.1.2 / 5.0.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5655 FAMILY: Web Clients RISK: HIGH NESSUS ID:49144<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Safari is %L.\n\nThe remote host<br />

has Safari installed. For your information, the observed version of Safari is<br />

%L.\n\nVersions of Safari earlier than 4.1.2 / 5.0.2 are potentially affected by several issues<br />

in the following component :\n\n - Webkit<br />

Solution: Upgrade to Safari 4.1.2, 5.0.2, or later.<br />

CVE-2010-1807<br />

Firefox 3.5.x < 3.5.12 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5656 FAMILY: Web Clients RISK: HIGH NESSUS ID:49145<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Firefox is %L.\n\nVersions<br />

of Firefox earlier than 3.5.12 are potentially affected by multiple vulnerabilities :\n\n -<br />

Multiple memory safety issues that could lead to arbitrary code execution. (MFSA<br />

2010-49)\n\n - The implementation of the HTML frameset element contains an integer<br />

overflow vulnerability. (MFSA 2010-50)\n\n - A dangling pointer vulnerability exists in the<br />

implementation of 'navigator.plugins' in which the 'navigator' object could retain a pointer<br />

to the plugins array even after it has been destroyed. (MFSA 2010-51)\n\n - Firefox can be<br />

used to load a malicious code library that has been planted on a victim's computer. (MFSA<br />

2010-52)\n\n - A heap buffer overflow exists in code routines responsible for transforming<br />

text runs. (MFSA 2010-53)\n\n - A dangling pointer issue remains leftover from the fix for<br />

CVE-2010-2753. (MFSA 2010-54)\n\n - XUL '' objects can be manipulated such that<br />

the setting of certain properties on the object would trigger the removal of the tree from the<br />

DOM and cause certain sections of deleted memory to be accessed. (MFSA 2010-55)\n\n -<br />

The implementation of the XUL '' content view contains a dangling pointer<br />

vulnerability. (MFSA 2010-56)\n\n - The code used to normalize a document contains a<br />

logical flaw that could be leveraged to run arbitrary code. (MFSA 2010-57)\n\n - A<br />

specially crafted font can be applied to a document and cause a crash on Mac systems.<br />

(MFSA 2010-58)\n\n - The wrapper class 'XPCSafeJSObjectWrapper (SJOW) has a logical<br />

error in its scripted function implementation that allows the caller to run the function within<br />

the context of another site. (MFSA 2010-60)\n\n - The 'type' attribute of an tag<br />

can override the charset of a framed HTML document even when the document is included<br />

across origins. (MFSA 2010-61)\n\n - When an HTML selection containing JavaScript is<br />

copy-and-pasted or dropped onto a document with designMode enabled, the JavaScript will<br />

Family Internet Services 1523


e executed within the context of the site where the code was dropped. (MFSA<br />

2010-62)\n\n - The 'statusText' property of an 'XMLHttpRequest' object is readable by the<br />

requestor even when the request is made across origins. (MFSA 2010-63)<br />

Solution: Upgrade to Mozilla Firefox 3.5.12 or later.<br />

CVE-2010-3169<br />

Firefox 3.6.x < 3.6.9 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5657 FAMILY: Web Clients RISK: HIGH NESSUS ID:49146<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Firefox is %L.\n\nVersions<br />

of Firefox earlier than 3.6.9 are potentially affected by multiple vulnerabilities :\n\n -<br />

Multiple memory safety issues that could lead to arbitrary code execution. (MFSA<br />

2010-49)\n\n - The implementation of the HTML frameset element contains an integer<br />

overflow vulnerability. (MFSA 2010-50)\n\n - A dangling pointer vulnerability exists in the<br />

implementation of 'navigator.plugins' in which the 'navigator' object could retain a pointer<br />

to the plugins array even after it has been destroyed. (MFSA 2010-51)\n\n - Firefox can be<br />

used to load a malicious code library that has been planted on a victim's computer. (MFSA<br />

2010-52)\n\n - A heap buffer overflow exists in code routines responsible for transforming<br />

text runs. (MFSA 2010-53)\n\n - A dangling pointer issue remains leftover from the fix for<br />

CVE-2010-2753. (MFSA 2010-54)\n\n - XUL '' objects can be manipulated such that<br />

the setting of certain properties on the object would trigger the removal of the tree from the<br />

DOM and cause certain sections of deleted memory to be accessed. (MFSA 2010-55)\n\n -<br />

The implementation of the XUL '' content view contains a dangling pointer<br />

vulnerability. (MFSA 2010-56)\n\n - The code used to normalize a document contains a<br />

logical flaw that could be leveraged to run arbitrary code. (MFSA 2010-57)\n\n - A<br />

specially crafted font can be applied to a document and cause a crash on Mac systems.<br />

(MFSA 2010-58)\n\n - The wrapper class 'XPCSafeJSObjectWrapper' (SJOW) creates<br />

scope chains ending in outer objects. (MFSA 2010-59)\n\n - The 'type' attribute of an<br />

tag can override the charset of a framed HTML document even when the<br />

document is included across origins. (MFSA 2010-61)\n\n - When an HTML selection<br />

containing JavaScript is copy-and-pasted or dropped onto a document with designMode<br />

enabled, the JavaScript will be executed within the context of the site where the code was<br />

dropped. (MFSA 2010-62)\n\n - The 'statusText' property of an 'XMLHttpRequest' object is<br />

readable by the requestor even when the request is made across origins. (MFSA 2010-63)<br />

Solution: Upgrade to Mozilla Firefox 3.6.9 or later.<br />

CVE-2010-3169<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Thunderbird < 3.0.x < 3.0.7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5658 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:49147<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Thunderbird is<br />

%L.\n\nVersions of Thunderbird earlier than 3.0.7 are potentially affected by multiple<br />

Family Internet Services 1524


vulnerabilities :\n\n - Multiple memory safety issues that could lead to arbitrary code<br />

execution. (MFSA 2010-49)\n\n - The implementation of the HTML frameset element<br />

contains an integer overflow vulnerability. (MFSA 2010-50)\n\n - A dangling pointer<br />

vulnerability exists in the implementation of 'navigator.plugins' in which the 'navigator'<br />

object could retain a pointer to the plugins array even after it has been destroyed. (MFSA<br />

2010-51)\n\n - Thunderbird can be used to load a malicious code library that has been<br />

planted on a victim's computer. (MFSA 2010-52)\n\n - A heap buffer overflow exists in<br />

code routines responsible for transforming text runs. (MFSA 2010-53)\n\n - A dangling<br />

pointer issue remains leftover from the fix for CVE-2010-2753. (MFSA 2010-54)\n\n -<br />

XUL '' objects can be manipulated such that the setting of certain properties on the<br />

object would trigger the removal of the tree from the DOM and cause certain sections of<br />

deleted memory to be accessed. (MFSA 2010-55)\n\n - The implementation of the XUL<br />

'' content view contains a dangling pointer vulnerability. (MFSA 2010-56)\n\n - The<br />

code used to normalize a document contains a logical flaw that could be leveraged to run<br />

arbitrary code. (MFSA 2010-57)\n\n - A specially crafted font can be applied to a document<br />

and cause a crash on Mac systems. (MFSA 2010-58)\n\n - The wrapper class<br />

'XPCSafeJSObjectWrapper (SJOW) has a logical error in its scripted function<br />

implementation that allows the caller to run the function within the context of another site.<br />

(MFSA 2010-60)\n\n - The 'type' attribute of an tag can override the charset of a<br />

framed HTML document even when the document is included across origins. (MFSA<br />

2010-61)\n\n - When an HTML selection containing JavaScript is copy-and-pasted or<br />

dropped onto a document with designMode enabled, the JavaScript will be executed within<br />

the context of the site where the code was dropped. (MFSA 2010-62)\n\n - The 'statusText'<br />

property of an 'XMLHttpRequest' object is readable by the requestor even when the request<br />

is made across origins. (MFSA 2010-63)<br />

Solution: Upgrade to Mozilla Thunderbird 3.0.7 or later.<br />

CVE-2010-3169<br />

Thunderbird < 3.1.3 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5659 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:49148<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Thunderbird is<br />

%L.\n\nVersions of Thunderbird earlier than 3.1.3 are potentially affected by multiple<br />

vulnerabilities :\n\n - Multiple memory safety issues that could lead to arbitrary code<br />

execution. (MFSA 2010-49)\n\n - The implementation of the HTML frameset element<br />

contains an integer overflow vulnerability. (MFSA 2010-50)\n\n - A dangling pointer<br />

vulnerability exists in the implementation of 'navigator.plugins' in which the 'navigator'<br />

object could retain a pointer to the plugins array even after it has been destroyed. (MFSA<br />

2010-51)\n\n - Thunderbird can be used to load a malicious code library that has been<br />

planted on a victim's computer. (MFSA 2010-52)\n\n - A heap buffer overflow exists in<br />

code routines responsible for transforming text runs. (MFSA 2010-53)\n\n - A dangling<br />

pointer issue remains leftover from the fix for CVE-2010-2753. (MFSA 2010-54)\n\n -<br />

XUL '' objects can be manipulated such that the setting of certain properties on the<br />

object would trigger the removal of the tree from the DOM and cause certain sections of<br />

deleted memory to be accessed. (MFSA 2010-55)\n\n - The implementation of the XUL<br />

'' content view contains a dangling pointer vulnerability. (MFSA 2010-56)\n\n - The<br />

Family Internet Services 1525


code used to normalize a document contains a logical flaw that could be leveraged to run<br />

arbitrary code. (MFSA 2010-57)\n\n - A specially crafted font can be applied to a document<br />

and cause a crash on Mac systems. (MFSA 2010-58)\n\n - The wrapper class<br />

'XPCSafeJSObjectWrapper' (SJOW) creates scope chains ending in outer objects. (MFSA<br />

2010-59)\n\n - The 'type' attribute of an tag can override the charset of a framed<br />

HTML document even when the document is included across origins. (MFSA 2010-61)\n\n<br />

- When an HTML selection containing JavaScript is copy-and-pasted or dropped onto a<br />

document with designMode enabled, the JavaScript will be executed within the context of<br />

the site where the code was dropped. (MFSA 2010-62)\n\n - The 'statusText' property of an<br />

'XMLHttpRequest' object is readable by the requestor even when the request is made across<br />

origins. (MFSA 2010-63)<br />

Solution: Upgrade to Mozilla Thunderbird 3.1.3 or later.<br />

CVE-2010-3169<br />

SeaMonkey < 2.0.7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5660 FAMILY: Web Clients RISK: HIGH NESSUS ID:49149<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of SeaMonkey is<br />

%L.\n\nVersions of SeaMonkey earlier than 2.0.7 are potentially affected by multiple<br />

vulnerabilities :\n\n - Multiple memory safety issues that could lead to arbitrary code<br />

execution. (MFSA 2010-49)\n\n - The implementation of the HTML frameset element<br />

contains an integer overflow vulnerability. (MFSA 2010-50)\n\n - A dangling pointer<br />

vulnerability exists in the implementation of 'navigator.plugins' in which the 'navigator'<br />

object could retain a pointer to the plugins array even after it has been destroyed. (MFSA<br />

2010-51)\n\n - SeaMonkey can be used to load a malicious code library that has been<br />

planted on a victim's computer. (MFSA 2010-52)\n\n - A heap buffer overflow exists in<br />

code routines responsible for transforming text runs. (MFSA 2010-53)\n\n - A dangling<br />

pointer issue remains leftover from the fix for CVE-2010-2753. (MFSA 2010-54)\n\n -<br />

XUL '' objects can be manipulated such that the setting of certain properties on the<br />

object would trigger the removal of the tree from the DOM and cause certain sections of<br />

deleted memory to be accessed. (MFSA 2010-55)\n\n - The implementation of the XUL<br />

'' content view contains a dangling pointer vulnerability. (MFSA 2010-56)\n\n - The<br />

code used to normalize a document contains a logical flaw that could be leveraged to run<br />

arbitrary code. (MFSA 2010-57)\n\n - A specially crafted font can be applied to a document<br />

and cause a crash on Mac systems. (MFSA 2010-58)\n\n - The 'type' attribute of an<br />

tag can override the charset of a framed HTML document even when the<br />

document is included across origins. (MFSA 2010-61)\n\n - When an HTML selection<br />

containing JavaScript is copy-and-pasted or dropped onto a document with designMode<br />

enabled, the JavaScript will be executed within the context of the site where the code was<br />

dropped. (MFSA 2010-62)\n\n - The 'statusText' property of an 'XMLHttpRequest' object is<br />

readable by the requestor even when the request is made across origins. (MFSA 2010-63)<br />

Solution: Upgrade to Mozilla SeaMonkey 2.0.7 or later.<br />

CVE-2010-3169<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1526


Opera < 10.62 Path Subversion Arbitrary DLL Injection Code Execution<br />

<strong>PVS</strong> ID: 5661 FAMILY: Web Clients RISK: HIGH NESSUS ID:49174<br />

Description: Synopsis :\n\nThe remote host has a web browser that is affected by an arbitrary code<br />

execution vulnerability.\n\nThe remote host is running the Opera web browser. For your<br />

information, the observed version of Opera is %L.\n\nVersions of Opera earlier than 10.62<br />

may unintentionally load malicious DLL files and execute arbitrary code due to Opera's<br />

DLL search methods. (970)<br />

Solution: Upgrade to Opera 10.62 or later.<br />

CVE Not available<br />

Squid < 3.1.8 / 3.2.0.2 NULL Pointer Dereference Denial of Service Vulnerability<br />

<strong>PVS</strong> ID: 5662 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:49693<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running Squid, a web proxy application. For your information, the observed<br />

version of Squid is %L.\n\nVersions of Squid earlier than 3.1.8 / 3.2.0.2 are potentially<br />

affected by a denial of service vulnerability caused by an internal error in its string<br />

handling. A remote attacker, exploiting this flaw, could crash the affected service.<br />

Solution: Upgrade to Squid version 3.1.8, 3.2.0.2, or later.<br />

CVE-2010-3072<br />

Samba 3.x < 3.5.5 / 3.4.9 / 3.3.14 sid_parse Buffer Overflow<br />

<strong>PVS</strong> ID: 5663 FAMILY: Samba RISK: HIGH NESSUS ID:49228<br />

Description: Synopsis :\n\nThe remote Samba server is affected by a buffer overflow<br />

vulnerability.\n\nFor your information, the observed version of Samba is<br />

%L.\n\nAccording to its banner, the version of Samba 3.x running on the remote host is<br />

earlier than 3.5.5. The 'sid_parse()' and related 'dom_sid_parse()' functions in such versions<br />

fail to correctly check their input lengths when reading a binary representation of a<br />

Windows SID (<strong>Security</strong> ID). An attacker who is able to get a connection to a file share,<br />

either authenticated or via a guest connection, can leverage this issue to launch a stack<br />

buffer overflow attack against the affected smbd service and possibly execute arbitrary<br />

code.<br />

Solution: Either apply one of the patches referenced in the project's advisory or upgrade to 3.5.5 /<br />

3.4.9 / 3.3.14 or later.<br />

CVE-2010-3069<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Google Chrome < 6.0.472.59 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5664 FAMILY: Web Clients RISK: HIGH NESSUS ID:49237<br />

Family Internet Services 1527


Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Google Chrome is<br />

%L.\n\nVersions of Google chrome earlier than 6.0.472.59 are potentially affected by<br />

multiple vulnerabilities :\n\n - A use-after-free error exists when using document APIs<br />

during parse. (Bug 50250)\n\n - A use-after-free error exists in SVG styles. (Bug<br />

50712)\n\n - A use-after-free error exists with nested SVG elements. (Bug 51252)\n\n - A<br />

possible browser assert exists in cursor handling. (Bug 51709)\n\n - A race condition exists<br />

in console handling. (Bug 51919)\n\n - An unlikely browser crash exists in pop-up<br />

blocking. (Bug 53176)\n\n - Bug 45400 is incorrectly fixed on Mac. (Bug 53361)\n\n - A<br />

memory corruption error exists in Geolocation. (Bug 53394)\n\n - A memory corruption<br />

issue exists in Khmer handling. Note that this only affects Chrome for Linux. (Bug<br />

53930)\n\n - An error exists because Chrome fails to prompt for extension history access.<br />

(Bug 54006)<br />

Solution: Upgrade to Google Chrome 6.0.472.59 or later.<br />

CVE-2010-3417<br />

QuickTime < 7.6.8 Multiple Vulnerabilities (Windows)<br />

<strong>PVS</strong> ID: 5665 FAMILY: Web Clients RISK: HIGH NESSUS ID:49260<br />

Description: Synopsis :\n\nThe remote host contains an application that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of QuickTime is %L.\n\nVersions<br />

of QuickTime earlier than 7.6.8 are potentially affected by multiple vulnerabilities :\n\nAn<br />

input validation issue in the QTPlugin.ocx ActiveX control could allow an attacker to force<br />

the application to jump to a location in memory controlled by the attacker through the<br />

optional '_Marshaled_pUnk' parameter and in turn to execute remote code under the<br />

context of the user running the web browser. (CVE-2010-1818)\n\n - QuickTime Picture<br />

Viewer uses a fixed path to look for specific files or libraries, such as 'cfnetwork.dll' and<br />

'corefoundation.dll', and this path includes directories that may not be trusted or under user<br />

control. If an attacker places a maliciously crafted DLL in the same directory as an image<br />

file, opening the image file with QuickTime Picture Viewer will cause the malicious DLL<br />

to be loaded. (CVE-2010-1819)<br />

Solution: Upgrade to QuickTime 7.6.8 or later.<br />

CVE-2010-1819<br />

Squid 3.1.6 DNS Replay Denial of Service<br />

<strong>PVS</strong> ID: 5666 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:48433<br />

Description: Synopsis :\n\nThe remote proxy server is vulnerable to a denial-of-service attack.\n\nFor<br />

your information, the observed version of Squid is %L.\n\nSquid 3.1.6 is potentially<br />

affected by a denial of service vulnerability that is caused by an assertion failure when<br />

contacting IPv4-only DNS resolvers.<br />

Solution: Upgrade to Squid 3.1.7 or later.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1528


CVE-2010-2951<br />

HP System Management Homepage < 6.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5667 FAMILY: Web Servers RISK: HIGH NESSUS ID:49272<br />

Description: Synopsis :\n\nThe remote web server is vulnerable to multiple attack vectors.\n\nThe<br />

remote host is running HP System Management Homepage (HPSMH), a web-based<br />

interface for managing individual ProLiant and Integrity servers. For your information, the<br />

observed version of HP System Management Homepage is %L.\n\nVersions of HP System<br />

Management Homepage earlier than 6.2 are potentially affected by the following<br />

vulnerabilities :\n\n - Session renegotiations are not handled properly, which could be<br />

exploited to insert arbitrary plaintext in a man-in-the-middle attack. (CVE-2009-3555)\n\n -<br />

An attacker may be able to upload files using a POST request with 'multipart/form-data'<br />

content even if the target script doesn't actually support file uploads per se.<br />

(CVE-2009-4017)\n\n - PHP's 'proc_open' function can be abused to bypass<br />

'safe_mode_allowed_env_vars' and 'safe_mode_protected_env_vars' directives.<br />

(CVE-2009-4018)\n\n - PHP does not properly protect session data as relates to interrupt<br />

corruption of '$_SESSION' and the 'session.save_path' directive. (CVE-2009-4143)\n\n -<br />

An information disclosure vulnerability exists in Apache's mod_proxy_ajp,<br />

mod_reqtimeout, and mod_proxy_http relating to timeout conditions. Note that this issue<br />

only affects HPSMH on Windows. (CVE-2010-2068)\n\n - An as-yet unspecified<br />

information disclosure vulnerability may allow an authorized user to gain access to<br />

sensitive information, which in turn could be leveraged to obtain root access on Linux<br />

installs of HPSMH. (CVE-2010-3009)\n\n - There is an as-yet unspecified XSS issue.<br />

(CVE-2010-3011)\n\n - There is an as-yet unspecified HTTP response splitting issue.<br />

(CVE-2010-3011)\nIAVA Reference : 2011-A-0107\nIAVB Reference :<br />

2012-B-0038\nSTIG Finding Severity : Category I<br />

Solution: Upgrade to HP System Management Homepage 6.2.0 or later.<br />

CVE-2010-3284<br />

Nagios XI < 2009R1.3B Multiple Unspecified XSS<br />

<strong>PVS</strong> ID: 5668 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:49775<br />

Description: Synopsis :\n\nThe remote web server is hosting a web application that is vulnerable to<br />

multiple cross-site scripting attacks.\n\nFor your information, the observed version of<br />

Nagios XI installed on the remote host is %L.\n\nVersions of Nagios XI earlier than<br />

2009R1.3B are potentially affected by multiple unspecified cross-site scripting<br />

vulnerabilities in the status and dashboard pages.<br />

Solution: Upgrade to Nagios 2009R1.3B or later.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Google Chrome < 6.0.472.62 Multiple Vulnerabilities<br />

Family Internet Services 1529


<strong>PVS</strong> ID: 5669 FAMILY: Web Clients RISK: HIGH NESSUS ID:49285<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Google Chrome is<br />

%L.\n\nVersions of Google chrome earlier than 6.0.472.62 are potentially affected by<br />

multiple vulnerabilities :\n\n - It is possible to execute arbitrary code via the Adobe Flash<br />

Player plugin. (CVE-2010-2884)\n\n - There is a bad cast wit malformed SVGs.<br />

(55114)\n\n - The buffer is mismanaged in the SDPY protocol. (55119)\n\n - A cross-origin<br />

property pollution issue exists. (55350)<br />

Solution: Upgrade to Google Chrome 6.0.472.62 or later.<br />

CVE-2010-3730<br />

Flash Player Unspecified Code Execution (APSB10-22)<br />

<strong>PVS</strong> ID: 5670 FAMILY: Web Clients RISK: HIGH NESSUS ID:49307<br />

Description: Synopsis :\n\nThe remote host contains a browser plug-in that is vulnerable to a code<br />

execution attack.\n\nThe remote host has Adobe Flash Player installed. For your<br />

information, the observed version of Adobe Flash Player is %L.\nVersions of Flash Player<br />

9.x earlier than 9.0.283 and 10.x earlier than 10.1.85.3 are potentially affected by an<br />

unspecified code execution vulnerability.<br />

Solution: Upgrade to Flash Player 10.1.85.3 / 9.0.283 or later.<br />

CVE-2010-2884<br />

Syncrify < 2.1 Build 420 Multiple <strong>Security</strong> Bypass Vulnerabilities<br />

<strong>PVS</strong> ID: 5671 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:49659<br />

Description: Synopsis :\n\nThe remote web server is hosting a web application that is affected by<br />

multiple security bypass vulnerabilities.\n\nThe remote web server is hosting Syncrify, a<br />

web-based incremental backup application.\n\nFor your information, the observed version<br />

of Syncrify is %L.\n\nVersions of Syncrify earlier than 2.1 Build 420 are potentially<br />

affected by multiple security bypass vulnerabilities :\n\n - The application fails to restrict<br />

access to the password management page and allows users to change the administrator's<br />

password by directly accessing that page.\n\n - It is possible for users to browse and<br />

download unauthorized files by accessing them directly.<br />

Solution: Upgrade to Syncrify 2.1 Build 420 or later.<br />

CVE Not available<br />

ClamAV < 0.96.3 Denial-of-Service Vulnerability<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5672 FAMILY: Web Clients RISK: HIGH NESSUS ID:49712<br />

Family Internet Services 1530


Description: Synopsis :\n\nThe remote host is running an anti-virus application that is vulnerable to<br />

multiple attack vectors.\n\nThe reported version of ClamAV on the remote host is %L.<br />

Versions of ClamAV earlier than 0.96. are potentially affected by a denial-of-service<br />

vulnerability because the application fails to properly handle specially crafted PDF files.<br />

An attacker, exploiting this flaw, can crash the affected service.\nIAVB Reference :<br />

2010-B-0083\nSTIG Finding Severity : Category II<br />

Solution: Upgrade to ClamAV 0.96.3 or later.<br />

CVE-2010-3434<br />

BIND 9.7 < 9.7.2 P2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5673 FAMILY: DNS Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:49777<br />

Description: Synopsis :\n\nThe remote DNS server is vulnerable to multiple attack vectors.\n\nThe<br />

remote host is running BIND, and open source name server. For your information, the<br />

observed version of BIND is %L.\n\nVersions of BIND 9.7 earlier than 9.7.2 P2 are<br />

potentially affected by multiple vulnerabilities :\n\n - If BIND, acting as a DNSSEC<br />

validating server, has two or more trust anchors configured in named.conf for the same<br />

zone and the response for a record in that zone from the authoritative server includes a bad<br />

signature, the validating server will crash while trying to validate the query.\n\n - A flaw<br />

exists that allows access to a cache via recursion even if the ACL disallows it.<br />

Solution: Upgrade to BIND 9.7.1 P2 or later.<br />

CVE-2010-3762<br />

Web Server Parameters (POST)<br />

<strong>PVS</strong> ID: 5674 FAMILY: Web Servers RISK: NONE NESSUS ID:Not Available<br />

Description: The following parameters are used by the web application<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Web Server Parameters (GET)<br />

<strong>PVS</strong> ID: 5675 FAMILY: Web Servers RISK: NONE NESSUS ID:Not Available<br />

Description: The following parameters are used by the web application<br />

Solution: N/A<br />

realtimeonly<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1531


CVE Not available<br />

Mantis 1.2.x < 1.2.3 Cross-Site Scripting Vulnerability<br />

<strong>PVS</strong> ID: 5676 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server is hosting a web application that is vulnerable to<br />

multiple cross-site scripting attacks.\n\nThe remote web server is hosting Mantis, an open<br />

source bugtracking application written in PHP. For your information, the observed version<br />

of Mantis is %L.\n\nVersions of Mantis 1.2.x prior to 1.2.3 are potentially affected by<br />

multiple cross-site scripting vulnerabilities :\n\n - A cross-site scripting issue exists when<br />

viewing the Summary page. (Bug 0012309)\n\n - A cross-site scripting issue exists in<br />

print_all_bug_page_word.php when printing project and category names. (Bug<br />

0012238)\n\n - Multiple cross-site scripting issues exist which relate to custom field<br />

enumeration values. (Bug 0012232)\n\n - A cross-site scripting vulnerability exists when<br />

deleting maliciously named categories. (Bug 012230)\n\n - A cross-site scripting issue<br />

exists in NuSOAP WSDL. (Bug 0012312)<br />

Solution: Upgrade to Mantis 1.2.3 or later.<br />

CVE-2010-3070<br />

MySQL Community Server 5.1 < 5.1.51 Multiple Denial of Service Vulnerabilities<br />

<strong>PVS</strong> ID: 5677 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:49711<br />

Description: Synopsis :\n\nThe remote database server is vulnerable to multiple attack vectors.\n\nFor<br />

your information, the observed version of MySQL Community Server is %L.\n\nVersions<br />

of MySQL Community Server 5.1 earlier than 5.1.51 are potentially affected by multiple<br />

vulnerabilities :\n\n - A privilege escalation vulnerability exists when using<br />

statement-based replication. Version specific comments used on a master server with a<br />

lesser release version than its slave can allow the MySQL privilege system on the slave<br />

server to be subverted. (49124)\n\n - The improper handling of type errors during argument<br />

evaluation in extreme-value functions, e.g., 'LEAST()' or 'GREATEST()' caused server<br />

crashes. (55826)\n\n - The creation of derived tables needing a temporary grouping table<br />

caused server crashes. (55568)\n\n - The re-evaluation of a user-variable assignment<br />

expression after the creation of a temporary table caused server crashes. (55564)\n\n - The<br />

pre-evaluation of 'LIKE' predicates while preparing a view caused server crashes.<br />

(54568)\n\n - The use of 'GROUP_CONCAT()' and 'WITH ROLLUP' caused server<br />

crashes. (54476)\n\n - The use of an intermediate temporary table and queries containing<br />

calls to 'GREATEST()' or 'LEAST()', having a list of both numeric and 'LONGBLOB'<br />

arguments, caused server crashes. (54461)\n\n - The use of nested joins in prepared<br />

statements or stored procedures could result in infinite loops. (53544)<br />

Solution: Upgrade to MySQL Community Server 5.1.51 or later.<br />

CVE-2010-3840<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1532


Opera < 10.63 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5678 FAMILY: Web Clients RISK: HIGH NESSUS ID:49964<br />

Description: Synopsis :\n\nThe remote host has a web browser that is vulnerable to multiple attack<br />

vectors.\n\nThe remote host is running the Opera web browser. For your information, the<br />

observed version of Opera is %L.\n\nVersions of Opera earlier than 10.63 are potentially<br />

affected by multiple vulnerabilities :\n\n - It is possible to bypass cross-domain checks, and<br />

allow partial data theft by using CSS. (971)\n\n - It is possible to spoof the page address by<br />

modifying the size of the browser window. (972)\n\n - Carefully timed reloads and<br />

redirects could allow spoofing and cross-site scripting attacks. Using this XSS vector it<br />

may be possible to modify Opera's configuration, which could allow arbitrary code<br />

execution on the remote system. (973)\n\n - It is possible to intercept private video streams.<br />

(974)\n\n - An error while displaying invalid URL's could allow cross-site scripting attacks.<br />

(976)<br />

Solution: Upgrade to Opera 10.63 or later.<br />

CVE-2010-4050<br />

iDisk User Enumeration<br />

<strong>PVS</strong> ID: 5679 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is running an Apple application which stores and synchronizes files<br />

online via the MobileMe web application. A part of the MobileMe suite includes 'iDisk', a<br />

virtual hard drive which is used to store data files from multiple Apple devices in a single<br />

location. Users accessing MobileMe pass their user information in plain text across the<br />

network. The following UserID and "realm" were logged by the <strong>PVS</strong>: \n %L<br />

Solution: Ensure that this application is in alignment with existing policies and guidelines<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Google Chrome < 7.0.517.41 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5680 FAMILY: Web Clients RISK: HIGH NESSUS ID:50049<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Google Chrome is<br />

%L.\n\nVersions of Google chrome earlier than 7.0.517.41 are potentially affected by<br />

multiple vulnerabilities :\n\n - It is possible to spam profiles via autofill / autocomplete.<br />

(48225, 51727)\n\n - An unspecified crash exists relating to forms. (48857)\n\n - A browser<br />

crash exists relating to form autofill. (50428)\n\n - It is possible to spoof the URl on page<br />

unload. (51680)\n\n - It is possible to bypass the pop-up blocker. (53002)\n\n - A crash on<br />

shutdown exists relating got Web Sockets. (53985)\n\n - A possible memory corruption<br />

exists with animated GIF files. (54500)\n\n - Stale elements exist in the element map.<br />

(56451)<br />

Solution: Upgrade to Google Chrome 7.0.517.41 or later.<br />

Family Internet Services 1533


CVE-2010-4042<br />

Mozilla Firefox 3.5.x < 3.5.14 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5681 FAMILY: Web Clients RISK: HIGH NESSUS ID:50084<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Firefox is<br />

:%L.\n\nVersions of Firefox 3.5.x earlier than 3.5.14 are potentially affected by multiple<br />

vulnerabilities :\n\n - Multiple memory safety bugs could lead to memory corruption,<br />

potentially resulting in arbitrary code execution. (MFSA 2010-64)\n\n - By passing an<br />

excessively long string to 'document.write' it may be possible to trigger a buffer overflow<br />

condition resulting in arbitrary code execution on the remote system. (MFSA 2010-65)\n\n<br />

- A use-after-free error in nsBarProp could allow arbitrary code execution on the remote<br />

system. (MFSA 2010-66)\n\n - A dangling pointer vulnerability in LookupGetterOrSetter<br />

could allow arbitrary code execution. (MFSA 2010-67)\n\n - The Gopher parser is affected<br />

by a cross-site scripting vulnerability. (MFSA 2010-68)\n\n - It is possible to steal<br />

information from a site in a different domain using modal calls. (MFSA 2010-69)\n\n - It is<br />

possible to establish a valid SSL connection to a remote host, provided the SSL certificate<br />

was created with a common name containing a wild card followed by the partial IP address<br />

of the remote host. (MFSA 2010-70)\n\n - A function used to load external libraries on the<br />

Windows platform could allow loading of unsafe DLL's thus allowing binary planting<br />

attack. (MFSA 2010-71)\n\n - The SSL implementation allows servers to use<br />

Diffie-Hellman mode (DHE) with a very short key length. Such key lengths could be easily<br />

breakable with modern hardware. (MFSA 2010-72)<br />

Solution: Upgrade to Firefox 3.5.14 or later.<br />

CVE-2010-3183<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Firefox 3.6.x < 3.6.11 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5682 FAMILY: Web Clients RISK: HIGH NESSUS ID:50085<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Firefox is<br />

:%L.\n\nVersions of Firefox 3.6.x earlier than 3.6.11 are potentially affected by multiple<br />

vulnerabilities :\n\n - Multiple memory safety bugs could lead to memory corruption,<br />

potentially resulting in arbitrary code execution. (MFSA 2010-64)\n\n - By passing an<br />

excessively long string to 'document.write' it may be possible to trigger a buffer overflow<br />

condition resulting in arbitrary code execution on the remote system. (MFSA 2010-65)\n\n<br />

- A use-after-free error in nsBarProp could allow arbitrary code execution on the remote<br />

system. (MFSA 2010-66)\n\n - A dangling pointer vulnerability in LookupGetterOrSetter<br />

could allow arbitrary code execution. (MFSA 2010-67)\n\n - The Gopher parser is affected<br />

by a cross-site scripting vulnerability. (MFSA 2010-68)\n\n - It is possible to steal<br />

information from a site in a different domain using modal calls. (MFSA 2010-69)\n\n - It is<br />

possible to establish a valid SSL connection to a remote host, provided the SSL certificate<br />

was created with a common name containing a wild card followed by the partial IP address<br />

of the remote host. (MFSA 2010-70)\n\n - A function used to load external libraries on the<br />

Windows platform could allow loading of unsafe DLL's thus allowing binary planting<br />

attack. (MFSA 2010-71)\n\n - The SSL implementation allows servers to use<br />

Family Internet Services 1534


Diffie-Hellman mode (DHE) with a very short key length. Such key lengths could be easily<br />

breakable with modern hardware. (MFSA 2010-72)<br />

Solution: Upgrade to Firefox 3.6.11 or later.<br />

CVE-2010-3183<br />

Mozilla Thunderbird 3.0.x < 3.0.9 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5683 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:50086<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Thunderbird is<br />

:%L.\n\nVersions of Thunderbird 3.0.x earlier than 3.0.9 are potentially affected by<br />

multiple vulnerabilities :\n\n - Multiple memory safety bugs could lead to memory<br />

corruption, potentially resulting in arbitrary code execution. (MFSA 2010-64)\n\n - By<br />

passing an excessively long string to 'document.write' it may be possible to trigger a buffer<br />

overflow condition resulting in arbitrary code execution on the remote system. (MFSA<br />

2010-65)\n\n - A use-after-free error in nsBarProp could allow arbitrary code execution on<br />

the remote system. (MFSA 2010-66)\n\n - A dangling pointer vulnerability in<br />

LookupGetterOrSetter could allow arbitrary code execution. (MFSA 2010-67)\n\n - It is<br />

possible to steal information from a site in a different domain using modal calls. (MFSA<br />

2010-69)\n\n - It is possible to establish a valid SSL connection to a remote host, provided<br />

the SSL certificate was created with a common name containing a wild card followed by<br />

the partial IP address of the remote host. (MFSA 2010-70)\n\n - A function used to load<br />

external libraries on the Windows platform could allow loading of unsafe DLL's thus<br />

allowing binary planting attack. (MFSA 2010-71)\n\n - The SSL implementation allows<br />

servers to use Diffie-Hellman mode (DHE) with a very short key length. Such key lengths<br />

could be easily breakable with modern hardware. (MFSA 2010-72)<br />

Solution: Upgrade to Thunderbird 3.0.9 or later.<br />

CVE-2010-3183<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Thunderbird 3.1.x < 3.1.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5684 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:50087<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Thunderbird is<br />

:%L.\n\nVersions of Thunderbird 3.1.x earlier than 3.1.5 are potentially affected by<br />

multiple vulnerabilities :\n\n - Multiple memory safety bugs could lead to memory<br />

corruption, potentially resulting in arbitrary code execution. (MFSA 2010-64)\n\n - By<br />

passing an excessively long string to 'document.write' it may be possible to trigger a buffer<br />

overflow condition resulting in arbitrary code execution on the remote system. (MFSA<br />

2010-65)\n\n - A use-after-free error in nsBarProp could allow arbitrary code execution on<br />

the remote system. (MFSA 2010-66)\n\n - A dangling pointer vulnerability in<br />

LookupGetterOrSetter could allow arbitrary code execution. (MFSA 2010-67)\n\n - It is<br />

possible to steal information from a site in a different domain using modal calls. (MFSA<br />

2010-69)\n\n - It is possible to establish a valid SSL connection to a remote host, provided<br />

Family Internet Services 1535


the SSL certificate was created with a common name containing a wild card followed by<br />

the partial IP address of the remote host. (MFSA 2010-70)\n\n - A function used to load<br />

external libraries on the Windows platform could allow loading of unsafe DLL's thus<br />

allowing binary planting attack. (MFSA 2010-71)\n\n - The SSL implementation allows<br />

servers to use Diffie-Hellman mode (DHE) with a very short key length. Such key lengths<br />

could be easily breakable with modern hardware. (MFSA 2010-72)<br />

Solution: Upgrade to Thunderbird 3.1.5 or later.<br />

CVE-2010-3183<br />

Mozilla SeaMonkey 2.0.x < 2.0.9 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5685 FAMILY: Web Clients RISK: HIGH NESSUS ID:50088<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of SeaMonkey is<br />

:%L.\n\nVersions of SeaMonkey 2.0.x earlier than 2.0.9 are potentially affected by multiple<br />

vulnerabilities :\n\n - Multiple memory safety bugs could lead to memory corruption,<br />

potentially resulting in arbitrary code execution. (MFSA 2010-64)\n\n - By passing an<br />

excessively long string to 'document.write' it may be possible to trigger a buffer overflow<br />

condition resulting in arbitrary code execution on the remote system. (MFSA 2010-65)\n\n<br />

- A use-after-free error in nsBarProp could allow arbitrary code execution on the remote<br />

system. (MFSA 2010-66)\n\n - A dangling pointer vulnerability in LookupGetterOrSetter<br />

could allow arbitrary code execution. (MFSA 2010-67)\n\n - The Gopher parser is affected<br />

by a cross-site scripting vulnerability. (MFSA 2010-68)\n\n - It is possible to steal<br />

information from a site in a different domain using modal calls. (MFSA 2010-69)\n\n - It is<br />

possible to establish a valid SSL connection to a remote host, provided the SSL certificate<br />

was created with a common name containing a wild card followed by the partial IP address<br />

of the remote host. (MFSA 2010-70)\n\n - A function used to load external libraries on the<br />

Windows platform could allow loading of unsafe DLL's thus allowing binary planting<br />

attack. (MFSA 2010-71)\n\n - The SSL implementation allows servers to use<br />

Diffie-Hellman mode (DHE) with a very short key length. Such key lengths could be easily<br />

breakable with modern hardware. (MFSA 2010-72)<br />

Solution: Upgrade to SeaMonkey 2.0.9 or later.<br />

CVE-2010-3183<br />

HTTP File Upload Detection<br />

<strong>PVS</strong> ID: 5686 FAMILY: Data Leakage RISK: NONE NESSUS ID:Not Available<br />

Description: The following file was just uploaded via HTTP: \n %L<br />

realtime<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1536


XMPP Client Detection<br />

<strong>PVS</strong> ID: 5687 FAMILY: Generic RISK: NONE NESSUS ID:Not Available<br />

Description: The following host is an XMPP client. The client application which is using XMPP is:\n<br />

%L<br />

Solution: N/A<br />

LDAP Server Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 5688 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is an LDAP server<br />

Solution: Ensure that this server is authorized with respect to Corporate standards and policies.<br />

CVE Not available<br />

Winamp < 5.59 Build 3033 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5689 FAMILY: Generic RISK: HIGH NESSUS ID:50379<br />

Description: Synopsis :\n\nThe remote host has a media player installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running Winamp, a media player for Windows. For<br />

your information, the observed version of Winamp is %L.\n\nVersions of Winamp earlier<br />

than 5.59 build 3033 are potentially affected by multiple vulnerabilities :\n\n - Winamp<br />

loads libraries in an insecure manner. (CVE-2010-3137)\n\n - An integer overflow<br />

vulnerability exists in the 'in_mkv.dll' plugin when parsing MKV content.\n\n - A<br />

heap-based buffer overflow vulnerability exists in the 'in_midi.dll' plugin when parsing<br />

MIDI content.\n\n - A stack-based buffer overflow vulnerability exists in the 'in_mod.dll'<br />

plugin when parsing Multitracker Module files.\n\n - A heap-based buffer overflow<br />

vulnerability exists in the 'in_nsv.dll' plugin when parsing NSV content.\n\n - A heap-based<br />

buffer overflow vulnerability exists when parsing VP6 video content.<br />

Solution: Upgrade to Winamp 5.59 build 3033 or later.<br />

CVE-2010-3137<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Firefox 3.5.x < 3.5.15 Buffer Overflow Vulnerability<br />

<strong>PVS</strong> ID: 5690 FAMILY: Web Clients RISK: HIGH NESSUS ID:50382<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to a buffer<br />

overflow attack.\n\nFor your information, the observed version of Firefox is<br />

:%L.\n\nVersions of Firefox 3.5.x earlier than 3.5.15 are potentially affected by a buffer<br />

overflow vulnerability when mixing 'document.write()' and DOM insertions. (MFSA<br />

2010-73)<br />

Family Internet Services 1537


Solution: Upgrade to Firefox 3.5.15 or later.<br />

CVE-2010-3765<br />

Mozilla Firefox 3.6.x < 3.6.12 Buffer Overflow Vulnerability<br />

<strong>PVS</strong> ID: 5691 FAMILY: Web Clients RISK: HIGH NESSUS ID:50383<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to a buffer<br />

overflow attack.\n\nFor your information, the observed version of Firefox is<br />

:%L.\n\nVersions of Firefox 3.6.x earlier than 3.6.12 are potentially affected by a buffer<br />

overflow vulnerability when mixing 'document.write()' and DOM insertions. (MFSA<br />

2010-73)<br />

Solution: Upgrade to Firefox 3.6.12 or later.<br />

CVE-2010-3765<br />

Mozilla Thunderbird 3.0.x < 3.0.10 Buffer Overflow Vulnerability<br />

<strong>PVS</strong> ID: 5692 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:50384<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to a buffer<br />

overflow attack.\n\nFor your information, the observed version of Thunderbird is<br />

:%L.\n\nVersions of Thunderbird 3.0.x earlier than 3.0.10 are potentially affected by a<br />

buffer overflow vulnerability when mixing 'document.write()' and DOM insertions. (MFSA<br />

2010-73)<br />

Solution: Upgrade to Mozilla Thunderbird 3.0.10 or later.<br />

CVE-2010-3765<br />

Mozilla Thunderbird 3.1.x < 3.1.6 Buffer Overflow Vulnerability<br />

<strong>PVS</strong> ID: 5693 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:50385<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to a buffer<br />

overflow attack.\n\nFor your information, the observed version of Thunderbird is<br />

:%L.\n\nVersions of Thunderbird 3.1.x earlier than 3.1.6 are potentially affected by a buffer<br />

overflow vulnerability when mixing 'document.write()' and DOM insertions. (MFSA<br />

2010-73)<br />

Solution: Upgrade to Thunderbird 3.1.6 or later.<br />

CVE-2010-3765<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla SeaMonkey 2.0.x < 2.0.10 Buffer Overflow Vulnerability<br />

<strong>PVS</strong> ID: 5694 FAMILY: Web Clients RISK: HIGH NESSUS ID:50386<br />

Family Internet Services 1538


Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to a buffer<br />

overflow attack.\n\nFor your information, the observed version of SeaMonkey is<br />

:%L.\n\nVersions of SeaMonkey 2.0.x earlier than 2.0.10 are potentially affected by a<br />

buffer overflow vulnerability when mixing 'document.write()' and DOM insertions. (MFSA<br />

2010-73)<br />

Solution: Upgrade to SeaMonkey 2.0.10 or later.<br />

CVE-2010-3765<br />

YouSendIt Client Detection<br />

<strong>PVS</strong> ID: 5695 FAMILY: Internet Services RISK: LOW NESSUS ID:Not Available<br />

Description: The remote client is utilizing the 'YouSendIt' service. YouSendIt allows users to send<br />

large attachments via email. YouSendIt is a web-based service. Given this, internal<br />

corporate users can use this service to bypass outbound mail scrutiny. The reported<br />

license and version number is : \n %L<br />

Solution: Ensure that such usage is in alignment with Corporate policies regarding remote access<br />

Web Client Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 5696 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host issued the following POST request : \n%L<br />

Solution: N/A<br />

Web Client Detection<br />

realtimeonly<br />

CVE Not available<br />

<strong>PVS</strong> ID: 5697 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Firesheep, an application used to sniff confidential data<br />

from an insecure network.<br />

Solution: Ensure that this software is authorized<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Google Chrome < 7.0.517.44 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5698 FAMILY: Web Clients RISK: HIGH NESSUS ID:50476<br />

Family Internet Services 1539


Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Google Chrome is<br />

%L.\n\nVersions of Google Chrome earlier than 7.0.517.44 are potentially affected by<br />

multiple vulnerabilities :\n\n - A use-after-free error exists in text editing. (51602)\n\n - A<br />

memory corruption error exists relating to enormous text area. (55257)\n\n - A bad cast<br />

exists with the SVG use element. (58657)\n\n - An invalid memory read exists in XPath<br />

handling. (58731)\n\n - A use-after-free error exists in text-control-selections. (58741)\n\n -<br />

Multiple integer overflows exists in font handling. (59320)\n\n - A memory corruption<br />

issue exists in libvpx. (60055)\n\n - A bad use of a destroyed frame object exists.<br />

(60238)\n\n - Multiple type confusions exists with event objects. (60327, 60769,<br />

61255)\n\n - An out-of-bounds array access exists in SVG handling. (60688)<br />

Solution: Upgrade to Google Chrome 7.0.517.44 or later.<br />

CVE-2010-4206<br />

Flash Player < 9.0.289 / 10.1.102.64 Multiple Vulnerabilities (APSB10-26)<br />

<strong>PVS</strong> ID: 5699 FAMILY: Web Clients RISK: HIGH NESSUS ID:50493<br />

Description: Synopsis :\n\nThe remote host contains a browser plug-in that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host has Adobe Flash Player installed. For your information,<br />

the observed version of Adobe Flash Player is %L.\nVersions of Flash Player 9.x earlier<br />

than 9.0.289 and 10.x earlier than 10.1.102.64 are potentially affected by multiple<br />

vulnerabilities :\n\n - A memory corruption vulnerability exists that could lead to code<br />

execution. Note that there are reports that this is being actively exploited in the wild.<br />

(CVE-2010-3654)\n\n - An input validation issue exists that could lead to a bypass of<br />

cross-domain policy file restrictions with certain server encodings. (CVE-2010-3636)\n\n -<br />

A memory corruption vulnerability exists in the ActiveX component.<br />

(CVE-2010-3637)\n\n - An unspecified information disclosure vulnerability exists. Note<br />

that this issue only affects Flash Player on Safari. (CVE-2010-3638)\n\n - An unspecified<br />

issue exists which could lead to a denial-of-service or potentially arbitrary code execution.<br />

(CVE-2010-3639)\n\n - Multiple memory corruption issues exists that could lead to<br />

arbitrary code execution. (CVE-2010-3640, CVE-2010-3641, CVE-2010-3642,<br />

CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647,<br />

CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, CVE-2010-3652)\n\n - A<br />

library-loading vulnerability could lead to code execution. (CVE-2010-3639)<br />

Solution: Upgrade to Flash Player 10.1.102.64 / 9.0.289 or later.<br />

CVE-2010-3976<br />

Bugzilla < 3.2.9 / 3.4.9 / 3.6.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5700 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:50599<br />

Description: Synopsis :\n\nThe remote web server is hosting an application that is vulnerable to multiple<br />

attack vectors.\n\nThe remote web server is hosting Bugzilla, a web-based bug tracking<br />

application. For your information, the observed version of Bugzilla is %L.\n\nVersions of<br />

Family Internet Services 1540


Bugzilla 3.2.x earlier than 3.2.9, 3.4.x earlier than 3.4.9, and 3.6.x earlier than 3.6.3 are<br />

potentially affected by multiple vulnerabilities :\n\n - By inserting a certain string into a<br />

URL, it is possible to inject both headers and content to any browser that supports "Server<br />

Push". (CVE-2010-3172)\n\n - The Charts system generates graphs with predictable names<br />

into the 'graphs/' directory, which can also be browsed to see its contents.<br />

(CVE-2010-3764)\n\n - YUI 2.8.1 is vulnerable to a cross-site scripting vulnerability in<br />

certain .swf files.<br />

Solution: Upgrade to Bugzilla 3.2.9, 3.4.9, 3.6.3 or later.<br />

CVE-2010-3764<br />

Microsoft Executable in Transit Detection<br />

<strong>PVS</strong> ID: 5701 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may be compromised\n\nThis service appears to send a<br />

Microsoft Windows executable when a connection to it is established. This may be<br />

evidence of some malware which are known to propagate in this manner<br />

realtime<br />

Solution: Check the host and disinfect / reinstall it if necessary.<br />

CVE Not available<br />

SmartFTP Directory Traversal Vulnerability<br />

<strong>PVS</strong> ID: 5702 FAMILY: FTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has a FTP client installed that is vulnerable to a directory<br />

traversal attack\n\nThe remote host is running SmartFTP, a FTP client for Windows. For<br />

your information, the observed version of SmartFTP is %L\n\nVersions of SmartFTP<br />

earlier than 4.0.1124 are potentially affected by a directory traversal vulnerability. An<br />

attacker, exploiting this flaw, could trick a user into downloading a malicious file into a<br />

user's Startup folder.<br />

Solution: Upgrade to SmartFTP 4.0.1124 or later.<br />

CVE-2010-3099<br />

SmartFTP filename Unspecified Vulnerability<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5703 FAMILY: FTP Clients RISK: HIGH NESSUS ID:50575<br />

Description: Synopsis :\n\nThe remote host has a FTP client installed that is affected by an unspecified<br />

vulnerability.\n\nThe remote host is running SmartFTP, a FTP client for Windows. For<br />

your information, the observed version of SmartFTP is %L\n\nVersions of SmartFTP<br />

earlier than 4.0.1142 are potentially affected by an unspecified vulnerability relating to<br />

filenames.<br />

Family Internet Services 1541


Solution: Upgrade to SmartFTP 4.0.1142 or later.<br />

CVE Not available<br />

Adobe Flash Media server < 3.0.7 / 3.5.5 / 4.0.1 Multiple Vulnerabilities (APSB10-27)<br />

<strong>PVS</strong> ID: 5704 FAMILY: Web Servers RISK: HIGH NESSUS ID:50562<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Adobe Flash Media Server. For your information, the observed version of Adobe<br />

Flash Media Server is %L.\n\nVersions of Adobe Flash Media Server earlier than 3.0.7,<br />

3.5.5, or 4.0.1 are potentially affected by multiple vulnerabilities :\n\n - The server is<br />

vulnerable to a denial of service attack due to an unspecified memory leak error.<br />

(CVE-2010-3633)\n\n - The server is vulnerable to a denial of service attack due to an<br />

unspecified error in the server's 'edge process'. (CVE-2010-3634)\n\n - An unspecified error<br />

exists which can allow an attacker to cause a segmentation fault and may lead to arbitrary<br />

code execution. (CVE-2010-3635)<br />

Solution: Upgrade to Flash Media Server 3.0.7, 3.5.5, 4.0.1, or later.<br />

CVE-2010-3635<br />

Mac OS X 10.6 < 10.6.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5705 FAMILY: Generic RISK: HIGH NESSUS ID:50549<br />

Description: Synopsis :\n\nThe remote host is missing a Mac OS X update that fixes various security<br />

issues.\n\nFor your information, the observed version of Mac OS X is %L.\n\nVersions of<br />

Mac OS X 10.6 earlier than 10.6.5 are potentially affected by multiple vulnerabilities. Mac<br />

OS X 10.6.5 contains security fixes for the following products :\n\n - AFP Server\n\n -<br />

Apache mod_perl\n\n - Apache\n\n - AppKit\n\n - ATS\n\n - CF<strong>Network</strong>\n\n -<br />

CoreGraphics\n\n - CoreText\n\n - CUPS\n\n - Directory Services\n\n -<br />

diskdev_cmds\n\nDisk Images\n\n - Flash Player plug-in\n\n - gzip\n\n - Image Capture\n\n<br />

- ImageIO\n\n - Image RAW\n\n - Kernel\n\n - MySQL\n\n - neon\n\n - <strong>Network</strong>ing\n\n -<br />

OpenLDAP\n\n - OpenSSL\n\n - Password Server\n\n - PHP\n\n - Printing\n\n - python\n\n<br />

- QuickLook\n\n - QuickTime\n\n - Safari RSS\n\n - Time Machine\n\n - Wiki Server\n\n -<br />

X11\n\n - xar<br />

Solution: Upgrade to Mac OS X 10.6.5 or later.<br />

CVE-2010-3976<br />

Microsoft Executable in Transit Detection (Client)<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5706 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may be compromised\n\nThis client connected to a server<br />

and immediately downloaded an executable. This may be evidence of some malware which<br />

are known to propagate in this manner<br />

Family Internet Services 1542


ealtime<br />

Solution: Check the host and disinfect / reinstall it if necessary.<br />

CVE Not available<br />

MaxDB User Login Detection<br />

<strong>PVS</strong> ID: 5707 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The following user just logged into the SAP MaxDB database: %L<br />

Solution: N/A<br />

Ricoh Printer Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 5708 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Ricoh printer version %L<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Real <strong>Network</strong>s RealPlayer < 14.0.1.609 (Build 12.0.1.609) Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5709 FAMILY: Web Clients RISK: HIGH NESSUS ID:50612<br />

Description: Synopsis :\n\nThe remote host is running an application that is vulnerable to multiple attack<br />

vectors.\n\nThe remote host is running RealPlayer, a multi-media application. For your<br />

information, the observed build of RealPlayer is %L.\n\nRealPlayer builds earlier than<br />

12.0.1.609 are potentially affected by vulnerabilities :\n\n - An uncontrolled array index<br />

vulnerability exists in RealMedia media properties. (CVE-2010-4384)\n\n - A heap<br />

overflow vulnerability exists in multi-rate audio handling. (CVE-2010-4375)\n\n - A heap<br />

corruption vulnerability exists in the SMIL file format StreamTitle. (CVE-2010-2997)\n\n -<br />

An integer overflow exists in AAC MLLT Atom parsing. (CVE-2010-2999)\n\n - An<br />

integer overflow exists in AAC TIT2 Atom parsing. (CVE-2010-4397)\n\n - A heap<br />

overflow vulnerability exists in RTSP GIF parsing. (CVE-2010-4376)\n\n - A heap<br />

corruption vulnerability exist in the Cook Audio Codec. (CVE-2010-4377)\n\n - A heap<br />

corruption vulnerability exists in RV20 parsing. (CVE-2010-4378)\n\n - An error exists in<br />

the Cook codec initialization function. (CVE-2010-0121)\n\n - A memory access<br />

vulnerability exists in the Cook codec relating to an uninitialized number of channels.<br />

(CVE-2010-2579)\n\n - An unspecified vulnerability exists in AAC spectral data parsing.<br />

(CVE-2010-0125)\n\n - A heap overflow vulnerability exists in SIPR.<br />

(CVE-2010-4379)\n\n - A heap overflow exists in SOUND. (CVE-2010-4380)\n\n - A heap<br />

overflow exists in AAC. (CVE-2010-4381)\n\n - Multiple heap overflow vulnerabilities in<br />

RealMedia. (CVE-2010-4382)\n\n - A heap overflow vulnerability in RA5.<br />

(CVE-2010-4383)\n\n - An integer overflow in SIPR stream frame dimensions.<br />

(CVE-2010-4385)\n\n - RealMedia Memory heap corruption. (CVE-2010-4386)\n\n - A<br />

Family Internet Services 1543


memory corruption vulnerability in the RealAudio codec. (CVE-2010-4387)\n\n - A<br />

cross-zone scripting vulnerability in the ActiveX HandleAction Method.<br />

(CVE-2010-4396)\n\n - A cross domain scripting vulnerability is exploitable via local<br />

HTML files. (CVE-2010-4388)\n\n - A heap overflow vulnerability exists in the Cook<br />

codec initialization buffer index.(CVE-2010-4389)\n\n - A heap overflow vulnerability<br />

exists in the IVR file header. (CVE-2010-4390)\n\n - A heap overflow vulnerability exists<br />

in the RMX header. (CVE-2010-4391)\n\n - A heap overflow vulnerability exists in<br />

ImageMap. (CVE-2010-4392)\n\n - A heap overflow vulnerability exists in RealPix server<br />

header. (CVE-2010-4394)\n\n - A heap overflow exists in the Advanced audio coding.<br />

(CVE-2010-4395)<br />

Solution: Upgrade to RealPlayer 14.0.1.609 (Build 12.0.1.609) or later.<br />

CVE-2010-4397<br />

VLC Media Player < 1.1.5 Samba Share Access Module Code Execution<br />

<strong>PVS</strong> ID: 5710 FAMILY: Web Clients RISK: HIGH NESSUS ID:50650<br />

Description: Synopsis :\n\nThe remote host contains an application that allows arbitrary code<br />

execution.\n\nThe remote host contains VLC player, a multi-media application. For your<br />

information, the observed version of VLC is %L.\n\nVersions of VLC media player earlier<br />

than 1.1.5 are potentially affected by a code execution vulnerability. Due to an error in the<br />

declaration of code calling conventions, VLC suffers from a stack smashing attack in the<br />

Samba network share access module which could lead to arbitrary code execution. Note<br />

that this issue only affects VLC for Windows.<br />

Solution: Upgrade to VLC Media Player version 1.1.5 or later.<br />

CVE Not available<br />

Safari < 4.1.3 / 5.0.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5711 FAMILY: Web Clients RISK: HIGH NESSUS ID:50654<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Safari is %L.\n\nThe remote host<br />

has Safari installed. For your information, the observed version of Safari is<br />

%L.\n\nVersions of Safari earlier than 4.1.3 / 5.0.3 are potentially affected by several issues<br />

in the following component :\n\n - Safari\n\n - Webkit<br />

Solution: Upgrade to Safari 4.1.3, 5.0.3, or later.<br />

CVE-2010-3826<br />

Serv-U < 10.3.0.1 SFTP Server Authentication Bypass Vulnerability<br />

<strong>PVS</strong> ID: 5712 FAMILY: SSH<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:50659<br />

Family Internet Services 1544


Description: Synopsis :\n\nThe remote SFTP server is affected by an authentication bypass<br />

vulnerability.\n\nThe remote host is running Serv-U File Server, an FTP/SFTP Server for<br />

Windows. For your information, the observed version of Serv-U is %L.\n\nVersions of<br />

Serv-U earlier than 10.3.0.1 are potentially affected by a security bypass vulnerability in<br />

the SFTP module. By supplying a valid username and blank password, an attacker can gain<br />

unauthorized access to the affected application.<br />

Solution: Upgrade to Serv-U version 10.3.0.1 or later.<br />

CVE Not available<br />

FileCOPA < 6.01.01 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5713 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:50811<br />

Description: Synopsis :\n\nThe remote FTP server is vulnerable to a directory traversal attack.\n\nThe<br />

remote host is running FileCOPA, an FTP Server for Windows. For your information, the<br />

observed version of FileCOPA is %L.\n\nVersions of FileCOPA earlier than 6.01.01 are<br />

potentially affected by an unspecified directory traversal attack. An attacker, exploiting this<br />

flaw, could download arbitrary files subject to the privileges of the user running the<br />

affected application.<br />

Solution: Upgrade to FileCOPA 6.01.01 or later.<br />

CVE Not available<br />

FreeNAS < 0.7.2 Revision 5543 Command Execution Vulnerability<br />

<strong>PVS</strong> ID: 5714 FAMILY: CGI RISK: HIGH NESSUS ID:50510<br />

Description: Synopsis :\n\nA web application on the remote host is affected by an arbitrary command<br />

execution vulnerability.\n\nThe remote host is running FreeNAS, a network attached<br />

storage distribution based on FreeBSD. For your information, the observed version of<br />

FreeNAS on the remote running on the remote host is %L.\n\nVersions of FreeNAS earlier<br />

than 0.7.2 Revision 5543 are potentially affected by a remote command execution<br />

vulnerability because the application fails to restrict access to the 'exec_raw.php' script. A<br />

remote, unauthenticated attacker can pass arbitrary commands through the script's 'cmd'<br />

parameter and have them executed with root privileges.<br />

Solution: Upgrade to FreeNAS 0.7.2 Revision 5543 or later.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Apple iPhone/iPad iOS < 4.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5715 FAMILY: Mobile Devices RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1545


Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is an iPhone, iPod Touch, or iPad running iOS. For your information, the observed version<br />

of iOS is %L.\n\nVersions of iOS earlier than 4.2 are potentially affected by multiple<br />

vulnerabilities. iOS 4.2 contains security fixes for the following products :\n\n -<br />

Configuration Policies\n\n - CoreGraphics\n\n - FreeType\n\n - iAd Content Display\n\n -<br />

ImageIO\n\n - libxml\n\n - Mail\n\n - <strong>Network</strong>ing\n\n - OfficeImport\n\n - Photos\n\n -<br />

Safari\n\n - Telephony\n\n - WebKit\n\n - Multiple components<br />

Solution: Upgrade to iOS 4.2 or later.<br />

CVE-2010-4008<br />

phpMyAdmin 2.x < 2.11.11.1 / 3.x < 3.3.8.1 Cross-Site Scripting Vulnerability<br />

<strong>PVS</strong> ID: 5716 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a PHP application that is vulnerable to a<br />

cross-site scripting attack.\n\nFor your information, the observed version of phpMyAdmin<br />

is %L.\n\nVersions of phpMyAdmin earlier than 2.11.11.1 / 3.3.8.1 are potentially affected<br />

by a cross-site scripting vulnerability in the database search tool.<br />

Solution: Upgrade to phpMyAdmin 2.11.11.1, 3.3.8.1, or later.<br />

CVE-2010-4329<br />

Winamp < 5.60 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5717 FAMILY: Generic RISK: HIGH NESSUS ID:50846<br />

Description: Synopsis :\n\nThe remote host has a media player installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running Winamp, a media player for Windows. For<br />

your information, the observed version of Winamp is %L.\n\nVersions of Winamp earlier<br />

than 5.6 are potentially affected by multiple vulnerabilities :\n\n - An integer overflow<br />

vulnerability exists in the 'in_nsv.dll' plugin when parsing the table of contents of a<br />

NullSoft Video (NSV) stream or file. (CVE-2010-2586)\n\n - A heap-base buffer overflow<br />

vulnerability exists in the 'in_midi.dll' plugin when parsing MIDI content.<br />

(CVE-2010-4370)\n\n - A buffer overflow vulnerability exists in the 'in_mod' plugin and is<br />

related to the comment box. (CVE-2010-4371)\n\n - An integer overflow vulnerability<br />

exists in the 'in_nsv plugin due to improper memory allocation for Nullsoft Video (NSV)<br />

metadata. (CVE-2010-4372)\n\n - An error exists in the 'in_mp4' plugin which allows<br />

remote attackers to use either crafted metadata or album art in an MP4 file to cause a denial<br />

of service. (CVE-2010-4373)\n\n - An error exists in the 'in_mkv' plugin which allows<br />

remote attackers to use a crafted Matroska Video (MKV) file to cause a denial of service.<br />

(CVE-2010-4374)<br />

Solution: Upgrade to Winamp 5.60 or later.<br />

CVE-2010-4374<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1546


BIND 9.4-ESV < 9.4-ESV-R4 / 9.6.2 < 9.6.2-P3, 9.6-ESV < 9.6-ESV-R3 / 9.7.x < 9.7.2-P3 Multiple<br />

Vulnerabilities<br />

<strong>PVS</strong> ID: 5718 FAMILY: DNS Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:50976<br />

Description: Synopsis :\n\nThe remote DNS server is vulnerable to multiple attack vectors.\n\nThe<br />

remote host is running BIND, and open source name server. For your information, the<br />

observed version of BIND is %L.\n\nVersions of BIND 9.4-ESV < 9.4-ESV-R4, 9.6.2 <<br />

9.6.2-P3, 9.6-ESV < 9.6-ESV < R3, and 9.7.x < 9.7.2-P3 are potentially affected by<br />

multiple vulnerabilities :\n\n - Failure to clear existing RRSIG records when a NO DATA<br />

is negatively cached could cause subsequent lookups to crash named.<br />

(CVE-2010-3613)\n\n - Named, when acting as a DNSSEC validating resolver, could<br />

incorrectly mark zone data as insecure when the zone being queried is undergoing a key<br />

algorithm rollover. (CVE-2010-3614)\n\n - Using 'allow-query' in the 'options' or 'view'<br />

statements to restrict access to authorize zones has no effect. (CVE-2010-3615)<br />

Solution: Upgrade to BIND 9.4-ESV-R4, 9.6.2-P3, 9.6-ESV-R3, 9.7.2-P3, or later.<br />

CVE-2010-3615<br />

Google Chrome < 8.0.552.215 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5719 FAMILY: Web Clients RISK: HIGH NESSUS ID:50977<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Google Chrome is<br />

%L.\n\nVersions of Google Chrome earlier than 8.0.552.215 are potentially affected by<br />

multiple vulnerabilities :\n\n - It may be possible to bypass the pop-up blocker. (17655)\n\n<br />

- A cross-origin video theft vulnerability exists related to canvas. (55747) - An unspecified<br />

crash exists when handling HTML5 databases. (56237) - Excessive file dialogs could lead<br />

to a browser crash. (58329) - A use after free error exists in history handling. (59554) - It<br />

may be possible to crash the browser when performing http proxy authentication. (61701) -<br />

An out-of-bounds read regression exists in the WebM video support. (61653)\n\n - It may<br />

be possible to crash the browser due to bad indexing with malformed video. (62127)\n\n -<br />

A memory corruption issue exists relating t malicious privileged extension. (62168)\n\n - A<br />

use-after-free error exists in the mouse dragging event handling. (63051)\n\n - A double<br />

free error exists in XPath handling. (63444)<br />

Solution: Upgrade to Google Chrome 8.0.552.215 or later.<br />

CVE-2010-4494<br />

OpenSSL < 0.9.8q / 1.0.0c Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5720 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:51892<br />

Description: Synopsis :\n\nThe remote web server is vulnerable to multiple attack vectors.\n\nFor your<br />

information, the observed version of OpenSSL is %L.\n\nVersions of OpenSSL earlier than<br />

0.9.8q and 1.0.0c are potentially affected by multiple vulnerabilities :\n\n - It may be<br />

Family Internet Services 1547


possible to downgrade the ciphersuite to a weaker version by modifying the stored session<br />

cache cipher suite.\n\n - An error exists in the J-PAKE implementation which could lead to<br />

successful validation by someone with no knowledge of the shared secret.\nIAVA<br />

Reference : 2011-A-0160\nIAVB Reference : 2012-B-0038\nSTIG Finding Severity :<br />

Category I<br />

Solution: Upgrade to OpenSSL 0.9.8q, 1.0.0c, or later.<br />

CVE-2010-4252<br />

Stuxnet Traffic Detection<br />

<strong>PVS</strong> ID: 5721 FAMILY: Backdoors RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is passing RPC traffic which is requesting an RPC UUID which is<br />

synonymous with the Stuxnet trojan. This may indicate that either the host is infected with<br />

Stuxnet or the host is scanning for Stuxnet-infected machines.<br />

Solution: Ensure that the system is not infected. If it is not infected, ensure that the system is<br />

authorized to be running security scans on the network.<br />

CVE Not available<br />

ClamAV < 0.96.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5722 FAMILY: Web Clients RISK: HIGH NESSUS ID:51125<br />

Description: Synopsis :\n\nThe remote host is running an anti-virus application that is vulnerable to<br />

multiple attack vectors.\n\nThe reported version of ClamAV on the remote host is %L.<br />

Versions of ClamAV earlier than 0.96.5 are potentially affected by multiple vulnerabilities<br />

:\n\n - Multiple error exists in the PDF processing functions in 'libclamav/pdf.c' which may<br />

lead to application crashes. (Bugs 2358, 2380, 2396)\n\n - An off-by-one error exists in the<br />

handling of icons such that a crafted icon may be used to cause an integer overflow. (Bug<br />

2344)<br />

Solution: Upgrade to ClamAV 0.96.5 or later.<br />

CVE-2010-4479<br />

JavaScript eval() Usage on Web Server<br />

<strong>PVS</strong> ID: 5723 FAMILY: Policy RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application\n\nThe remote web server utilizes JavaScript on it's pages. The use of the<br />

JavaScript 'eval()' function is considered very dangerous. The Javascript in question is %P.<br />

Solution: Remove calls to 'eval()' from javascript source code<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1548


JavaScript Usage on Web Server Detection<br />

<strong>PVS</strong> ID: 5724 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server utilizes JavaScript within the following file : %P<br />

realtimeonly<br />

Solution: Ensure that JavaScript is authorized and is part of your <strong>Security</strong> Development Lifecycle<br />

(SDL)<br />

CVE Not available<br />

QuickTime < 7.6.9 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5725 FAMILY: Web Clients RISK: HIGH NESSUS ID:51062<br />

Description: Synopsis :\n\nThe remote host contains an application that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of QuickTime is %L.\n\nVersions<br />

of QuickTime earlier than 7.6.9 are potentially affected by multiple vulnerabilities :\n\n - A<br />

filesystem permission issue may allow a local user on a Windows system to access the<br />

contents of the 'Apple Computer' directory in the user's profile. (CVE-2010-0530)\n\n - A<br />

heap buffer overflow in QuickTime's handling of Track Header (tkhd) atoms may lead to<br />

an application crash or arbitrary code execution on Windows systems.<br />

(CVE-2010-1508)\n\n - A heap buffer overflow in Quicktime's handling of JP2 images may<br />

lead to an application crash or arbitrary code execution. (CVE-2010-3787)\n\n -<br />

Uninitialized memory access issue in QuickTime's handling of JP2, FlashPix, and GIF<br />

images may lead to an application crash or arbitrary code execution. (CVE-2010-3788,<br />

CVE-2010-3794, CVE-2010-3795)\n\n - Memory corruption issues in QuickTime's<br />

handling of AVI files, movie files, Sorenson encoded movie files, PICT files, FlashPix<br />

images, and panorama atoms in QTVR (QuickTime Virtual Reality) movie files may lead<br />

to an application crash or arbitrary code execution. (CVE-2010-3789, CVE-2010-3790,<br />

CVE-2010-3793, CVE-2010-3800, CVE-2010-3801, CVE-2010-3802)\n\n - A buffer<br />

overflow in QuickTime's handling of MPEG-encoded movie files may lead to an<br />

application crash or arbitrary code execution. (CVE-2010-3791)\n\n - A signedness issue in<br />

QuickTime's handling of MPEG-encoded movie files may lead to an application crash or<br />

arbitrary code execution. (CVE-2010-3792)\n\n - An integer overflow in QuickTime's<br />

handling of movie files may lead to an application crash or arbitrary code execution.<br />

(CVE-2010-4009)<br />

Solution: Upgrade to QuickTime 7.6.9 or later.<br />

CVE-2010-4009<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Winamp < 5.601 MIDI Timestamp Stack Buffer Overflow<br />

<strong>PVS</strong> ID: 5726 FAMILY: Generic RISK: HIGH NESSUS ID:51091<br />

Description: Synopsis :\n\nThe remote host has a media player installed that is vulnerable to a buffer<br />

overflow attack.\n\nThe remote host is running Winamp, a media player for Windows. For<br />

your information, the observed version of Winamp is %L.\n\nVersions of Winamp earlier<br />

Family Internet Services 1549


than 5.601 are potentially affected by a stack buffer overflow vulnerability due to an error<br />

in the 'in_midi.dll' plugin which improperly serializes timestamps in MIDI file. A specially<br />

crafted MIDI file can cause the application to overwrite the saved base pointer and allows<br />

execution of arbitrary code.<br />

Solution: Upgrade to Winamp 5.601 or later.<br />

CVE Not available<br />

Mozilla Firefox 3.6.x < 3.6.13 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5727 FAMILY: Web Clients RISK: HIGH NESSUS ID:51121<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Firefox is<br />

:%L.\n\nVersions of Firefox 3.6.x earlier than 3.6.13 are potentially affected by multiple<br />

vulnerabilities :\n\n - Multiple memory corruption issues could lead to arbitrary code<br />

execution. (MFSA 2010-74)\n\n - On the Windows platform, when 'document.write()' is<br />

called witha very long string a buffer voerflow could be triggered. (MFSA 2010-75)\n\n - A<br />

privilege escalation vulnerability exists with 'window.open' and the '' element.<br />

(MFSA 2010-76)\n\n - Arbitrary code execution is possible when using HTML tags inside<br />

a XUL tree. (MFSA 2010-77)\n\n - Downloadable fonts could expose vulnerabilities in the<br />

underlying OS font code. (MFSA 2010-78)\n\n - A Java security bypass vulnerability when<br />

LiveConnect is loaded via a 'data:' URL meta refresh. (MFSA 2010-79)\n\n - A use-after<br />

free error exists with nsDOMAttribute MutationObserver. (MFSA 2010-80)\n\n - An<br />

integer overflow exists in NewIdArray. (MFSA 2010-81)\n\n - It is possible to circumvent<br />

the fix for CVE-2010-0179. (MFSA 2010-82)\n\n - It is possible to spoof SSL in the<br />

location bar using the network error page. (MFSA 2010-83)\n\n - A cross-site scripting<br />

hazard exists in multiple character encodings. (MFSA 2010-84)<br />

Solution: Upgrade to Firefox 3.6.13 or later.<br />

CVE-2010-3777<br />

Mozilla Firefox < 3.5.16 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5728 FAMILY: Web Clients RISK: HIGH NESSUS ID:51120<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors..\n\nFor your information, the observed version of Firefox is<br />

:%L.\n\nVersions of Firefox 3.5.x earlier than 3.5.16 are potentially affected by multiple<br />

vulnerabilities :\n\n - Multiple memory corruption issues could lead to arbitrary code<br />

execution. (MFSA 2010-74)\n\n - On the Windows platform, when 'document.write()' is<br />

called with a very long string a buffer overflow could be triggered. (MFSA 2010-75)\n\n -<br />

A privilege escalation vulnerability exists with 'window.open' and the '' element.<br />

(MFSA 2010-76)\n\n - Arbitrary code execution is possible when using HTML tags inside<br />

a XUL tree. (MFSA 2010-77)\n\n - Downloadable fonts could expose vulnerabilities in the<br />

underlying OS font code. (MFSA 2010-78)\n\n - A Java security bypass vulnerability when<br />

LiveConnect is loaded via a 'data:' URL meta refresh. (MFSA 2010-79)\n\n - A<br />

use-after-free error exists with nsDOMAttribute MutationObserver. (MFSA 2010-80)\n\n -<br />

Family Internet Services 1550


An integer overflow exists n NewIdArray. (MFSA 2010-81)\n\n - It is possible to<br />

circumvent the fix for CVE-2010-0179. (MFSA 2010-82)\n\n - It is possible to spoof SSL<br />

in the location bar using the network error page. (MFSA 2010-83)\n\n - A cross-site<br />

scripting hazard exists in multiple character encodings. (MFSA 2010-84)<br />

Solution: Upgrade to Firefox 3.5.16 or later.<br />

CVE-2010-3778<br />

Mozilla Thunderbird 3.0.x < 3.0.11 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5729 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:51122<br />

Description: Synopsis :\n\nThe remote host has an email client installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Thunderbird is<br />

:%L.\n\nVersions of Thunderbird 3.0.x earlier than 3.0.11 are potentially affected by<br />

multiple vulnerabilities :\n\n - Multiple memory corruption issues could lead to arbitrary<br />

code execution. (MFSA 2010-74)\n\n - On the Windows platform, when 'document.write()'<br />

is called with a very long string a buffer overflow could be triggered. (MFSA 2010-75)\n\n<br />

- Downloadable fonts could expose vulnerabilities in the underlying OS font code. (MFSA<br />

2010-78)<br />

Solution: Upgrade to Mozilla Thunderbird 3.0.11 or later.<br />

CVE-2010-3778<br />

Mozilla Thunderbird 3.1.x < 3.1.7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5730 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:51123<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Thunderbird is<br />

:%L.\n\nVersions of Thunderbird 3.1.x earlier than 3.1.7 are potentially affected by<br />

multiple vulnerabilities :\n\n - Multiple memory corruption issues could lead to arbitrary<br />

code execution. (MFSA 2010-74)\n\n - On the Windows platform, when 'document.write()'<br />

is called with a very long string a buffer overflow could be triggered. (MFSA 2010-75)\n\n<br />

- Downloadable fonts could expose vulnerabilities in the underlying OS font code. (MFSA<br />

2010-78)<br />

Solution: Upgrade to Thunderbird 3.1.7 or later.<br />

CVE-2010-3778<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla SeaMonkey 2.0.x < 2.0.11 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5731 FAMILY: Web Clients RISK: HIGH NESSUS ID:51124<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of SeaMonkey is<br />

:%L.\n\nVersions of SeaMonkey 2.0.x earlier than 2.0.11 are potentially affected by<br />

multiple vulnerabilities :\n\n - Multiple memory corruption issues could lead to arbitrary<br />

Family Internet Services 1551


code execution. (MFSA 2010-74)\n\n - On the Windows platform, when 'document.write()'<br />

is called with a very long string a buffer overflow could be triggered. (MFSA 2010-75)\n\n<br />

- A privilege escalation vulnerability exists with 'window.open' and the '' element.<br />

(MFSA 2010-76)\n\n - Arbitrary code execution is possible when using HTML tags inside<br />

a XUL tree. (MFSA 2010-77)\n\n - Downloadable fonts could expose vulnerabilities in the<br />

underlying OS font code. (MFSA 2010-78)\n\n - A Java security bypass vulnerability when<br />

LiveConnect is loaded via a 'data:' URL meta refresh. (MFSA 2010-79)\n\n - A<br />

use-after-free error exists with nsDOMAttribute MutationObserver. (MFSA 2010-80)\n\n -<br />

An integer overflow exists in NewIdArray. (MFSA 2010-81)\n\n - It is possible to<br />

circumvent the fix for CVE-2010-0179. (MFSA 2010-82)\n\n - It is possible to spoof SSL<br />

in the location bar using the network error page. (MFSA 2010-83)\n\n - A cross-site<br />

scripting hazard exists in multiple character encodings. (MFSA 2010-84)<br />

Solution: Upgrade to SeaMonkey 2.0.11 or later.<br />

CVE-2010-3778<br />

PHP 5.3 < 5.3.4 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5732 FAMILY: Web Servers RISK: HIGH NESSUS ID:51140<br />

Description: Synopsis :\n\nThe remote web server uses a version of PHP that is affected by multiple<br />

vulnerabilities.\n\nAccording to its banner the version of PHP installed on the remote host<br />

is 5.3.x earlier than 5.3.4. Such versions are potentially affected by multiple vulnerabilities<br />

:\n\n - A crash in the zip extract method.\n\n - A stack buffer overflow in impagepstext() of<br />

the GD extension.\n\n - An unspecified vulnerability related to symbolic resolution when<br />

using a DFS share.\n\n - A security bypass vulnerability related to using pathnames<br />

containing NULL bytes. (CVE-2006-7243)\n\n - Multiple format string vulnerabilities.<br />

(CVE-2010-2094, CVE-2010-2950)\n\n - An unspecified security bypass vulnerability in<br />

open_basedir(). (CVE-2010-3436)\n\n - A NULL pointer dereference in<br />

ZipArchive::getArchiveComment. (CVE-2010-3709)\n\n - Memory corruption in<br />

php_filter_validate_email(). (CVE-2010-3710)\n\n - An input validation vulnerability in<br />

xml_utf8_decode(). (CVE-2010-3870)\n\n - A possible double free in the IMAP extension.<br />

(CVE-2010-4150)\n - An information disclosure vulnerability in 'mb_strcut()'.<br />

(CVE-2010-4156)\n\n - An integer overflow vulnerability in 'getSymbol()'.<br />

(CVE-2010-4409)\n\n - A use-after-free vulnerability in the Zend engine when a '__set()',<br />

'__get()', '__isset()' or '__unset()' method is called can allow for a denial of service attack.<br />

(Bug #52879 / CVE-2010-4697)\n\n - A stack-based buffer overflow exists in the<br />

'imagepstext()' function in the GD extension. (Bug #53492 / CVE-2010-4698)\n\n - The<br />

'iconv_mime_decode_headers()' function in the iconv extension fails to properly handle<br />

encodings that are not recognized by the iconv and mbstring implementations. (Bug #52941<br />

/ CVE-2010-4699)\n\n - The 'set_magic_quotes_runtime()' function when the MySQLi<br />

extension is used does not properly interact with the 'mysqli_fetch_assoc()' function. (Bug<br />

#52221 / CVE-2010-4700)\n\n - A race condition exists in the PCNTL extension.<br />

(CVE-2011-0753)\n\n - The SplFileInfo::getType function in the Standard PHP Library<br />

extension does not properly detect symbolic links. (CVE-2011-0754)\n\n - An integer<br />

overflow exists in the mt_rand function. (CVE-2011-0755)<br />

Solution: Upgrade to PHP version 5.3.4 or later.<br />

Family Internet Services 1552


CVE-2011-0755<br />

PHP 5.2.x < 5.2.15 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5733 FAMILY: Web Servers RISK: HIGH NESSUS ID:51139<br />

Description: Synopsis :\n\nThe remote web server uses a version of PHP that is affected by multiple<br />

vulnerabilities.\n\nAccording to its banner the version of PHP installed on the remote host<br />

is earlier than 5.2.15. Such versions are potentially affected by multiple vulnerabilities :\n\n<br />

- A crash in the zip extract method.\n\n - A possible double free exists in the IMAP<br />

extension. (CVE-2010-4150)\n\n - An unspecified flaw exists in 'open_basedir'.<br />

(CVE-2010-3436)\n\n - A possible crash could occur in 'mssql_fetch_batch()'.\n\n - A<br />

NULL pointer dereference exists in 'zipArchive::getArchiveComment'.<br />

(CVE-2010-3709)\n\n - A crash exists if anti-aliasing steps are invalid. (Bug 53492)\n\n -<br />

A crash exists in pdo_firebird get_Attribute(). (Bug 53323)\n\n - A use-after-free<br />

vulnerability in the Zend engine when a '__set()', '__get()', or '__unset()' method is called<br />

can allow for a denial of service attack. (Bug #52879 / CVE-2010-4697)\n\n - A<br />

stack-based buffer overflow exists in the 'imagepstext()' function in the GD extension. (Bug<br />

#53492 / CVE-2010-4698)\n\n - The extract function does not prevent use of the<br />

EXTR_OVERWRITE parameter to overwrite the GLOBALS superglobal array and the<br />

'this' variable, which allows attackers to bypass intended access restrictions.<br />

(CVE-2011-0752)<br />

Solution: Upgrade to PHP version 5.2.15 or later.<br />

CVE-2010-0752<br />

Google Chrome < 8.0.552.224 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5734 FAMILY: Web Clients RISK: HIGH NESSUS ID:51161<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Google Chrome is<br />

%L.\n\nVersions of Google Chrome earlier than 8.0.552.224 are potentially affected by<br />

multiple vulnerabilities :\n\n - A bad validation exists in message deserialization on 64-bit<br />

Linux builds. (56449)\n\n - A bad extension can cause the browser to crash in tab handling.<br />

(60761)\n\n - A NULL pointer can lead to a browser crash in web worker handling.<br />

(63592)\n\n - An out-of-bounds read can occur in CSS parsing. (63866)\n\n - Stale pointers<br />

could occur in cursor handling. (64959)<br />

Solution: Upgrade to Google Chrome 8.0.552.224 or later.<br />

CVE-2010-4578<br />

Opera < 11.00 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5735 FAMILY: Web Clients RISK: HIGH NESSUS ID:51343<br />

Description: Synopsis :\n\nThe remote host has a web browser that is vulnerable to multiple attack<br />

vectors.\n\nThe remote host is running the Opera web browser. For your information, the<br />

observed version of Opera is %L.\n\nVersions of Opera earlier than 11.00 are potentially<br />

Family Internet Services 1553


affected by multiple vulnerabilities :\n\n - An error exists such that web page content can be<br />

displayed over dialog boxes leading to security warning misrepresentation. (977)\n\n - An<br />

error exists such that WAP form contents can be leaded to third-party sites. (979)\n\n - Two<br />

unspecified, high-severity vulnerabilities exists.<br />

Solution: Upgrade to Opera 11.00 or later.<br />

CVE-2010-4587<br />

HP Power Manager < 4.3.2 Buffer Overflow Vulnerability<br />

<strong>PVS</strong> ID: 5736 FAMILY: CGI RISK: HIGH NESSUS ID:51200<br />

Description: Synopsis : \n\nThe power management application installed on the remote host is<br />

vulnerable to multiple attack vectors.\n\nFor your information, the observed version of HP<br />

Power Manager is : \n %L \n\nVersions of HP Powere Manager earlier than 4.3.2 are<br />

potentially affected by a buffer overflow vulnerability because the application fails to<br />

properly sanitize user supplied in put to the 'Login' parameter of the login page. An<br />

unauthenticated, remote attacker could exploit this by sending a specially crafted HTTP<br />

request, resulting in arbitrary code execution.<br />

Solution: Upgrade to HP Power Manager 4.3.2 or later.<br />

CVE-2010-4113<br />

Android < 2.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5737 FAMILY: Mobile Devices RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nFor your<br />

information, the observed version of Android OS installed on the remote device is : \n %L<br />

\n\nVersions of Android OS earlier than 2.3 are potentially affected by multiple<br />

vulnerabilities : \n\n - A privilege escalation vulnerability exists in the Zygote/Dalvik<br />

virtual machine framework.\n\n - A denial-of-service issue exists that can cause 'dexdump'<br />

to crash.<br />

Solution: Upgrade to Android 2.3 or later.<br />

CVE Not available<br />

Stuxnet Infected Host Detection<br />

<strong>PVS</strong> ID: 5738 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'Backdoor'<br />

program\n\nThe remote host is running the Stuxnet trojan. This was determined based on<br />

the RPC UUID. Stuxnet is a Trojan which uses multiple vulnerabilities to infect and spread<br />

to nearby hosts. Ultimately, the Trojan attempts to gain access to a SCADA network.<br />

Solution: Manually clean the infected machine<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1554


CVE Not available<br />

Mac OS X 10.6 < 10.6.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5739 FAMILY: Generic RISK: HIGH NESSUS ID:51423<br />

Description: Synopsis :\n\nThe remote host is missing a Mac OS X update that fixes a security<br />

issue.\n\nFor your information, the observed version of Mac OS X is %L.\n\nVersions of<br />

Mac OS X 10.6 earlier than 10.6.6 are potentially affected by a security issue. Mac OS X<br />

10.6.6 contains a security fix for the following product :\n\n - PackageKit<br />

Solution: Upgrade to Mac OS X 10.6.6 or later.<br />

CVE-2010-4013<br />

PHP 5.2 < 5.2.17 / 5.3 < 5.3.5 String To Double Conversion DoS<br />

<strong>PVS</strong> ID: 5740 FAMILY: Web Servers RISK: LOW NESSUS ID:51439<br />

Description: Synopsis :\n\nThe remote web server uses a version of PHP that is affected by a denial of<br />

service vulnerability.\n\nAccording to its banner the version of PHP installed on the remote<br />

host is either 5.2 earlier than 5.2.17 or 5.3 earlier than 5.3.5. Such versions may experience<br />

a crash while performing string to double conversion for certain numeric values. Only x86<br />

32-bit PHP processes are known to be affected by this issue regardless of whether the<br />

system running PHP is 32-bit or 64-bit.<br />

Solution: Upgrade to PHP version 5.2.17/5.3.5 or later.<br />

CVE-2010-4645<br />

Rocket Software UniVerse < 10.3.9 Remote Code Execution Vulnerability<br />

<strong>PVS</strong> ID: 5741 FAMILY: Generic RISK: HIGH NESSUS ID:51575<br />

Description: Synopsis :\n\nThe remote host contains a database application that is affected by a remote<br />

code execution vulnerability.\n\nThe remote host has Rocket Software UniVerse installed.<br />

For your information, the installed version of UniVerse is %L.\n\nVersions of UniVerse<br />

earlier than 10.3.9 are potentially affected by a remote code execution vulnerability because<br />

the application fails to properly validate a size value in a RPC packet header before using it<br />

to determine the number of bytes to receive. A remote unauthenticated attacker, exploiting<br />

this flaw, could execute arbitrary code on the remote host with SYSTEM level privileges.<br />

Solution: Upgrade to UniVerse 10.3.9 or later.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Google Chrome < 8.0.552.237 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5742 FAMILY: Web Clients RISK: HIGH NESSUS ID:51511<br />

Family Internet Services 1555


Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Google Chrome is<br />

%L.\n\nVersions of Google Chrome earlier than 8.0.552.237 are potentially affected by<br />

multiple vulnerabilities :\n\n - A browser crash exists in extensions notification handling.<br />

(58053)\n\n - Bad pointer handling exists in node iteration. (65764)\n\n - Multiple crashes<br />

exist when printing multi-page PDFs. (66334)\n\n - A stale pointer exists with CSS +<br />

canvas. (66560)\n\n - A stale pointer exists with CSS + cursors. (66748)\n\n - A use after<br />

free error exists in PDF handling. (67100)\n\n - A stack corruption error exists after PDF<br />

out-of-memory conditions. (67208)\n\n - A bad memory access issue exists when handling<br />

mismatched video frame sizes. (67303)\n\n -A stale pointer exists with SVG use elements.<br />

(67363)\n\n - An uninitialized pointer exists in the browser which is triggered by rogue<br />

extensions. (67393)\n\n - Multiple buffer overflows exists in the Vorbis decoder.<br />

(68115)\n\n - A buffer overflow exists in PDF shading. (68170)\n\n - A bad cast exists in<br />

anchor handling. (68178)\n\n - A bad cast exists in video handling. (68181)\n\n - A stale<br />

rendering node exists after DOM node removal. (68439)\n\n - A stale pointer exists in<br />

speech handling. (68666)<br />

Solution: Upgrade to Google Chrome 8.0.552.237 or later.<br />

CVE-2011-0485<br />

Piwik < 1.1.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5743 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server is hosting a PHP application that is vulnerable to<br />

multiple attack vectors.\n\nThe remote web server is hosting Piwik, a web analytics<br />

application written in PHP. For your information, the observed version of Piwik is<br />

%L.\n\nVersions of Piwik earlier than 1.1.0 are potentially affected by multiple<br />

vulnerabilities :\n\n - A flaw exists in the 'Piwik_Common::getIP' function which fails to<br />

properly determine the client IP address. (Bug 457)\n\n - Piwik fails to prevent the login<br />

form from being framed in another website. (Bug 1679)\n\n - An unspecified flaw exists<br />

relating to Cookie.php's failure to set the secure flag for the session cookie in https sessions.<br />

(Bug 1795)\n\n - A denial-of-service vulnerability exists because Piwik fails to properly<br />

limit the number of files stored under '/tmp/sessions/' (Bug 1910)\n\n - An unspecified<br />

cross-site scripting vulnerability exists.<br />

Solution: Upgrade to Piwik 1.1.0 or later.<br />

CVE-2011-0401<br />

Bugzilla < 3.2.10 / 3.4.10 / 3.6.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5744 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server is hosting an application that is vulnerable to multiple<br />

attack vectors.\n\nThe remote web server is hosting Bugzilla, a web-based bug tracking<br />

application. For your information, the observed version of Bugzilla is %L.\n\nVersions of<br />

Bugzilla 3.2.x earlier than 3.2.10, 3.4.x earlier than 3.4.10, and 3.6.x earlier than 3.6.4 are<br />

Family Internet Services 1556


potentially affected by multiple vulnerabilities :\n\n - A weakness could allow a user to<br />

gain unauthorized access to another Bugzilla account.\n\n - A weakness in the Perl CGI.pm<br />

module allows injecting HTTP headers and content to users via several pages.\n\n - It is<br />

possible to insert harmful 'javascript:' or 'data:' URLs into Bugzilla's 'URL' field which in<br />

some cases Buzilla will make clickable.\n\n - Various pages lack protection against<br />

cross-site request forgeries.<br />

Solution: Upgrade to Bugzilla 3.2.10, 3.4.10, 3.6.4 or later.<br />

CVE-2011-0048<br />

OpenOffice < 3.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5745 FAMILY: Generic RISK: HIGH NESSUS ID:51773<br />

Description: Synopsis :\n\nThe remote host has a program that is affected by multiple<br />

vulnerabilities.\n\nFor your information, the observed version of OpenOffice is<br />

%L.\n\nVersions of OpenOffice earlier than 3.3 are potentially affected by several issues<br />

:\n\n - Issues exist relating to PowerPoint document parsing that may lead to arbitrary code<br />

execution. (CVE-2010-2935, CVE-2010-2936)\n\n - A directory traversal vulnerability<br />

exists in zip / jar package extraction. (CVE-2010-3450)\n\n - Issues exist relating to RTF<br />

document processing that may lead to arbitrary code execution. (CVE-2010-3451,<br />

CVE-2010-3452)\n\n - Issues exist relating to Word document processing that may lead to<br />

arbitrary code execution. (CVE-2010-3453, CVE-2010-3454)\n\n - The OpenOffice.org<br />

start script and other shell scripts expand the LD_LIBRARY_PATH in a way that the<br />

current directory might be searched for libraries before /lib and /usr/lib.<br />

(CVE-2010-3689)\n\n - Issues exist in the third party XPDF library relating to PDf<br />

processing that may allow arbitrary code execution. (CVE-2010-3702,<br />

CVE-2010-3704)\n\n - OpenOffice.org includes a version of LIBXML2 that is affected by<br />

multiple vulnerabilities. (CVE-2010-4008, CVE-2010-4494)\n\n - An issue exists with<br />

PNG file processing that may allow arbitrary code execution. (CVE-2010-4253)\n\n - An<br />

issue exists with TGA file processing that may allow arbitrary code execution.<br />

(CVE-2010-4643)<br />

Solution: Upgrade to OpenOffice version 3.3 or later.<br />

CVE-2010-4643<br />

VLC Media Player < 1.1.6 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5746 FAMILY: Web Clients RISK: HIGH NESSUS ID:51772<br />

Description: Synopsis :\n\nThe remote host contains an application that allows arbitrary code<br />

execution.\n\nThe remote host contains VLC player, a multi-media application. For your<br />

information, the observed version of VLC is %L.\n\nVersions of VLC media player earlier<br />

than 1.1.6 are potentially affected by multiple vulnerabilities :\n\n - An integer overflow<br />

vulnerability exists due to a failure to properly parse the header of a Real Media, which<br />

could then trigger a heap-based buffer overflow. It is not yet known if this issue can be<br />

exploited to execute arbitrary code. (CVE-2010-3907)\n\n - There are two heap corruption<br />

vulnerabilities in the CDG decoders that arise because of a failure to validate indices into<br />

Family Internet Services 1557


statically-sized arrays on the heap, which could allow for arbitrary code execution.<br />

(CVE-2011-0021)\n\n - A heap-based memory corruption vulnerability exists i the<br />

StripTags function in the USF decoder. (CVE-20111-0522)<br />

Solution: Upgrade to VLC Media Player version 1.1.6 or later.<br />

CVE-2011-0522<br />

Opera < 11.01 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5747 FAMILY: Web Clients RISK: HIGH NESSUS ID:51774<br />

Description: Synopsis :\n\nThe remote host has a web browser that is vulnerable to multiple attack<br />

vectors.\n\nThe remote host is running the Opera web browser. For your information, the<br />

observed version of Opera is %L.\n\nVersions of Opera earlier than 11.01 are potentially<br />

affected by multiple vulnerabilities :\n\n - When certain large form inputs appear on a web<br />

page, they can lead to memory corruption which could be used to execute arbitrary code.<br />

(982)\n\n - It is possible to bypass restrictions on 'opera:' URLs to launch clickjacking<br />

attacks. (983)\n\n - Certain types of HTTP responses and redirections can cause Opera to<br />

mistakenly give elevated privileges to remote web pages. (984)\n\n - When using 'Delete<br />

Private Data' and selecting the option to 'Clear all email account passwords', the passwords<br />

are not deleted immediately and continue to be available until the browser is restarted.<br />

(986)\n\n - In certain cases, the wrong executable is used to display a downloaded file in its<br />

folder. (985)<br />

Solution: Upgrade to Opera 11.01 or later.<br />

CVE-2011-0687<br />

Real <strong>Network</strong>s RealPlayer < 14.0.2.633 (Build 12.0.1.633) Multiple Remote Code Execution<br />

Vulnerabilities<br />

<strong>PVS</strong> ID: 5748 FAMILY: Web Clients RISK: HIGH NESSUS ID:51814<br />

Description: Synopsis :\n\nThe remote host is running an application that is vulnerable to multiple attack<br />

vectors.\n\nThe remote host is running RealPlayer, a multi-media application. For your<br />

information, the observed build of RealPlayer is %L.\n\nRealPlayer builds earlier than<br />

12.0.1.633 are potentially affected by multiple code execution vulnerabilities : - A heap<br />

corruption vulnerability when handling specially crafted AVI headers.<br />

(CVE-2010-4393)\n\n - A flaw exists in the temporary file naming scheme used for storage<br />

which can be combined with the OpenURLinPlayerBrowser function to execute arbitrary<br />

code. (CVE-2011-0694)<br />

Solution: Upgrade to RealPlayer 14.0.2.633 (Build 12.0.1.633) or later.<br />

CVE-2011-0694<br />

DB2 9.1 < Fix Pack 10 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5749 FAMILY: Database RISK: HIGH NESSUS ID:51840<br />

Family Internet Services 1558


Description: Synopsis :\n\nThe remote database server is vulnerable to multiple attack vectors.\n\nFor<br />

your information, the observed version of IBM DB2 is %L\n\nVersions of IBM DB2 9.1<br />

earlier than Fix Pack 10 are potentially affected by multiple vulnerabilities :\n\n - Multiple<br />

buffer overflow vulnerabilities exist in the DB2 Administrative Service (DAS) which could<br />

lead to a denial-of-service, or the execution of arbitrary code. (IC69986, IC71203)\n\n -<br />

Users continue to have privilege to execute a non-DDL statement after their DBADM<br />

authority has been revoked. (IC66811)\nIAVB Reference : 2011-B-0013\nSTIG Finding<br />

Severity : Category I<br />

Solution: Upgrade to IBM DB2 9.1 Fix Pack 10 or later.<br />

CVE-2010-3731<br />

DB2 9.5 < Fix Pack 7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5750 FAMILY: Database RISK: HIGH NESSUS ID:51841<br />

Description: Synopsis :\n\nThe remote database server is vulnerable to multiple attack vectors.\n\nFor<br />

your information, the observed version of IBM DB2 is %L\n\nVersions of IBM DB2 9.5<br />

earlier than Fix Pack 7 are potentially affected by multiple issues :\n\n - A buffer overflow<br />

vulnerability exists in the DB2 Administrative Service (DAS). (IC72028)\n\n - It is possible<br />

to update statistics for tables without appropriate privileges. (IC71413)\n\n - It is possible<br />

for a user to execute a non-DDL statement after role memebership has been revoked from<br />

its group. (IC71263)\nIAVB Reference : 2011-B-0013\nSTIG Finding Severity : Category I<br />

Solution: Upgrade to IBM DB2 9.5 Fix Pack 7 or later.<br />

CVE-2011-1847<br />

DB2 9.7 < Fix Pack 3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5751 FAMILY: Database RISK: HIGH NESSUS ID:50451<br />

Description: Synopsis :\n\nThe remote database server is vulnerable to multiple attack vectors.\n\nFor<br />

your information, the observed version of IBM DB2 is %L\n\nVersions of IBM DB2 9.7<br />

earlier than Fix Pack 3 are potentially affected by multiple vulnerabilities :\n\n - When<br />

privileges on a database object are revoked from PUBLIC, the dependent functions are not<br />

marked INVALID. As a result, users with execute privilege on the function are still able to<br />

call it successfully. (IC68015)\n\n - If a compound SQL (compiled) statement has been<br />

issued by a user that is properly authorized, this is cached in the dynamic SQL cache. Once<br />

cached, this same query can be executed by an user if that user has the proper authority.<br />

(IC70406)\n\n - Multiple buffer overflow vulnerabilities exist in the DB2 Administrative<br />

Server (DAS). (IC70539, IC72029)\nIAVB Reference : 2011-B-0013\nSTIG Finding<br />

Severity : Category I<br />

Solution: Upgrade to IBM DB2 9.7 Fix Pack 3 or later.<br />

CVE-2011-0731<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Exim < 4.74 Local Privilege Escalation Vulnerability<br />

Family Internet Services 1559


<strong>PVS</strong> ID: 5752 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:51861<br />

Description: Synopsis :\n\nThe remote mail server is affected by a local privilege escalation<br />

vulnerability.\n\nThe remote host is running Exim, a message transfer agent. For your<br />

information, the observed version of Exim is %L.\n\nVersions of Exim earlier than 4.74 are<br />

potentially affected by a local privilege escalation vulnerability. Attackers can exploit this<br />

flaw to append arbitrary data to files through symbolic link attacks. Successfully exploiting<br />

this issue allows local attackers with 'exim' run-time privileges to perform certain actions<br />

with superuser privileges, leading to a complete compromise of an affected computer. Note<br />

that this issue only affects Exim on Linux.<br />

Solution: Upgrade to Exim 4.74 or later.<br />

CVE-2011-0017<br />

HP Performance Insight Detection<br />

<strong>PVS</strong> ID: 5753 FAMILY: CGI RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis : \n\nA performance monitoring application was detected on the remote web<br />

server.\n\nThe web interface for HP OpenView Performance Insight was detected on the<br />

remote host. This software helps assess the availability and performance of network<br />

services. For your information, the observed version of HP OpenView Performance Insight<br />

was : \n %L<br />

Solution: N/A<br />

CVE Not available<br />

HP OpenView Performance Insight Server Backdoor Account<br />

<strong>PVS</strong> ID: 5754 FAMILY: CGI RISK: HIGH NESSUS ID:51850<br />

Description: Synopsis :\n\nThe remote host contains a web application that has a hidden account.\n\nThe<br />

installation of HP OpenView Performance Insight on the remote host allows the use of a<br />

hidden account for logging in. The 'hch908v' user, hardcoded in the<br />

com.trinagy.security.XMLUserManager class, is hidden and has administrative privileges.<br />

A remote, unauthenticated attacker could exploit this by logging in as the hidden user,<br />

giving them administrative access to the Performance Insight installation. After gaining<br />

administrative access to the web application, escalation of privileges may be possible.<br />

Solution: Apply the hotfix referenced in the HP advisory.<br />

CVE-2011-0276<br />

CouchDB < 1.0.2 Cross Site Scripting Issue<br />

<strong>PVS</strong> ID: 5755 FAMILY: Database<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:51923<br />

Family Internet Services 1560


Description: Synopsis :\n\nThe remote database server is vulnerable to a cross-site attack.\n\nThe<br />

remote host is running CouchDB, a document-oriented database. For your information, the<br />

observed version of CouchDB is %L.\n\nVersions of CouchDB earlier than 1.0.2 are<br />

potentially affected by a cross-site scripting vulnerability. The application fails to properly<br />

sanitize user-supplied input before it is used in the Futon administrative interface. A remote<br />

attacker could exploit this to execute arbitrary script code in the security context of<br />

CouchDB's admin interface.<br />

Solution: Upgrade to CouchDB 1.0.2 or later.<br />

CVE-2010-3854<br />

VLC Media Player < 1.1.7 Code Execution Vulnerability<br />

<strong>PVS</strong> ID: 5756 FAMILY: Web Clients RISK: HIGH NESSUS ID:51851<br />

Description: Synopsis :\n\nThe remote host contains an application that allows arbitrary code<br />

execution.\n\nThe remote host contains VLC player, a multi-media application. For your<br />

information, the observed version of VLC is %L.\n\nVersions of VLC media player earlier<br />

than 1.1.7 are potentially affected by a code execution vulnerability due to insufficient<br />

input validation when parsing a specially crafted Matroska or WebM (MKV) file.<br />

Solution: Upgrade to VLC Media Player version 1.1.7 or later.<br />

CVE-2011-0531<br />

PostgreSQL < 9.0.3 / 8.4.7 / 8.3.14 / 8.2.20 Code Execution Vulnerability<br />

<strong>PVS</strong> ID: 5757 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote database server is affected by a buffer overflow<br />

vulnerability.\n\nFor your information, the version of PostgreSQL installed on the remote<br />

host is %L.\n\n Versions of PostgreSQL earlier than 9.0.3, 8.4.7, 8.3.14, or 8.2.20 are<br />

potentially affected by a buffer overflow vulnerability in the contrib module intarray's input<br />

function for the query_int type. An attacker, exploiting this flaw, could potentially execute<br />

arbitrary code on the remote host subject to the privileges of the user running the affected<br />

application.<br />

Solution: Upgrade to PostgreSQL 9.0.3, 8.4.7, 8.3.14, 8.2.20, or later.<br />

CVE-2010-4015<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Google Chrome < 9.0.597.84 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5758 FAMILY: Web Clients RISK: HIGH NESSUS ID:51872<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Google Chrome is<br />

%L.\n\nVersions of Google Chrome earlier than 9.0.597.84 are potentially affected by<br />

multiple vulnerabilities :\n\n - A minor sandbox leak exists in stat(). Note this issue only<br />

Family Internet Services 1561


affects Google Chrome on Mac OS. (429889)\n\n - A use-after-free issue exists in image<br />

loading. (55381)\n\n - An unspecified issue exists relating to cross-origin drag and drop.<br />

(59081)\n\n - A browser crash can occur when handling extensions with a missing key.<br />

(62791)\n\n - A browser crash issue exists relating to the PDF event handler. (64051)\n\n -<br />

An unspecified issue exists relating t the merging of autofill profiles. (65669)\n\n - A<br />

potential crash exists in the Mac OS 10.5 SSL libraries. Note that this issue only affects<br />

Google Chrome on Mac OS. (66931)\n\n - A browser crash issue exists relating to bad<br />

volume settings (68244)\n\n - A race condition exists in audio handling. (69195)<br />

Solution: Upgrade to Google Chrome 9.0.597.84 or later.<br />

CVE-2011-0784<br />

Generic Protocol Detection<br />

<strong>PVS</strong> ID: 5759 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: the remote host is running the following protocol<br />

realtime<br />

Solution: N/A<br />

CVE Not available<br />

Generic Protocol Detection<br />

<strong>PVS</strong> ID: 5760 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: the remote host is running the following protocol<br />

realtime<br />

Solution: N/A<br />

CVE Not available<br />

Generic Protocol Detection<br />

<strong>PVS</strong> ID: 5761 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: the remote host is running the following protocol<br />

Solution: N/A<br />

CVE Not available<br />

Generic Protocol Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5762 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1562


Description: the remote host is running the following protocol<br />

Solution: N/A<br />

CVE Not available<br />

Generic Protocol Detection<br />

<strong>PVS</strong> ID: 5763 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: the remote host is running the following protocol<br />

Solution: N/A<br />

CVE Not available<br />

Generic Protocol Detection<br />

<strong>PVS</strong> ID: 5764 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: the remote host is running the following protocol<br />

Solution: N/A<br />

CVE Not available<br />

Generic Protocol Detection<br />

<strong>PVS</strong> ID: 5765 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: the remote host is running the following protocol<br />

Solution: N/A<br />

CVE Not available<br />

Generic Protocol Detection<br />

<strong>PVS</strong> ID: 5766 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: the remote host is running the following protocol<br />

Solution: N/A<br />

CVE Not available<br />

Generic Protocol Detection<br />

<strong>PVS</strong> ID: ID<br />

not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1563


Description: the remote host is running the following protocol<br />

Solution: N/A<br />

CVE Not available<br />

Generic Protocol Detection<br />

<strong>PVS</strong> ID: 5768 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: the remote host is running the following protocol<br />

Solution: N/A<br />

CVE Not available<br />

Generic Protocol Detection<br />

<strong>PVS</strong> ID: 5769 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: the remote host is running the following protocol<br />

Solution: N/A<br />

CVE Not available<br />

Generic Protocol Detection<br />

<strong>PVS</strong> ID: 5770 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: the remote host is running the following protocol<br />

Solution: N/A<br />

CVE Not available<br />

Generic Protocol Detection<br />

<strong>PVS</strong> ID: 5771 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: the remote host is running the following protocol<br />

Solution: N/A<br />

CVE Not available<br />

Generic Protocol Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5772 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1564


Description: the remote host is running the following protocol<br />

Solution: N/A<br />

CVE Not available<br />

Generic Protocol Detection<br />

<strong>PVS</strong> ID: 5773 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: the remote host is running the following protocol<br />

Solution: N/A<br />

CVE Not available<br />

Generic Protocol Detection<br />

<strong>PVS</strong> ID: 5774 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: the remote host is running the following protocol<br />

Solution: N/A<br />

CVE Not available<br />

Generic Protocol Detection<br />

<strong>PVS</strong> ID: 5775 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: the remote host is running the following protocol<br />

Solution: N/A<br />

CVE Not available<br />

Generic Protocol Detection<br />

<strong>PVS</strong> ID: 5776 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: the remote host is running the following protocol<br />

Solution: N/A<br />

CVE Not available<br />

Generic Protocol Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5777 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1565


Description: the remote host is running the following protocol<br />

Solution: N/A<br />

CVE Not available<br />

Generic Protocol Detection<br />

<strong>PVS</strong> ID: 5778 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: the remote host is running the following protocol<br />

Solution: N/A<br />

CVE Not available<br />

Lexmark Printer Service Detection<br />

<strong>PVS</strong> ID: 5779 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: A Lexmark print server is listening on this port.<br />

Solution: Manually inspect the service to ensure that it is patched and necessary on your network.<br />

CVE Not available<br />

Google Chrome < 9.0.597.94 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5780 FAMILY: Web Clients RISK: HIGH NESSUS ID:51921<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Google Chrome is<br />

%L.\n\nVersions of Google Chrome earlier than 9.0.597.94 are potentially affected by<br />

multiple vulnerabilities :\n\n - A stale pointer exists in animation event handling. (67234) -<br />

A use-after-free issue exists in SVG font faces. (68120)\n\n - A stale pointer exists with<br />

anonymous block handling. (69556)\n\n - An out-of-bounds read exists in plug-in handling.<br />

(69970)\n\n - An error exists in the handling of out-of-memory conditions and does not<br />

always allow processes to be properly terminated. (70456)\n\n - This version bundles a<br />

version of Adobe Flash affected by numerous vulnerabilities. (CVE-2011-0558,<br />

CVE-2011-0559, CVE-2011-0560, CVE-2011-0561, CVE-2011-0571, CVE-2011-0572,<br />

CVE-2011-0573, CVE-2011-0574, CVE-2011-0575, CVE-2011-0577, CVE-2011-0578,<br />

CVE-2011-0607, CVE-2011-0608)<br />

Solution: Upgrade to Google Chrome 9.0.597.94 or later.<br />

CVE-2011-0985<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Flash Player < 10.2.152.26 Multiple Vulnerabilities (APSB11-02)<br />

<strong>PVS</strong> ID: 5781 FAMILY: Web Clients RISK: HIGH NESSUS ID:51926<br />

Family Internet Services 1566


Description: Synopsis :\n\nThe remote host contains a browser plug-in that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host has Adobe Flash Player installed. For your information,<br />

the observed version of Adobe Flash Player is %L.\nVersions of Flash Player earlier than<br />

10.2.152.26 are potentially affected by multiple vulnerabilities :\n\n - An integer overflow<br />

vulnerability exisst that could lead to code execution. (CVE-2011-0558)\n\n - Multiple<br />

memory corruption vulnerabilities exist that could lead to code execution.<br />

(CVE-2011-0559, CVE-2011-0560, CVE-2011-0561, CVE-2011-0571, CVE-2011-0572,<br />

CVE-2011-0573, CVE-2011-0574, CVE-2011-0578, CVE-2011-0607,<br />

CVE-2011-0608)\n\n - A library-loading vulnerability exists that could lead to code<br />

execution. (CVE-2011-0575)\n\n - A font-parsing vulnerabiity exists that could lead to<br />

code execution. (CVE-2011-0577)<br />

Solution: Upgrade to Flash Player 10.2.152.26 or later.<br />

CVE-2011-0608<br />

OpenSSL < 0.9.8r / 1.0.0d OCSP Stapling Denial of Service<br />

<strong>PVS</strong> ID: 5782 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:51919<br />

Description: Synopsis :\n\nThe remote web server is vulnerable to multiple attack vectors.\n\nFor your<br />

information, the observed version of OpenSSL is %L.\n\nVersions of OpenSSL earlier than<br />

0.9.8r and 1.0.0d are potentially affected by a vulnerability wherein an incorrectly<br />

formatted ClientHello handshake message could cause OpenSSL to parse past the end of<br />

the message which could cause the web server to crash. There is also the potential for<br />

information disclosure if OCSP nonce extensions are used.<br />

Solution: Upgrade to OpenSSL 0.9.8r, 1.0.0d, or later.<br />

CVE-2011-0014<br />

Flash Player Unsupported Version Detection<br />

<strong>PVS</strong> ID: 5783 FAMILY: Web Clients RISK: HIGH NESSUS ID:51937<br />

Description: Synopsis :\n\nThe remote host contains an unsupported version of Flash Player.\n\nThe<br />

remote host has Adobe Flash Player installed. For your information, the observed version<br />

of Adobe Flash Player is %L.\nOne or more versions of Flash Player earlier than 10.x are<br />

installed on the remote host. Such versions are no longer supported by Adobe and are likely<br />

to contain security vulnerabilities.<br />

Solution: Upgrade to an actively maintained version of Flash player.<br />

CVE Not available<br />

OpenSSH Legacy Certificate Signing Information Disclosure<br />

<strong>PVS</strong> ID: 5784 FAMILY: SSH<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:51920<br />

Family Internet Services 1567


Description: Synopsis : \n\nThe remote host is affected by an information disclosure<br />

vulnerability.\n\nFor your information, the observed version of OpenSSH installed on the<br />

remote host is : \n %L \n\nOpenSSH 5.6 and 5.7 contain an information disclosure<br />

vulnerability which may cause the contents of the stack to be copied into an SSH<br />

certificate, which is visible to a remote attacer. This information may lead to further<br />

attacks.<br />

Solution: Upgrade to OpenSSH version 5.8 or later.<br />

CVE-2011-0539<br />

WordPress < 3.0.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5785 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:51939<br />

Description: Synopsis : \n\nThe remote web server is hosting a web application that is vulnerable to<br />

multiple attack vectors.\n\nFor your information, the observed version of WordPress is : \n<br />

%L \n\nVersions of WordPress earlier than 3.0.5 are potentially affected by multiple<br />

vulnerabilities : \n\n - The application is prone to multiple cross-site scripting<br />

vulnerabilities. An attacker can exploit these issues through the 'title' field of the<br />

'Quick/Bulk Edit' section and the 'tags meta box' section. An attacker would require Author<br />

or Contributor privileges to take advantage of this.\n\n - The application is prone to an<br />

information-disclosure vulnerability. An attacker can exploit this issue through the media<br />

uploader, disclosing posts. This information may assist in further attacks. An attacker<br />

would require Author privileges to take advantage of this.<br />

Solution: Upgrade to WordPress 3.0.5 or later.<br />

CVE-2011-0701<br />

Apache Tomcat 5.5.x < 5.5.30 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5786 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:47749<br />

Description: Synopsis : \n\nThe remote web server is vulnerable to multiple attack vectors.\n\nFor your<br />

information, the observed version of Apache Tomcat installed on the remote host is : \n %L<br />

\n\nVersions of Tomcat 5.x earlier than 5.5.30 are potentially affected by multiple<br />

vulnerabilities : \n\n - The 'WWW-Authenticate' HTTP header for BASIC and DIGEST<br />

authentcation may expose the local host name or IP address of the machine running<br />

Tomcat. (CVE-2010-1157)\n\n - Several flaws in the handling of the 'Tansfer-Encoding'<br />

header could prevent the recycling of buffer. (CVE-2010-2227)\n\n - When running under a<br />

<strong>Security</strong>Manager, it is possible for web applications to be granted read/write permissions to<br />

any area on the file system. (CVE-2010-3718)<br />

Solution: Upgrade to Apache Tomcat 5.5.30 or later.<br />

CVE-2010-3718<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1568


Apache Tomcat 5.5.x < 5.5.32 Cross-site Scripting Vulnerability<br />

<strong>PVS</strong> ID: 5787 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:51957<br />

Description: Synopsis : \n\nThe remote web server is affected by a cross-site scripting<br />

vulnerability\n\nFor your information, the observed version of Apache Tomcat installed on<br />

the remote host is : \n %L \n\nVersions of Tomcat 5.x earlier than 5.5.32 are potentially<br />

affected by a cross-site scripting vulnerability because the HTML Manager interface<br />

displays web application provided data, such as display names, without filtering.<br />

Solution: Upgrade to Apache Tomcat 5.5.32 or later.<br />

CVE-2011-0013<br />

Apache Tomcat 6.0.x < 6.0.28 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5788 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:48255<br />

Description: Synopsis : \n\nThe remote web server is vulnerable to multiple attack vectors.\n\nFor your<br />

information, the observed version of Apache Tomcat installed on the remote host is : \n %L<br />

\n\nVersions of Tomcat 6.x earlier than 6.0.28 are potentially affected by multiple<br />

vulnerabilities : \n\n - The 'WWW-Authenticate' HTTP header for BASIC and DIGEST<br />

authentication could potentially expose the local host name or IP adddress of the machine<br />

running Tomcat. (CVE-2010-1157)\n\n - Several flaws in handling of the<br />

'Transfer-Encoding' header exist that could prevent the recycling of a buffer.<br />

(CVE-2010-2227)<br />

Solution: Upgrade to Apache Tomcat 6.0.28 or later.<br />

CVE-2010-2227<br />

Apache Tomcat 6.0.x < 6.0.30 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5789 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:51975<br />

Description: Synopsis : \n\nThe remote web server is vulnerable to multiple attack vectors.\n\nFor your<br />

information, the observed version of Apache Tomcat installed on the remote host is : \n %L<br />

\n\nVersions of Tomcat 6.x earlier than 6.0.30 are potentially affected by multiple<br />

vulnerabilities : \n\n - When running under a <strong>Security</strong>Manager it is possible for a web<br />

application to gain read/write permissions to any area on the file system.<br />

(CVE-2010-3718)\n\n - It is possible to conduct cross-site scripting attacks via the 'sort' and<br />

'orderBy' parameers of the Manager application. (CVE-2010-4172)\n\n - The HTML<br />

Manager interface displays web application provided data, such as display names, without<br />

filtering. (CVE-2011-0013)<br />

Solution: Upgrade to Apache Tomcat 6.0.30 or later.<br />

Family Internet Services 1569


CVE-2011-0013<br />

Apache Tomcat 6.0.x < 6.0.32 Denial of Service Vulnerability<br />

<strong>PVS</strong> ID: 5790 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:51987<br />

Description: Synopsis : \n\nThe remote web server is vulnerable to a denial of service attack.\n\nFor<br />

your information, the observed version of Apache Tomcat installed on the remote host is :<br />

\n %L \n\nVersions of Tomcat 6.x earlier than 6.0.32 are potentially affected by a denial of<br />

service vulnerability because the NIO connector expands its buffer endlessly during request<br />

line processing.<br />

Solution: Upgrade to Apache Tomcat 6.0.32 or later.<br />

CVE-2011-0534<br />

Apache Tomcat 7.0.x < 7.0.2 Denial of Service Vulnerability<br />

<strong>PVS</strong> ID: 5791 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server is vulnerable to a denial of service attack.\n\nFor<br />

your information, the observed version of Apache Tomcat installed on the remote host is :<br />

\n %L \n\nVersions of Tomcat 7.0.x earlier than 7.0.2 are potentially affected by a denial of<br />

service vulnerability because several flaws in the handling of the 'Transfer-Encoding header<br />

could prevent the recycling of a buffer.<br />

Solution: Upgrade to Apache Tomcat 7.0.2 or later.<br />

CVE-2010-2227<br />

Apache Tomcat 7.0.x < 7.0.4 File Permission Bypass Vulnerability<br />

<strong>PVS</strong> ID: 5792 FAMILY: Web Servers RISK: LOW NESSUS ID:51958<br />

Description: Synopsis : \n\nThe remote web server is affected by a security bypass vulnerability.\n\nFor<br />

your information, the observed version of Apache Tomcat installed on the remote host is :<br />

\n %L \n\nVersions of Tomcat 7.0.x earlier than 7.0.4 are potentially affected by a security<br />

bypass vulnerability. When running under a <strong>Security</strong>Manager, it is possible to grant a web<br />

application read/write permissions to any area on the file system.<br />

Solution: Upgrade to Apache Tomcat 7.0.4 or later.<br />

CVE-2010-3718<br />

Apache Tomcat 7.0.x < 7.0.5 Cross-Site Scripting Vulnerability<br />

<strong>PVS</strong> ID: 5793 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:51526<br />

Family Internet Services 1570


Description: Synopsis : \n\nThe remote web server is affected by a cross-site scripting<br />

vulnerability.\n\nFor your information, the observed version of Apache Tomcat installed on<br />

the remote host is : \n %L \n\nVersions of Tomcat 7.0.x earlier than 7.0.5 are potentially<br />

affected by a cross-site scripting vulnerability because the application uses the user<br />

supplied parameters 'sort' and 'orderBy' directly wihtout filtering.<br />

Solution: Upgrade to Apache Tomcat 7.0.5 or later.<br />

CVE-2010-4172<br />

Apache Tomcat 7.0.x < 7.0.6 Cross-Site Scripting Vulnerability<br />

<strong>PVS</strong> ID: 5794 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:51976<br />

Description: Synopsis : \n\nThe remote web server is affected by a cross-site scripting<br />

vulnerability.\n\nFor your information, the observed version of Apache Tomcat installed on<br />

the remote host is : \n %L \n\nVersions of Tomcat 7.0.x earlier than 7.0.6 are potentially<br />

affected by a cross-site scripting vulnerability because the HTML Manager interface<br />

display web application provided data, such as display names, without filtering.<br />

Solution: Upgrade to Apache Tomcat 7.0.6 or later.<br />

CVE-2011-0013<br />

Apache Tomcat 7.0.x < 7.0.8 Denial of Service Vulnerability<br />

<strong>PVS</strong> ID: 5795 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:51987<br />

Description: Synopsis : \n\nThe remote web server is affected by a denial of service<br />

vulnerability.\n\nFor your information, the observed version of Apache Tomcat installed on<br />

the remote host is : \n %L \n\nVersions of Tomcat 7.0.x earlier than 7.0.8 are potentially<br />

affected by a denial of service vulnerability becasue the NIO connector expands its buffer<br />

endlessly during request line processing.<br />

Solution: Upgrade to Apache Tomcat 7.0.8 or later.<br />

CVE-2011-0534<br />

ClamAV < 0.97 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5796 FAMILY: Web Clients RISK: HIGH NESSUS ID:51935<br />

Description: Synopsis : \n\nThe remote host is running an anti-virus application that is vulnerable to<br />

multiple attack vectors.\n\nThe reported version of ClamAV on the remote host is : \n %L<br />

\n\nVersions of ClamAV earlier than 0.97 are potentially affected by multiple<br />

vulnerabilities : \n\n - As-yet unspecified double-free issue involving an error path exists in<br />

'libclamav/vba_extract.c' and 'shared/cdiff.c'. (Bug 2486 and report from<br />

)\n,br. - 'libclamav/pdf.c' may miss detection. (Bug 2455)\n\n - Multiple<br />

as-yet unspecified error path leaks exist in 'clamav-milter/whitelist.c', 'clamscan/manager.c'<br />

Family Internet Services 1571


and 'libclamav/sis.c'. (Report from )<br />

Solution: Upgrade to ClamAV 0.97 or later.<br />

CVE-2011-1003<br />

phpMyAdmin 2.x < 2.11.11.3 / 3.x < 3.3.9.2 SQL Injection Vulnerability (PMASA-2011-2)<br />

<strong>PVS</strong> ID: 5797 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server contains a PHP application that is vulnerable to a<br />

SQL-injection attack.\n\nFor your information, the observed version of phpMyAdmin is :<br />

\n %L \n\nVersions of phpMyAdmin earlier than 2.11.11.3 / 3.3.9.2 are potentially affected<br />

by a SQL-injection vulnerability, because the application makes it possible to create a<br />

bookmark which would be executed unintentionally by other users.<br />

Solution: Upgrade to phpMyAdmin 2.11.11.3, 3.3.9.2, or later.<br />

CVE-2011-0987<br />

MySQL Eventum < 2.3.1 Multiple HTML Injection Vulnerabilities<br />

<strong>PVS</strong> ID: 5798 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:52054<br />

Description: Synopsis : \n\nThe remote web server hosts a web application that is affected by multiple<br />

cross-site scripting vulnerability.\n\nThe remote web server host MySQL Eventum, a<br />

web-based issue tracking application. For your information, the observed version of<br />

MySQL Eventum is : \n %L \n\nVersions of MySQL Eventum earlier than 2.3.1 are<br />

potentially affected by multiple cross-site scripting vulnerabilities : \n\n - The application<br />

fails to properly sanitize user-supplied input to the 'keywords' parameter of the 'list.php'<br />

script.\n\n - The application fails to properly sanitize user-supplied input to the<br />

'REQUEST_URI' variable of the 'forgot_password.php' and 'select_project.php' scripts.<br />

Solution: Upgrade to MySQL Eventum 2.3.1 or later.<br />

CVE Not available<br />

Web Server HttpOnly Cookies Not In Use<br />

<strong>PVS</strong> ID: 5799 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote server does not adequately protect data stored with<br />

cookies\n\nBased on the HTTP 'Cookie' header, <strong>PVS</strong> has determined that the remote server<br />

is not using the 'HttpOnly' cookie setting. By not using this setting, client side script can<br />

access the cookie. This can allow attackers to access cookies with potentially confidential<br />

data.<br />

Family Internet Services 1572


Solution: Configure your web server or application to use the 'HttpOnly' tag.<br />

CVE Not available<br />

Web Server CSS Hosted on 3rd-party Server<br />

<strong>PVS</strong> ID: 5800 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server utilizes Cascading Style Sheets (CSS) on it's pages. Further, the<br />

web server seems to be using CSS from an external source. This can be a risk in that script<br />

code can be embedded within the CSS which would potentially execute within the user<br />

browser. The source of the CSS is: \n %L \n\nThe CSS is embedded within the following<br />

web document: \n%P<br />

Solution: Ensure that loading client-side CSS from a 3rd party is authorized with respect to policies<br />

and guidelines.<br />

CVE Not available<br />

Web Site Cross-Domain Policy File Detection<br />

<strong>PVS</strong> ID: 5801 FAMILY: Policy RISK: INFO NESSUS ID:32318<br />

Description: The remote web server contains a 'crossdomain.xml' file. This is a simple XML file used by<br />

Adobe's Flash Player to allow access to data that resides outside the exact web domain from<br />

which a Flash movie file originated. The source of the XML file is: \n %L \n\nThe file can<br />

be found at : %P<br />

Solution: Review the contents of the policy file carefully. Improper policies, especially an<br />

unrestricted one with just '*', could allow for cross-site request forgery and cross-site<br />

scripting attacks against the web server.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Asterisk main/udptl.c Buffer Overflows (AST-2011-002)<br />

<strong>PVS</strong> ID: 5802 FAMILY: Generic RISK: HIGH NESSUS ID:52157<br />

Description: Synopsis : \n\nThe remote VoIP server is affected by multiple buffer overflow<br />

vulnerabilities.\n\nFor your information, the observed version of Asterisk is : \n %L<br />

\n\nThe version of Asterisk running on the remote host may be vulnerable to heap- and<br />

stack-buffer overflow attacks with specially crafted UDPTL packets.\n\nSuccessful<br />

exploitation requires T.38 support to be enabled on the target, which is not the default, and<br />

can allow execution of arbitrary code in the context of the Asterisk server or an application<br />

crash.<br />

Solution: Upgrade to Asterisk 1.4.39.2, 1.6.1.22, 1.6.2.16.2, 1.8.2.4, or later or Asterisk Business<br />

Edition C.3.6.3 or later.\nAlternatively, disable T.38 support by setting 't38pt_udptl' to 'no'<br />

in sip.conf and ensuring that the chan_ooh323 module is not loaded.<br />

Family Internet Services 1573


CVE-2011-1147<br />

BIND 9.7.1-9.7.2-P3 IXFR /DDNS Update Combinded with High Query Rate DoS<br />

<strong>PVS</strong> ID: 5803 FAMILY: DNS Servers RISK: HIGH NESSUS ID:52158<br />

Description: Synopsis : \n\nThe remote DNS server is vulnerable to a denial of service attack.\n\nThe<br />

remote host is running Bind, a popular name server. For your information, the observed<br />

version of Bind is : \n %L \n\nVersions of Bind 9.7.1-9.7.2-P3 are affected by a denial of<br />

service vulnerability. There is a small window of time after an authoritative server<br />

processes a successful IXFR transfer or a dynamic update during which the IXFR / update<br />

coupled with a query may cause a deadlock to occur. A server experiencing a high query<br />

and/or update rate will have a higher chance of being deadlocked.<br />

Solution: Upgrade to BIND 9.7.3 or later.<br />

CVE-2011-0414<br />

Email Attachment Detection (client)<br />

<strong>PVS</strong> ID: 5804 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host sent an email with the following attachment<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Symantec Enterprise AV Client Detection<br />

<strong>PVS</strong> ID: 5805 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is an Symantec Enterprise AV client<br />

Solution: N/A<br />

CVE Not available<br />

iTunes < 10.2 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5806 FAMILY: Web Clients RISK: HIGH NESSUS ID:52535<br />

Description: Synopsis :\n\nThe remote host contains an application that is vulnerable to multiple attack<br />

vectors.\n\nThe remote host has iTunes installed, a popular media player for Windows and<br />

Mac OS. For your information, the observed version of iTunes is %L.\n\nVersions of<br />

iTunes earlier than 10.2 are potentially affected by numerous issues in the following<br />

components :\n\n - ImageIO\n\n - libxml\n\n - WebKit\n\nNote that these issues only affect<br />

iTunes on Windows.<br />

Family Internet Services 1574


Solution: Upgrade to iTunes 10.2 or later.<br />

CVE-2011-0192<br />

Google Chrome < 9.0.597.107 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5807 FAMILY: Web Clients RISK: HIGH NESSUS ID:52501<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Google Chrome is<br />

%L.\n\nVersions of Google Chrome earlier than 9.0.597.107 are potentially affected by<br />

multiple vulnerabilities :\n\n - An unspecified error exists in the URL bar operations which<br />

can allow spoofing attacks. (54262)\n\n - An unspecified error exists in the processing of<br />

JavaScript dialogs. (63732)\n\n - An unspecified error exists in the processing of CSS<br />

nodes which can leave stale pointers in memory. (68263)\n\n - An unspecified error exists<br />

in the processing of key frame rules which can leave stale pointers in memory. (68741)\n\n<br />

- An unspecified error exists in the processing of form controls which can lead to<br />

application crashes. (70078)\n\n - An unspecified error exists in the rendering of SVG<br />

animations and other SVG content which can leave stale pointers in memory. (70244,<br />

71296)\n\n - An unspecified error exists in the processing of tables which can leave stale<br />

nodes behind. (71114)\n\n - An unspecified error exists in the processing of tables which<br />

can leave stale pointers in memory. (71115)\n\n - An unspecified error exists in the<br />

processing of XHTML which can leave stale nodes behind. (71386)\n\n - An unspecified<br />

error exists in the processing of textarea elements which can lead to application crashes.<br />

(71388)\n\n - An unspecified error exists in the processing of device orientation which can<br />

leave stale pointers in memory. (71595)\n\n - An unspecified error exists in WebGL which<br />

allows out-of-bounds memory accesses. (71717, 71960)\n\n - An integer overflow exists in<br />

the processing of textarea elements which can lead to application crashes. (71855)\n\n - A<br />

use-after-free error exists in the processing of blocked plugins. (72437)\n\n - An<br />

unspecified error exists int he processing of layouts which can leave stale pointers in<br />

memory. (73235)<br />

Solution: Upgrade to Google Chrome 9.0.597.107 or later.<br />

CVE-2011-1125<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Firefox 3.6.x < 3.6.14 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5808 FAMILY: Web Clients RISK: HIGH NESSUS ID:52531<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Firefox is<br />

:%L.\n\nVersions of Firefox 3.6.x earlier than 3.6.14 are potentially affected by multiple<br />

vulnerabilities :\n\n - Multiple memory corruption issues exists which could lead to<br />

arbitrary code execution. (MFSA 2011-01)\n\n - An error exists in the processing of<br />

recusrive calls to 'eval()' when the call is wrapped in a try/catch statement. This error causes<br />

dialog boxes to be displayed with no content and non-functioning buttons. Closing the<br />

dialog results in default acceptance of the dialog. (MFSA 2011-02)\n\n - A use-after-free<br />

error exists in a method used by 'JSON.stringify' and can allow arbitrary code execution.<br />

(MFSA 2011-03)\n\n - A buffer-overflow vulnerability exists in the JavaScript engine's<br />

internal memory mapping of non-local variables and may lead to cde execution. (MFSA<br />

Family Internet Services 1575


2011-04)\n\n - A buffer overflow vulnerability exists in the JavaScript engine's internal<br />

mapping of string values and may lead to code execution. (MFSA 2011-05)\n\n - A<br />

use-after-free error exists such that a JavaScript 'Worker' can be used to keep a reference to<br />

an object which can be freed during garbage collection. This vulnerability may lead to<br />

arbitrary code execution. (MFSA 2011-06)\n\n - A buffer overflow error exists related to<br />

the creation of very long strings and the insertion of those strings into an HTML document.<br />

This vulnerability may lead to arbitrary code execution. (MFSA 2011-07)\n\n - An input<br />

validation error exists int he class, 'ParanoidFragmentSink', which allows inline JavaScript<br />

and 'javascript:' URLs in a chrome document. Note that no unsafe usage occurs in Mozilla<br />

products, however community generated extensions could. (MFSA 2011-08)\n\n - A buffer<br />

overflow exist related to JPEG decoding and may lead to arbitrary code execution. (MFSA<br />

2011-09)\n\n - A cross-site request forgery (CSRF) vulnerability exists when an HTTP 307<br />

redirect is received in response to a plugin's request. The request is forwarded to the new<br />

location without the plugin's knowledge and with custom headers intact, even across<br />

origins. (MFSA 2011-10)<br />

Solution: Upgrade to Firefox 3.6.14 or later.<br />

CVE-2011-0062<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Firefox 3.5.x < 3.5.17 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5809 FAMILY: Web Clients RISK: HIGH NESSUS ID:52530<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Firefox is<br />

:%L.\n\nVersions of Firefox 3.5.x earlier than 3.5.17 are potentially affected by multiple<br />

vulnerabilities :\n\n - Multiple memory corruption issues exists which could lead to<br />

arbitrary code execution. (MFSA 2011-01)\n\n - An error exists in the processing of<br />

recusrive calls to 'eval()' when the call is wrapped in a try/catch statement. This error causes<br />

dialog boxes to be displayed with no content and non-functioning buttons. Closing the<br />

dialog results in default acceptance of the dialog. (MFSA 2011-02)\n\n - A use-after-free<br />

error exists in a method used by 'JSON.stringify' and can allow arbitrary code execution.<br />

(MFSA 2011-03)\n\n - A buffer-overflow vulnerability exists in the JavaScript engine's<br />

internal memory mapping of non-local variables and may lead to cde execution. (MFSA<br />

2011-04)\n\n - A buffer overflow vulnerability exists in the JavaScript engine's internal<br />

mapping of string values and may lead to code execution. (MFSA 2011-05)\n\n - A<br />

use-after-free error exists such that a JavaScript 'Worker' can be used to keep a reference to<br />

an object which can be freed during garbage collection. This vulnerability may lead to<br />

arbitrary code execution. (MFSA 2011-06)\n\n - A buffer overflow error exists related to<br />

the creation of very long strings and the insertion of those strings into an HTML document.<br />

This vulnerability may lead to arbitrary code execution. (MFSA 2011-07)\n\n - An input<br />

validation error exists int he class, 'ParanoidFragmentSink', which allows inline JavaScript<br />

and 'javascript:' URLs in a chrome document. Note that no unsafe usage occurs in Mozilla<br />

products, however community generated extensions could. (MFSA 2011-08)\n\n - A<br />

cross-site request forgery (CSRF) vulnerability exists when an HTTP 307 redirect is<br />

received in response to a plugin's request. The request is forwarded to the new location<br />

without the plugin's knowledge and with custom headers intact, even across origins.<br />

(MFSA 2011-10)<br />

Family Internet Services 1576


Solution: Upgrade to Firefox 3.5.17 or later.<br />

CVE-2011-0059<br />

Mozilla Thunderbird 3.1.x < 3.1.8 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5810 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:52532<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Thunderbird is<br />

:%L.\n\nVersions of Thunderbird 3.1.x earlier than 3.1.8 are potentially affected by<br />

multiple vulnerabilities :\n\n - Multiple memory corruption issues exists which could lead<br />

to arbitrary code execution. (MFSA 2011-01)\n\n - An input validation error exists int he<br />

class, 'ParanoidFragmentSink', which allows inline JavaScript and 'javascript:' URLs in a<br />

chrome document. Note that no unsafe usage occurs in Mozilla products, however<br />

community generated extensions could. (MFSA 2011-08)\n\n - A buffer overflow exist<br />

related to JPEG decoding and may lead to arbitrary code execution. (MFSA 2011-09)<br />

Solution: Upgrade to Thunderbird 3.1.8 or later.<br />

CVE-2011-0062<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla SeaMonkey 2.0.x < 2.0.12 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5811 FAMILY: Web Clients RISK: HIGH NESSUS ID:52533<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of SeaMonkey is<br />

:%L.\n\nVersions of SeaMonkey 2.0.x earlier than 2.0.12 are potentially affected by<br />

multiple vulnerabilities :\n\n - Multiple memory corruption issues exists which could lead<br />

to arbitrary code execution. (MFSA 2011-01)\n\n - An error exists in the processing of<br />

recusrive calls to 'eval()' when the call is wrapped in a try/catch statement. This error causes<br />

dialog boxes to be displayed with no content and non-functioning buttons. Closing the<br />

dialog results in default acceptance of the dialog. (MFSA 2011-02)\n\n - A use-after-free<br />

error exists in a method used by 'JSON.stringify' and can allow arbitrary code execution.<br />

(MFSA 2011-03)\n\n - A buffer-overflow vulnerability exists in the JavaScript engine's<br />

internal memory mapping of non-local variables and may lead to cde execution. (MFSA<br />

2011-04)\n\n - A buffer overflow vulnerability exists in the JavaScript engine's internal<br />

mapping of string values and may lead to code execution. (MFSA 2011-05)\n\n - A<br />

use-after-free error exists such that a JavaScript 'Worker' can be used to keep a reference to<br />

an object which can be freed during garbage collection. This vulnerability may lead to<br />

arbitrary code execution. (MFSA 2011-06)\n\n - A buffer overflow error exists related to<br />

the creation of very long strings and the insertion of those strings into an HTML document.<br />

This vulnerability may lead to arbitrary code execution. (MFSA 2011-07)\n\n - An input<br />

validation error exists int he class, 'ParanoidFragmentSink', which allows inline JavaScript<br />

and 'javascript:' URLs in a chrome document. Note that no unsafe usage occurs in Mozilla<br />

products, however community generated extensions could. (MFSA 2011-08)\n\n - A<br />

cross-site request forgery (CSRF) vulnerability exists when an HTTP 307 redirect is<br />

received in response to a plugin's request. The request is forwarded to the new location<br />

without the plugin's knowledge and with custom headers intact, even across origins.<br />

(MFSA 2011-10)<br />

Family Internet Services 1577


Solution: Upgrade to SeaMonkey 2.0.12 or later.<br />

CVE-2011-0062<br />

Google Chrome < 10.0.648.127 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5812 FAMILY: Web Clients RISK: HIGH NESSUS ID:52589<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Google Chrome is<br />

%L.\n\nVersions of Google Chrome earlier than 10.0.648.127 are potentially affected by<br />

multiple vulnerabilities :\n\n - It may be possible to navigate or close the top location in a<br />

sandboxed frame. (42574, 42765)\n\n - An X server bug exists which could cause the<br />

application to crash with long messages. Note that this issue only affects Google Chrome<br />

on Linux. (49747)\n\n - It is possible to crash the browser with parallel prints. Note that this<br />

issue only affects Google Chrome on Linux. (66962)\n\n - A cross-origin error message<br />

leak exists (69187)\n\n - A memory corruption issue exists with counter nodes. (69628)\n\n<br />

- An unspecified issue exists with stale nodes in box layout. (70027)\n\n - A cross-origin<br />

error message leak exists with workers. (70336)\n\n - A use-after-free error exists with<br />

DOM URL handling. (70442)\n\n - An out-of-bounds read exists when handling unicode<br />

ranges. (70779)\n\n - A same origin policy bypass exists in V8. (70877)\n\n - It may be<br />

possible to bypass the pop-up blocker. (70885, 71167)\n\n - A use-after-free error exists in<br />

document script lifetime handling. (71763)\n\n - An out-of-bounds write issue exists in the<br />

OGG container. (71788)\n\n - A stale pointer exists in table painting. (72028)\n\n - A<br />

corrupt out-of-bounds structure may be used in video code. (73026)\n\n - It may be possible<br />

to crash the application with the DataView object. (73066)\n\n - A bad cast exists in text<br />

rendering. (73134)\n\n - A stale pointer exists in the WebKit context code. (73196)\n\n - It<br />

may be possible for heap addresses to leak in XSLT. (73716)\n\n - A stale pointer exists<br />

with SVG cursors. (73746)\n\n - It is possible for the DOM tree to be corrupted with<br />

attribute handling. (74030)\n\n - An unspecified corruption exists via re-entrancy of<br />

RegExp code. (74662)\n\n - An invalid memory access exists in v8. (74675)<br />

Solution: Upgrade to Google Chrome 10.0.648.127 or later.<br />

CVE-2011-1413<br />

Safari < 5.0.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5813 FAMILY: Web Clients RISK: HIGH NESSUS ID:52613<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Safari is %L.\n\nThe remote host<br />

has Safari installed. For your information, the observed version of Safari is<br />

%L.\n\nVersions of Safari earlier than 5.0.4 are potentially affected by several issues in the<br />

following component :\n\n - ImageIO\n\n - libxml\n\n - WebKit<br />

Solution: Upgrade to Safari 5.0.4 or later.<br />

CVE-2011-0192<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1578


Apple iPhone/iPad OS < 4.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5814 FAMILY: Mobile Devices RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is an iPhone, iPod Touch, or iPad running iOS. For your information, the observed version<br />

of iOS is %L.\n\nVersions of iOS earlier than 4.3 are potentially affected by multiple<br />

vulnerabilities. iOS 4.3 contains security fixes for the following products :\n\n -<br />

CoreGraphics\n\n - ImageIO\n\n - libxml\n\n - <strong>Network</strong>ing\n\n - Safari\n\n - WebKit\n\n -<br />

Wi-Fi<br />

Solution: Upgrade to iOS 4.3 or later.<br />

CVE-2011-0192<br />

Dropbox Client Retrieval Detection<br />

<strong>PVS</strong> ID: 5815 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: Dropbox is a service to allow the transfer of large files which often cannot (or should not)<br />

be transferred via email. The remote host retrieved the following file from dropbox.com :<br />

%L<br />

Solution: N/A<br />

CVE Not available<br />

Apache Tomcat 7.0.x < 7.0.11 <strong>Security</strong> Bypass Vulnerability<br />

<strong>PVS</strong> ID: 5816 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:52634<br />

Description: Synopsis : \n\nThe remote web server is affected by security bypass vulnerability.\n\nFor<br />

your information, the observed version of Apache Tomcat installed on the remote host is :<br />

\n %L \n\nVersions of Tomcat 7.0.x earlier than 7.0.11 are potentially affected by a<br />

security bypass vulnerability. When a web application is started, 'Servlet<strong>Security</strong>'<br />

annotations might be ignored which could lead to some areas of the application not being<br />

protected as expected.<br />

Solution: Upgrade to Apache Tomcat 7.0.11 or later.<br />

CVE-2011-1419<br />

Facebook Chat Client Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5817 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Facebook chat application.<br />

Solution: Ensure this software meets corporate guidelines for employee use.<br />

Family Internet Services 1579


CVE Not available<br />

Google Chrome < 10.0.648.133 Code Execution Vulnerability<br />

<strong>PVS</strong> ID: 5818 FAMILY: Web Clients RISK: HIGH NESSUS ID:52657<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by a code execution<br />

vulnerability.\n\nFor your information, the observed version of Google Chrome is<br />

%L.\n\nVersions of Google Chrome earlier than 10.0.648.133 are potentially affected by a<br />

memory corruption vulnerability in style handling. By tricking a user into opening a<br />

specially crafted web page, a remote unauthenticated attacker could execute arbitrary script<br />

code on the host subject to the privileges of the user running the affected application.<br />

Solution: Upgrade to Google Chrome 10.0.648.133 or later.<br />

CVE-2011-1290<br />

Facebook Chat Client Username Detection<br />

<strong>PVS</strong> ID: 5819 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Facebook chat application. The logged UserID associated<br />

with this client account is : %P<br />

realtime<br />

Solution: Ensure this software meets corporate guidelines for employee use.<br />

CVE Not available<br />

Social <strong>Security</strong> Number Cleartext Transmission (Client)<br />

<strong>PVS</strong> ID: 5820 FAMILY: Data Leakage RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote client sent a plaintext message which seems to contain a Social <strong>Security</strong><br />

Number. Examine the following for possible confidential data : %L<br />

realtimeonly<br />

Solution: Ensure that confidential data is encrypted while in transit<br />

CVE Not available<br />

Social <strong>Security</strong> Number Cleartext Transmission (Client)<br />

<strong>PVS</strong> ID: 5821 FAMILY: Data Leakage RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote client sent a plaintext message which seems to contain a Social <strong>Security</strong><br />

Number. Examine the following for possible confidential data : %L<br />

realtimeonly<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1580


Solution: Ensure that confidential data is encrypted while in transit<br />

CVE Not available<br />

Social <strong>Security</strong> Number Cleartext Transmission (Client)<br />

<strong>PVS</strong> ID: 5822 FAMILY: Data Leakage RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote client sent a plaintext message which seems to contain a Social <strong>Security</strong><br />

Number. Examine the following for possible confidential data : %L<br />

realtimeonly<br />

Solution: Ensure that confidential data is encrypted while in transit<br />

CVE Not available<br />

Google Chrome < 10.0.648.134 Code Execution Vulnerability<br />

<strong>PVS</strong> ID: 5823 FAMILY: Web Clients RISK: HIGH NESSUS ID:52713<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by a code execution<br />

vulnerability.\n\nFor your information, the observed version of Google Chrome is<br />

%L.\n\nVersions of Google Chrome earlier than 10.0.648.134 contain a vulnerable version<br />

of Adobe Flash Player. remote attacker could exploit this by tricking a user into viewing<br />

unspecified, malicious SWF content, resulting in arbitrary code execution. Note that this<br />

issue is currently being exploited in the wild.<br />

Solution: Upgrade to Google Chrome 10.0.648.134 or later.<br />

CVE-2011-0609<br />

PHP 5.3 < 5.3.6 String To Double Conversion DoS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5824 FAMILY: Web Servers RISK: HIGH NESSUS ID:52717<br />

Description: Synopsis : \n\nThe remote web server uses a version of PHP that is affected by a denial of<br />

service vulnerability.\n\nFor your information, the version of PHP installed on the remote<br />

host is : \n %L \n\nVersions of PHP 5.3 earlier than 5.3.6 are potentially affected by<br />

multiple vulnerabilities : \n\n - An error exists in the function '_zip_name_locate()' in the<br />

file 'ext/zip/lib/zip_name_locate.c' which allows a NULL pointer to be dereferenced when<br />

processing an empty archive. (CVE-2011-0421)\n\n - A variable casting error exists in the<br />

Exif extension's C function 'exif_process_IFD_TAG()' in the file 'ext/exif/exif.c' could<br />

allow arbitrary code execution. (CVE-2011-0708)\n\n - An integer overflow vulnerability<br />

exists in the implementation of the PHP function 'shmop_read' in the file<br />

'ext/shmop/shmop.c'. (CVE-2011-1092)\n\n - An error exists in the file 'phar/phar_object.c'<br />

n which calls to 'zend_throw_exception_ex()' pass data as a string format parameter which<br />

could lead to information disclosure or memory corruption when handling PHP archives.<br />

(CVE-2011-1153)\n\n - A buffer overflow error exists in the C function<br />

'xbuf_format_converter' in the file 'main/snprintf.c' when the PHP configuration setting for<br />

Family Internet Services 1581


'precision' is set to a large value. (Bug 54055)\n\n - An unspecified error exists in the<br />

security enforcement regarding the parsing of the fastcgi protocol with the 'FastCGI<br />

Process Manager' (FPM) SAPI.<br />

Solution: Upgrade to PHP version 5.3.6 or later.<br />

CVE-2011-1471<br />

Asterisk Multiple Denial of Service Vulnerabilities (AST-2011-003/AST-2011-004)<br />

<strong>PVS</strong> ID: 5825 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:52714<br />

Description: Synopsis : \n\nThe remote VoIP server is affected by denial of service<br />

vulnerabilities.\n\nFor your information, the observed version of Asterisk is : \n %L<br />

\n\nThe version of Asterisk running on the remote host may be vulnerable to multiple<br />

denial of service vulnerabilities : \n\n - A resource exhaustion issue exists in the Asterisk<br />

manager interface. (AST-2011-003)\n\n - A NULL pointer dereference issue exists in the<br />

TCP/TLS server. (AST-2011-004)<br />

Solution: Upgrade to Asterisk 1.6.1.24, 1.6.2.17.2, 1.8.3.2, or later.<br />

CVE-2011-1175<br />

Mac OS X 10.6 < 10.6.7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5826 FAMILY: Generic RISK: HIGH NESSUS ID:52754<br />

Description: Synopsis :\n\nThe remote host is missing a Mac OS X update that fixes a security<br />

issue.\n\nFor your information, the observed version of Mac OS X is %L.\n\nVersions of<br />

Mac OS X 10.6 earlier than 10.6.7 are potentially affected by a security issue. Mac OS X<br />

10.6.7 contains a security fix for the following products :\n\n - Airport\n\n - Apache\n\n -<br />

AppleScript\n\n - ATS\n\n - bzip2\n\n - CarbonCore\n\n - ClamAV\n\n - CoreText\n\n -<br />

HFS\n\n - ImageIO\n\n - Image RAW\n\n - Installer\n\n - Kerberos\n\n - Kernel\n\n -<br />

Libinfo\n\n - libxml\n\n - Mailman\n\n - PHP\n\n - QuickLook\n\n - QuickTime\n\n -<br />

Ruby\n\n - Samba\n\n - Subversion\n\n - Terminal\n\n - X11\nIAVB Reference :<br />

2010-B-0083\nIAVB Reference : 2010-B-0106\nSTIG Finding Severity : Category I<br />

Solution: Upgrade to Mac OS X 10.6.7 or later.<br />

CVE-2011-1417<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Flash Player < 10.2.152.33 Unspecified Memory Corruption (APSB11-05)<br />

<strong>PVS</strong> ID: 5827 FAMILY: Web Clients RISK: HIGH NESSUS ID:52673<br />

Description: Synopsis : \n\nThe remote host contains a browser plug-in that is affected by a memory<br />

corruption vulnerability.\n\nThe remote host has Adobe Flash Player installed. For your<br />

information, the observed version of Adobe Flash Player is : \n %L .\n\nVersions of Flash<br />

Player earlier than 10.2.152.33 are potentially affected by an unspecified memory<br />

corruption vulnerability. A remote attacker could exploit this by tricking a user into<br />

Family Internet Services 1582


viewing maliciously crafted SWF content, resulting in arbitrary code.\n\nThis bug is<br />

currently being exploited in the wild.<br />

Solution: Upgrade to Flash Player 10.2.152.33 or later.<br />

CVE-2011-0609<br />

Credit Card Number Cleartext Transmission (Client)Social <strong>Security</strong> Number Cleartext Transmission<br />

(Client)<br />

<strong>PVS</strong> ID: 5828 FAMILY: Data Leakage RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote client sent a plaintext message which seems to contain a Social <strong>Security</strong><br />

Number. Examine the following for possible confidential data : %L<br />

realtimeonly<br />

Solution: Ensure that confidential data is encrypted while in transit<br />

CVE Not available<br />

Credit Card Number Cleartext Transmission (Client)<br />

<strong>PVS</strong> ID: 5829 FAMILY: Data Leakage RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote client sent a plaintext message which seems to contain a Social <strong>Security</strong><br />

Number. Examine the following for possible confidential data : %L<br />

realtimeonly<br />

Solution: Ensure that confidential data is encrypted while in transit<br />

CVE Not available<br />

Credit Card Number Cleartext Transmission (Client)<br />

<strong>PVS</strong> ID: 5830 FAMILY: Data Leakage RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote client sent a plaintext message which seems to contain a Social <strong>Security</strong><br />

Number. Examine the following for possible confidential data : %L<br />

realtimeonly<br />

Solution: Ensure that confidential data is encrypted while in transit<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Credit Card Number Cleartext Transmission (Client)<br />

<strong>PVS</strong> ID: 5831 FAMILY: Data Leakage RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1583


Description: The remote client sent a plaintext message which seems to contain a Social <strong>Security</strong><br />

Number. Examine the following for possible confidential data : %L<br />

realtimeonly<br />

Solution: Ensure that confidential data is encrypted while in transit<br />

CVE Not available<br />

Credit Card Number Cleartext Transmission (Client)<br />

<strong>PVS</strong> ID: 5832 FAMILY: Data Leakage RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote client sent a plaintext message which seems to contain a Social <strong>Security</strong><br />

Number. Examine the following for possible confidential data : %L<br />

realtimeonly<br />

Solution: Ensure that confidential data is encrypted while in transit<br />

CVE Not available<br />

Credit Card Number Cleartext Transmission (Client)<br />

<strong>PVS</strong> ID: 5833 FAMILY: Data Leakage RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote client sent a plaintext message which seems to contain a Credit Card Number.<br />

Examine the following for possible confidential data : %L<br />

realtimeonly<br />

Solution: Ensure that confidential data is encrypted while in transit<br />

CVE Not available<br />

SSL Revoked Certificate Detection<br />

<strong>PVS</strong> ID: 5834 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'Backdoor'<br />

program\n\nThe remote SSL server is using a certificate which has been revoked. The<br />

particular SSL certificate has a serial number of<br />

'\x92\x39\xd5\x34\x8f\x40\xd1\x69\x5a\x74\x54\x70\xe1\xf2\x3f\x43' and an Issuer of<br />

USERTRUST.<br />

Solution: There is a high probability that your server has been compromised. You should manually<br />

inspect and fix this system.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1584


SSL Revoked Certificate Detection<br />

<strong>PVS</strong> ID: 5835 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'Backdoor'<br />

program\n\nThe remote SSL server is using a certificate which has been revoked. The<br />

particular SSL certificate has a serial number of<br />

'\xd8\xf3\x5f\x4e\xb7\x87\x2b\x2d\xab\x06\x92\xe3\x15\x38\x2f\xb0' and an Issuer of<br />

USERTRUST.<br />

Solution: There is a high probability that your server has been compromised. You should manually<br />

inspect and fix this system.<br />

CVE Not available<br />

SSL Revoked Certificate Detection<br />

<strong>PVS</strong> ID: 5836 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'Backdoor'<br />

program\n\nThe remote SSL server is using a certificate which has been revoked. The<br />

particular SSL certificate has a serial number of<br />

'\x72\x03\x21\x05\xc5\x0c\x08\x57\x3d\x8e\xa5\x30\x4e\xfe\xe8\xb0' and an Issuer of<br />

USERTRUST.<br />

Solution: There is a high probability that your server has been compromised. You should manually<br />

inspect and fix this system.<br />

CVE Not available<br />

SSL Revoked Certificate Detection<br />

<strong>PVS</strong> ID: 5837 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'Backdoor'<br />

program\n\nThe remote SSL server is using a certificate which has been revoked. The<br />

particular SSL certificate has a serial number of<br />

'\xb0\xb7\x13\x3e\xd0\x96\xf9\xb5\x6f\xae\x91\xc8\x74\xbd\x3a\xc0' and an Issuer of<br />

USERTRUST.<br />

Solution: There is a high probability that your server has been compromised. You should manually<br />

inspect and fix this system.<br />

CVE Not available<br />

SSL Revoked Certificate Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5838 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1585


Description: Synopsis :\n\nThe remote host has been compromised and is running a 'Backdoor'<br />

program\n\nThe remote SSL server is using a certificate which has been revoked. The<br />

particular SSL certificate has a serial number of<br />

'\xe9\x02\x8b\x95\x78\xe4\x15\xdc\x1a\x71\x0a\x2b\x88\x15\x44\x47' and an Issuer of<br />

USERTRUST.<br />

Solution: There is a high probability that your server has been compromised. You should manually<br />

inspect and fix this system.<br />

CVE Not available<br />

SSL Revoked Certificate Detection<br />

<strong>PVS</strong> ID: 5839 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'Backdoor'<br />

program\n\nThe remote SSL server is using a certificate which has been revoked. The<br />

particular SSL certificate has a serial number of<br />

'\xd7\x55\x8f\xda\xf5\xf1\x10\x5b\xb2\x13\x28\x2b\x70\x77\x29\xa3' and an Issuer of<br />

USERTRUST.<br />

Solution: There is a high probability that your server has been compromised. You should manually<br />

inspect and fix this system.<br />

CVE Not available<br />

SSL Revoked Certificate Detection<br />

<strong>PVS</strong> ID: 5840 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'Backdoor'<br />

program\n\nThe remote SSL server is using a certificate which has been revoked. The<br />

particular SSL certificate has a serial number of<br />

'\x04\x7e\xcb\xe9\xfc\xa5\x5f\x7b\xd0\x9e\xae\x36\xe1\x0c\xae\x1e' and an Issuer of<br />

USERTRUST.<br />

Solution: There is a high probability that your server has been compromised. You should manually<br />

inspect and fix this system.<br />

CVE Not available<br />

SSL Revoked Certificate Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5841 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'Backdoor'<br />

program\n\nThe remote SSL server is using a certificate which has been revoked. The<br />

particular SSL certificate has a serial number of<br />

'\x00\xf5\xc8\x6a\xf3\x61\x62\xf1\x3a\x64\xf5\x4f\x6d\xc9\x58\x7c\x06' and an Issuer of<br />

USERTRUST.<br />

Family Internet Services 1586


Solution: There is a high probability that your server has been compromised. You should manually<br />

inspect and fix this system.<br />

CVE Not available<br />

Mozilla Firefox 3.6.x < 3.6.16 Invalid HTTP Certificates<br />

<strong>PVS</strong> ID: 5842 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:52767<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Firefox is<br />

:%L.\n\nVersions of Firefox 3.6.x earlier than 3.6.16 have an out-of-date SSL certificate<br />

blacklist. A certificate authority (CA) has revoked a number of fraudulent SSL certificates<br />

for several prominent public websites.\n\nIf an attacker can trick someone into using the<br />

affected browser and visiting a malicious site using one of the fraudulent certificates, he<br />

may be able to fool that user into believing the site is a legitimate one. In turn, the user<br />

could send credentials to the malicious site or download and install applications.<br />

Solution: Upgrade to Firefox 3.6.16 or later.<br />

CVE Not available<br />

Mozilla Firefox 3.5.x < 3.5.18 Invalid HTTP Certificates<br />

<strong>PVS</strong> ID: 5843 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:52766<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Firefox is<br />

:%L.\n\nVersions of Firefox earlier than 3.5.18 have an out-of-date SSL certificate<br />

blacklist. A certificate authority (CA) has revoked a number of fraudulent SSL certificates<br />

for several prominent public websites.\n\nIf an attacker can trick someone into using the<br />

affected browser and visiting a malicious site using one of the fraudulent certificates, he<br />

may be able to fool that user into believing the site is a legitimate one. In turn, the user<br />

could send credentials to the malicious site or download and install applications.<br />

Solution: Upgrade to Firefox 3.5.18 or later.<br />

CVE Not available<br />

Mozilla SeaMonkey 2.0.x < 2.0.13 Invalid HTTP Certificates<br />

<strong>PVS</strong> ID: 5844 FAMILY: Web Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:52769<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of SeaMonkey is<br />

:%L.\n\nVersions of SeaMonkey earlier than 2.0.13 have an out-of-date SSL certificate<br />

blacklist. A certificate authority (CA) has revoked a number of fraudulent SSL certificates<br />

Family Internet Services 1587


for several prominent public websites.\n\nIf an attacker can trick someone into using the<br />

affected browser and visiting a malicious site using one of the fraudulent certificates, he<br />

may be able to fool that user into believing the site is a legitimate one. In turn, the user<br />

could send credentials to the malicious site or download and install applications.<br />

Solution: Upgrade to SeaMonkey 2.0.13 or later.<br />

CVE Not available<br />

Google Chrome < 10.0.648.204 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5845 FAMILY: Web Clients RISK: HIGH NESSUS ID:52975<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by a code execution<br />

vulnerability.\n\nFor your information, the observed version of Google Chrome is<br />

%L.\n\nVersions of Google Chrome earlier than 10.0.648.204 are potentially affected by<br />

multiple vulnerabilities :\n\n - A buffer error exists in string handling functions.<br />

(72517)\n\n - A use-after-free error exists in the process for loading frames. (73216)\n\n - A<br />

use-after-free error exists in the processing of HTML Collections. (73595)\n\n - An error<br />

exists in the processing of CSS which leaves stale pointers behind. (74562)\n\n - An<br />

unspecified error allows DOM tree corruption related to broken node-hierarchy.<br />

(74991)\n\n - An error exists in the processing of SVG text which leaves stale pointers<br />

behind. (75170)<br />

Solution: Upgrade to Google Chrome 10.0.648.204 or later.<br />

CVE-2011-1296<br />

VLC Media Player < 1.1.8 Multiple Buffer Overflows<br />

<strong>PVS</strong> ID: 5846 FAMILY: Web Clients RISK: HIGH NESSUS ID:52976<br />

Description: Synopsis :\n\nThe remote host contains an application that allows arbitrary code<br />

execution.\n\nThe remote host contains VLC player, a multi-media application. For your<br />

information, the observed version of VLC is %L.\n\nVersions of VLC media player earlier<br />

than 1.1.8 are potentially affected by buffer overflow vulnerabilities when handling<br />

specially crafted AMV and NSV files, which could result in arbitrary code execution.<br />

Solution: Upgrade to VLC Media Player version 1.1.8 or later.<br />

CVE-2010-3276<br />

Generic Credit Card Signature Detection<br />

<strong>PVS</strong> ID: 5847 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: Generic credit card sigs<br />

Solution: N/A<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1588


CVE Not available<br />

Generic Credit Card Signature Detection<br />

<strong>PVS</strong> ID: 5848 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: Generic credit card sigs<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Generic Credit Card Signature Detection<br />

<strong>PVS</strong> ID: 5849 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: Generic credit card sigs<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Generic Credit Card Signature Detection<br />

<strong>PVS</strong> ID: 5850 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: Generic credit card sigs<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Generic Credit Card Signature Detection<br />

<strong>PVS</strong> ID: 5851 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: Generic credit card sigs<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Generic Credit Card Signature Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1589


<strong>PVS</strong> ID: 5852 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: Generic credit card sigs<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Generic Credit Card Signature Detection<br />

<strong>PVS</strong> ID: 5853 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: Generic credit card sigs<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Generic Credit Card Signature Detection<br />

<strong>PVS</strong> ID: 5854 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: Generic credit card sigs<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Generic Credit Card Signature Detection<br />

<strong>PVS</strong> ID: 5855 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: Generic credit card sigs<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Generic Credit Card Signature Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5856 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1590


Description: Generic credit card sigs<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Generic Credit Card Signature Detection<br />

<strong>PVS</strong> ID: 5857 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: Generic credit card sigs<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Generic Credit Card Signature Detection<br />

<strong>PVS</strong> ID: 5858 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: Generic credit card sigs<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Liferay Portal < 5.2.3 'exportFileName' File Creation Remote Code Execution<br />

<strong>PVS</strong> ID: 5859 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server hosts a web application that is vulnerable to a code<br />

execution attack.\n\nThe remote web server hosts Liferay Portal, a web portal for building<br />

business solutions. For your information, the observed version of Liferay Portal installed on<br />

the remote host is : \n %L \n\nVersions of Liferay Portal earlier than 5.3.2 are potentially<br />

affected by a code execution vulnerability in the Liferay Calendar module. A remote<br />

attacker, who gains poweruser access, can execute arbitrary JSP code on the remote host.<br />

Solution: Upgrade to Liferay Portal 5.2.3 or later.<br />

CVE Not available<br />

Liferay Portal < 6.0.6 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5860 FAMILY: CGI NESSUS ID:Not Available<br />

Family Internet Services 1591


RISK:<br />

MEDIUM<br />

Description: Synopsis : \n\nThe remote web server hosts a web application that is vulnerable to multiple<br />

attack vectors.\n\nThe remote web server hosts Liferay Portal, a web portal for building<br />

business solutions. For your information, the observed version of Liferay Portal installed on<br />

the remote host is : \n %L \n\nVersions of Liferay Portal earlier than 6.0.6 are potentially<br />

affected by multiple vulnerabilities : \n\n - An unspecified command execution<br />

vulnerability exists in the portlet 'XSL content'. (LPS-14726)\n\n - An arbitrary file<br />

disclosure vulnerability exists in XXE. (LPS-14927)\n\n - It is possible to read arbitrary<br />

XSL and XML files on the remote host via the 'file: ///' path. (LPS-13762)\n\n - An<br />

unspecified cross-site scripting vulnerability may exist. (LPS-11506)\n\n - A cross-site<br />

scripting vulnerability exists in message board search. (LPS-12628)<br />

Solution: Upgrade to Liferay Portal 6.0.6 or later.<br />

CVE Not available<br />

Web Server Pornographic Material Detected<br />

<strong>PVS</strong> ID: 5861 FAMILY: Policy<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote server is serving pornographic materials. The observed request<br />

was:\n%P\n\nThe observed response from the web server was\n%L\n<br />

Solution: Ensure that the content on this webserver is in compliance with the standards and policies<br />

regarding web content.<br />

CVE Not available<br />

Web Server Pornographic Material Detected<br />

<strong>PVS</strong> ID: 5862 FAMILY: Policy<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote server is serving pornographic materials. The observed request<br />

was:\n%P\n\nThe observed response from the web server was\n%L\n<br />

Solution: Ensure that the content on this webserver is in compliance with the standards and policies<br />

regarding web content.<br />

CVE Not available<br />

Web Server Pornographic Material Detected<br />

<strong>PVS</strong> ID: 5863 FAMILY: Policy<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 1592


Description: The remote server is serving pornographic materials. The observed request<br />

was:\n%P\n\nThe observed response from the web server was\n%L\n<br />

Solution: Ensure that the content on this webserver is in compliance with the standards and policies<br />

regarding web content.<br />

CVE Not available<br />

Web Server Pornographic Material Detected<br />

<strong>PVS</strong> ID: 5864 FAMILY: Policy<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote server is serving pornographic materials. The observed request<br />

was:\n%P\n\nThe observed response from the web server was\n%L\n<br />

Solution: Ensure that the content on this webserver is in compliance with the standards and policies<br />

regarding web content.<br />

CVE Not available<br />

Web Server Pornographic Material Detected<br />

<strong>PVS</strong> ID: 5865 FAMILY: Policy<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote server is serving pornographic materials. The observed request<br />

was:\n%P\n\nThe observed response from the web server was\n%L\n<br />

Solution: Ensure that the content on this webserver is in compliance with the standards and policies<br />

regarding web content.<br />

CVE Not available<br />

Web Server Pornographic Material Detected<br />

<strong>PVS</strong> ID: 5866 FAMILY: Policy<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote server is serving pornographic materials. The observed request<br />

was:\n%P\n\nThe observed response from the web server was\n%L\n<br />

Solution: Ensure that the content on this webserver is in compliance with the standards and policies<br />

regarding web content.<br />

CVE Not available<br />

Web Server Pornographic Material Detected<br />

<strong>PVS</strong> ID: 5867 FAMILY: Policy<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 1593


Description: The remote server is serving pornographic materials. The observed request<br />

was:\n%P\n\nThe observed response from the web server was\n%L\n<br />

Solution: Ensure that the content on this webserver is in compliance with the standards and policies<br />

regarding web content.<br />

CVE Not available<br />

Web Server Pornographic Material Detected<br />

<strong>PVS</strong> ID: 5868 FAMILY: Policy<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote server is serving pornographic materials. The observed request<br />

was:\n%P\n\nThe observed response from the web server was\n%L\n<br />

Solution: Ensure that the content on this webserver is in compliance with the standards and policies<br />

regarding web content.<br />

CVE Not available<br />

Web Server Pornographic Material Detected<br />

<strong>PVS</strong> ID: 5869 FAMILY: Policy<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote server is serving pornographic materials. The observed request<br />

was:\n%P\n\nThe observed response from the web server was\n%L\n<br />

Solution: Ensure that the content on this webserver is in compliance with the standards and policies<br />

regarding web content.<br />

CVE Not available<br />

Web Server Pornographic Material Detected<br />

<strong>PVS</strong> ID: 5870 FAMILY: Policy<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote server is serving pornographic materials. The observed request<br />

was:\n%P\n\nThe observed response from the web server was\n%L\n<br />

Solution: Ensure that the content on this webserver is in compliance with the standards and policies<br />

regarding web content.<br />

CVE Not available<br />

Web Server Pornographic Material Detected<br />

<strong>PVS</strong> ID: 5871 FAMILY: Policy<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 1594


Description: The remote server is serving pornographic materials. The observed request<br />

was:\n%P\n\nThe observed response from the web server was\n%L\n<br />

Solution: Ensure that the content on this webserver is in compliance with the standards and policies<br />

regarding web content.<br />

CVE Not available<br />

Web Server Pornographic Material Detected<br />

<strong>PVS</strong> ID: 5872 FAMILY: Policy<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote server is serving pornographic materials. The observed request<br />

was:\n%P\n\nThe observed response from the web server was\n%L\n<br />

Solution: Ensure that the content on this webserver is in compliance with the standards and policies<br />

regarding web content.<br />

CVE Not available<br />

Web Server Pornographic Material Detected<br />

<strong>PVS</strong> ID: 5873 FAMILY: Policy<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote server is serving pornographic materials. The observed request<br />

was:\n%P\n\nThe observed response from the web server was\n%L\n<br />

Solution: Ensure that the content on this webserver is in compliance with the standards and policies<br />

regarding web content.<br />

CVE Not available<br />

Web Server Pornographic Material Detected<br />

<strong>PVS</strong> ID: 5874 FAMILY: Policy<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote server is serving pornographic materials. The observed request<br />

was:\n%P\n\nThe observed response from the web server was\n%L\n<br />

Solution: Ensure that the content on this webserver is in compliance with the standards and policies<br />

regarding web content.<br />

CVE Not available<br />

Wikipedia Page 'edit' Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5875 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1595


Description: The remote client was just logged editing the following Wikipedia article: '%L'\nYou<br />

should ensure that such actions are in alignment with Corporate policies and guidelines.<br />

Solution: N/A<br />

CVE Not available<br />

Microsoft .NET Verbose Error Reporting Detection<br />

<strong>PVS</strong> ID: 5876 FAMILY: Policy<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host may give an attacker information useful for future<br />

attacks\n\nThe remote .NET server has enabled verbose error reporting. By default, such<br />

reports are only accessible via localhost (127.0.0.1). If enabled, remote attackers can gain<br />

useful information for future attacks. Information displayed includes: source code, stack<br />

trace, physical path of the application, error codes, and more. In addition, there have been<br />

flaws in the way that .NET 'ValidateRequest' handles malicious inputs. The request which<br />

generated the verbose error was: \n%P\n\nAnd the error was generated in: \n %L<br />

Solution: Disable verbose error reporting in .NET applications<br />

CVE Not available<br />

Web Server iFrame Source Hosted on 3rd-party Server<br />

<strong>PVS</strong> ID: 5877 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server has an iFrame tag which pulls its source from another web server.<br />

The iFrame in question is: %L\n\nThe location of the code which embeds this iFrame is:<br />

%P<br />

Solution: Ensure that the iFrame points to a web server which is a trusted site.<br />

CVE Not available<br />

Joomla! 1.6 < 1.6.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5878 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server has an application that is vulnerable to multiple<br />

attack vectors.\n\nThe remote web server is hosting Joomla!, a content management system<br />

written in PHP. For your information, the observed version of Joomla! is : \n %L<br />

.\n\nVersions of Joomla 1.6 earlier than 1.6.1 are potentially affected by multiple<br />

vulnerabilities : \n\n - An unspecified SQL injection and path disclosure issue.<br />

(20110201)\n\n - An uncaught exception could cause full path disclosure. (20110202)\n\n -<br />

Inadequate checking for double URI encoding could lead to cross-site scripting<br />

vulnerabilities. (20110203)\n\n - Inadequate filtering exposes cross-site scripting<br />

vulnerabilities. (20110204)\n\n - Inadequate access checking leads to information<br />

disclosure. (20110301)\n\n - There is inadequate checking of redirect URLs.<br />

Family Internet Services 1596


(20110302)\n\n - Inadequate filtering causes information disclosure. (20110303)\n\n -<br />

There is inadequate control of which files can be edited by authenticated users.<br />

(20110304)\n\n - Inadequate token checking leads to a cross-site request forgery<br />

vulnerability. (20110305)\n\n - Editor caching can cause a denial of service by filling up<br />

the disk. (20110306)\n\n - Inadequate filtering exposes cross-site scripting vulnerabilities.<br />

(20110307)\n\n - Inadequate token checking leads to a cross-site request forgery<br />

vulnerability. (20110308)<br />

Solution: Upgrade to Joomla! 1.6.1 or later.<br />

CVE Not available<br />

MyBB < 1.4.15 / 1.6 < 1.6.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5879 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:53288<br />

Description: Synopsis : \n\nThe remote web server is running a PHP application that is vulnerable to<br />

multiple attack vectors.\n\nThe remote web server hosts MyBB, a web-based discussion<br />

board application. For your information, the observed version of MyBB is : \n %L<br />

\n\nVersions of MyBB earlier than 1.4.15, or 1.6.x earlier than 1.6.2 are potentially affected<br />

by multiple issues : \n\n - A cross-site scripting vulnerability exists in the modcp.php script.<br />

(1464)\n\n - A cross-site scripting vulnerabililty exists in the 'xmlhttp.php' script.<br />

(1460)\n\n - A cross-site scripting issue exists relating to HTML content in posts. (1422)<br />

Solution: Upgrade to MyBB 1.4.15, 1.6.2, or later.<br />

CVE Not available<br />

LizaMoon Malware Detection<br />

<strong>PVS</strong> ID: 5880 FAMILY: CGI RISK: HIGH NESSUS ID:29871<br />

Description: Synopsis :\n\nThe remote web server seems to have been compromised by<br />

LizaMoon.\n\nThe remote web site seems to link to malicious javascript files hosted on a<br />

third party web site related to the LizaMoon Malware. This typically means that the remote<br />

web site has been compromised, likely through SQL injection, and it may infect its visitors<br />

as well.<br />

Solution: Restore your website to its original state and audit your dynamic pages for SQL injection<br />

vulnerabilities.<br />

CVE Not available<br />

Joomla! 1.5 < 1.5.23 Information Disclosure Vulnerability<br />

<strong>PVS</strong> ID: 5881 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 1597


Description: Synopsis : \n\nThe remote web server has an application that is affected by an information<br />

disclosure vulnerability.\n\nThe remote web server is hosting Joomla!, a content<br />

management system written in PHP. For your information, the observed version of Joomla!<br />

is : \n %L .\n\nVersions of Joomla! 1.5.x earlier than 1.5.23 are potentially affected by an<br />

information disclosure vulnerability caused by insufficient error checking.<br />

Solution: Upgrade to Joomla! 1.5.23 or later.<br />

CVE Not available<br />

Apache Tomcat 7.0.x < 7.0.12 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5882 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:53323<br />

Description: Synopsis : \n\nThe remote web server is affected by security bypass vulnerability.\n\nFor<br />

your information, the observed version of Apache Tomcat installed on the remote host is :<br />

\n %L \n\nVersions of Tomcat 7.0.x earlier than 7.0.12 are potentially affected by multiple<br />

vulnerabilities : \n\n - An information disclosure exists in the HTTP BIO connector.<br />

(CVE-2011-1475)\n\n - A security bypass vulnerability exists due to a regression in the fix<br />

for CVE-2011-1088. Note that this issue only affects Tomcat 7.0.11.(CVE-2011-1183)<br />

Solution: Upgrade to Apache Tomcat 7.0.12 or later.<br />

CVE-2011-1475<br />

VLC Media Player < 1.1.9 Heap Corruption Vulnerability<br />

<strong>PVS</strong> ID: 5883 FAMILY: Web Clients RISK: HIGH NESSUS ID:53405<br />

Description: Synopsis :\n\nThe remote host contains an application that allows arbitrary code<br />

execution.\n\nThe remote host contains VLC player, a multi-media application. For your<br />

information, the observed version of VLC is %L.\n\nVersions of VLC media player earlier<br />

than 1.1.9 are potentially affected by heap corruption vulnerability in the MP4<br />

demultiplexer which could lead to arbitrary code execution.<br />

Solution: Upgrade to VLC Media Player version 1.1.9 or later.<br />

CVE-2011-1684<br />

Facebook Status Update Detection<br />

<strong>PVS</strong> ID: 5884 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Facebook chat application and was just observed updating<br />

their status<br />

realtime<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Solution: Ensure this software meets corporate guidelines for employee use.<br />

Family Internet Services 1598


CVE Not available<br />

Facebook Status Update Detection<br />

<strong>PVS</strong> ID: 5885 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Facebook chat application and was just observed updating<br />

their status to : %L<br />

realtimeonly<br />

Solution: Ensure this software meets corporate guidelines for employee use.<br />

CVE Not available<br />

Real <strong>Network</strong>s RealPlayer < 14.0.3.647 (Build 12.0.1.647) Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5886 FAMILY: Web Clients RISK: HIGH NESSUS ID:53409<br />

Description: Synopsis :\n\nThe remote host is running an application that is vulnerable to multiple attack<br />

vectors.\n\nThe remote host is running RealPlayer, a multi-media application. For your<br />

information, the observed build of RealPlayer is %L.\n\nRealPlayer builds earlier than<br />

12.0.1.647 are potentially affected by multiple code execution vulnerabilities :\n\n - An<br />

error exists in the function 'OpenURLInDefaultBrowser' which mishandles certain file<br />

types and can allow arbitrary code execution via crafted RealPlayer audio or settings<br />

(RNX) files. (CVE-2011-1426)\n\n - A heap based buffer overflow vulnerability exists and<br />

can be exploited when RealPlayer is processing certain Internet Video Recording (IVR)<br />

files. (CVE-2011-1525)<br />

Solution: Upgrade to RealPlayer 14.0.3.647 (Build 12.0.1.647) or later.<br />

CVE-2011-1525<br />

Facebook Profile Edit Detection<br />

<strong>PVS</strong> ID: 5887 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Facebook application and was just observed making<br />

changes to their profile<br />

realtimeonly<br />

Solution: Ensure this software meets corporate guidelines for employee use.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Apple iPhone/iPad OS < 4.3.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5888 FAMILY: Mobile Devices RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1599


Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is an iPhone, iPod Touch, or iPad running iOS. For your information, the observed version<br />

of iOS is %L.\n\nVersions of iOS earlier than 4.3.2 are potentially affected by multiple<br />

vulnerabilities. iOS 4.3.2 contains security fixes for the following products :\n\n -<br />

Certificate Trust Policy\n\n - libxslt\n\n - QuickLook\n\n - WebKit<br />

Solution: Upgrade to iOS 4.3.2 or later.<br />

CVE-2011-1417<br />

Apple iPhone/iPad OS 4.2.5 / 4.2.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5889 FAMILY: Mobile Devices RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is an iPhone, iPod Touch, or iPad running iOS. For your information, the observed version<br />

of iOS is %L.\n\nVersions of iOS 4.2.5 or 4.2.6 are potentially affected by multiple<br />

vulnerabilities. iOS 4.2.7 contains security fixes for the following products :\n\n -<br />

Certificate Trust Policy\n\n - QuickLook\n\n - WebKit<br />

Solution: Upgrade to iOS 4.2.7 or later.<br />

CVE-2011-1417<br />

Safari < 5.0.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5890 FAMILY: Web Clients RISK: HIGH NESSUS ID:53411<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nThe remote host has Safari installed. For your information, the observed version<br />

of Safari is %L.\n\nVersions of Safari earlier than 5.0.5 are potentially affected by several<br />

issues in the following component :\n\n - WebKit<br />

Solution: Upgrade to Safari 5.0.5 or later.<br />

CVE-2011-1344<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Google Chrome < 10.0.648.205 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5891 FAMILY: Web Clients RISK: HIGH NESSUS ID:53392<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by a code execution<br />

vulnerability.\n\nFor your information, the observed version of Google Chrome is<br />

%L.\n\nVersions of Google Chrome earlier than 10.0.648.205 are potentially affected by<br />

multiple vulnerabilities :\n\n - Chrome uses a version of Adobe Flash player that is affected<br />

by an unspecified security vulnerability. (CVE-2011-0611)\n\n - An off-by-three error<br />

exists in the GPU process. (70070)\n\n. - A use-after-free issue exists in the GPU process.<br />

(75629)\n\n - A heap overflow issue exists in the GPU process. (78524)<br />

Solution: Upgrade to Google Chrome 10.0.648.205 or later.<br />

Family Internet Services 1600


CVE-2011-1302<br />

Flash Player < 10.2.159.1 Unspecified Memory Corruption (APSB11-07)<br />

<strong>PVS</strong> ID: 5892 FAMILY: Web Clients RISK: HIGH NESSUS ID:53472<br />

Description: Synopsis : \n\nThe remote host contains a browser plug-in that is affected by a memory<br />

corruption vulnerability.\n\nThe remote host has Adobe Flash Player installed. For your<br />

information, the observed version of Adobe Flash Player is : \n %L .\n\nVersions of Flash<br />

Player earlier than 10.2.159.1 are potentially affected by a memory corruption<br />

vulnerability. By tricking a user on the affected system into opening a specially crafted<br />

document with Flash content, such as a SWF file embedded in a Microsoft Word<br />

document, and attacker can potentially leverage this issue to execute arbitrary code<br />

remotely on the system subject to the user's privileges.\n\nNote that there are reports that<br />

this issue is being exploited in the wild as of April 2011.<br />

Solution: Upgrade to Flash Player 10.2.159.1 or later.<br />

CVE-2011-0611<br />

Joomla! 1.6 < 1.6.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5893 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server has an application that is vulnerable to multiple<br />

attack vectors.\n\nThe remote web server is hosting Joomla!, a content management system<br />

written in PHP. For your information, the observed version of Joomla! is : \n %L<br />

.\n\nVersions of Joomla 1.6 earlier than 1.6.2 are potentially affected by multiple<br />

vulnerabilities : \n\n - Multiple inadequate error checking issues could lead to information<br />

disclosure. (20110402, 20110403)\n\n - Unescaped values in the administrative modal<br />

windows causes potential cross-site scripting vulnerabilities. (20110404)\n\n - Multiple<br />

inadequate filtering issues could lead to cross-site scripting attacks. (20110405,<br />

20110406)\n\n - Inadequate permissions checking could allow unauthorised access.<br />

(20110407)\n\n - Unescaped values in a query could lead to a SQL injection vulnerability.<br />

(20110408)\n\n - Inadequate protection could lead to a clickjacking vulnerability.<br />

(20110409)<br />

Solution: Upgrade to Joomla! 1.6.2 or later.<br />

CVE Not available<br />

iTunes < 10.2.2 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5894 FAMILY: Web Clients RISK: HIGH NESSUS ID:53489<br />

Description: Synopsis :\n\nThe remote host contains an application that is vulnerable to multiple attack<br />

vectors.\n\nThe remote host has iTunes installed, a popular media player for Windows and<br />

Mac OS. For your information, the observed version of iTunes is %L.\n\nVersions of<br />

iTunes earlier than 10.2.2 are potentially affected by several issues :\n\n - An integer<br />

Family Internet Services 1601


overflow issue in the handling of nodesets could lead to a crash or arbitrary code execution.<br />

(CVE-2011-1290)\n\n - A use after free issue in the handling of text nodes could lead to a<br />

crash or arbitrary code execution. (CVE-2011-1344)<br />

Solution: Upgrade to iTunes 10.2.2 or later.<br />

CVE-2011-1344<br />

TodouVA Proxy Detection<br />

<strong>PVS</strong> ID: 5895 FAMILY: Generic RISK: INFO NESSUS ID:10195<br />

Description: Synopsis :\n\nThe remote host is operating an open proxy.\n\nThe remote host is running<br />

the TodouVA proxy. The version installed accepts unauthenticated HTTP requests. By<br />

routing requests through the affected proxy, a user may be able to gain some degree of<br />

anonymity while browsing web sites, which will see requests as originating from the<br />

remote host itself rather than the user's host.<br />

Solution: Make sure access to the proxy is limited to valid users / hosts.<br />

CVE Not available<br />

DB2 9.7 < Fix Pack 4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5896 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:53547<br />

Description: Synopsis :\n\nThe remote database server is vulnerable to multiple attack vectors.\n\nFor<br />

your information, the observed version of IBM DB2 is %L\n\nVersions of IBM DB2 9.7<br />

earlier than Fix Pack 4 are potentially affected by multiple vulnerabilities :\n\n - It may be<br />

possible for users to updates statistics for tables without appropriate privileges.<br />

(IC72119)\n\n - Users continue to have privilege to execute a non-DDL statement after role<br />

membership has been revoked from its group. (IC71375)\nIAVB Reference :<br />

2011-B-0013\nSTIG Finding Severity : Category I<br />

Solution: Upgrade to IBM DB2 9.7 Fix Pack 4 or later.<br />

CVE-2011-1847<br />

Asterisk Multiple Vulnerabilities (AST-2011-005/AST-2011-006)<br />

<strong>PVS</strong> ID: 5897 FAMILY: Generic<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:53544<br />

Description: Synopsis : \n\nThe remote VoIP server is vulnerable to multiple attack vectors.\n\nFor your<br />

information, the observed version of Asterisk is : \n %L \n\nThe version of Asterisk<br />

running on the remote host is potentially affected by multiple issues : \n\n - On systems that<br />

have the Asterisk Manager interface, Skinny, SIP over TCP, or the built in HTTP server<br />

enabled, it is possible for an attacker to open as many connections to asterisk as he wishes<br />

which would cause Asterisk to run out of available file descriptors and stop processing any<br />

new calls. (AST-2011-005)\n\n - It is possible to bypass a security check and execute shell<br />

Family Internet Services 1602


commands when they should not have that ability. Note that only users with the 'system'<br />

privileges should be able to do this. (AST-2011-006)<br />

Solution: Upgrade to Asterisk 1.4.40.1, 1.6.1.25, 1.6.2.17.3, 1.8.3.3, Business Edition C.3.6.4, or<br />

later.<br />

CVE-2011-1599<br />

Skype Detection (User-Agent)<br />

<strong>PVS</strong> ID: 5898 FAMILY: Internet Messengers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy\n\nThe remote host is using the Skype program, a peer to peer chat and<br />

VoIP software. The reported version number is : %L<br />

Solution: Ensure that the use of this software is in accordance with organizational security policies.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Google Chrome < 11.0.696.57 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5899 FAMILY: Web Clients RISK: HIGH NESSUS ID:53569<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by a code execution<br />

vulnerability.\n\nFor your information, the observed version of Google Chrome is<br />

%L.\n\nVersions of Google Chrome earlier than 11.0.696.57 are potentially affected by<br />

multiple vulnerabilities :\n\n - A stale pointer exists in floating point handling. (61502)\n\n<br />

- It may be possible to bypass the pop-up blocker via plug-ins. (70538)\n\n - A linked-list<br />

race issue exists in database handling. Note that this issue only affects Chrome on Linux<br />

and Mac OS. (70589)\n\n - There is a lack of thread safety in MIME handling. (71586)\n\n<br />

- A bad extension with 'tabs' permission can capture local files. (72523)\n\n - It is possible<br />

to crash the browser due to bad interaction with X. Note that this issue only affects Chrome<br />

on Linux. (72910)- Multiple integer overflows exist in float rendering. (73526)\n\n - A<br />

same origin policy violation exists with blobs. (74653)\n\n - A use-after-free error exists<br />

with ruby tags and CSS. (75186)\n\n - A bad cast exists with floating select lists.<br />

(75347)\n\n - Corrupt node trees exists with mutation events. (75801)\n\n - Multiple stale<br />

pointers exist in layering code. (76001)\n\n - A race condition exists in the sandbox<br />

launcher. (76542)\n\n - An out-of-bounds read exists in SVG. (76646)\n\n - It is possible to<br />

spoof the URL bar with navigation errors and interrupted loads. (76666, 77507, 78031)\n\n<br />

- A stale pointer exists in drop-down list handling. (76966)\n\n - A stale pointer exists in<br />

height calculations. (77130)\n\n - A use-after-free error exists in WebSockets. (77346)\n\n -<br />

Multiple dangling pointers exist in file dialogs. (77349)\n\n - Multiple dangling pointers<br />

exist in DOM id map. (77463)\n\n - It is possible to spoof the URL bar with redirect and<br />

manual reload. (77786)\n\n - A use-after-free issue exists in DOM id handling. (79199)\n\n<br />

- An out-of-bounds read exists when handling multipart-encoded PDFs. (79361)\n\n -<br />

Multiple stale pointers exist with PDF forms. (79364)<br />

Solution: Upgrade to Google Chrome 11.0.696.57 or later.<br />

Family Internet Services 1603


CVE-2011-1456<br />

Mozilla Firefox < 3.5.19 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5900 FAMILY: Web Clients RISK: HIGH NESSUS ID:53593<br />

Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox earlier than 3.5.19 are potentially affected by multiple<br />

vulnerabilities : \n\nMultiple memory corruption issues could lead to arbitrary code<br />

execution. (MFSA2011-12)\n\n - Multiple dangling pointer vulnerabilities exist.<br />

(MFSA2011-13)\n\n - A Java applet could be used to mimic interaction with form<br />

autocomplete controls and steal entries from the form history. (MFSA2011-14)\n\n - The<br />

Java Embedding Plugin (JEP) shipped with the Mac OS X versions of Firefox could be<br />

exploited to obtain elevated access to resources on a user's system. (MFSA2011-15)\n\n -<br />

The 'resource: ' protocol could be exploited to allow directory traversal on Windows and<br />

the potential loading of resources from non-permitted locations. (MFSA2011-16)\n\n - The<br />

XSLT 'generate-id()' function returns may return a string that reveals a specific valid<br />

address of an object on the memory heap. (MFSA2011-18)<br />

Solution: Upgrade to Firefox 3.5.19 or later.<br />

CVE-2011-1202<br />

Mozilla Firefox 3.6.x < 3.6.17 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5901 FAMILY: Web Clients RISK: HIGH NESSUS ID:53594<br />

Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox 3.6.x earlier than 3.6.17 are potentially affected by multiple<br />

vulnerabilities : \n\nMultiple memory corruption issues could lead to arbitrary code<br />

execution. (MFSA2011-12)\n\n - Multiple dangling pointer vulnerabilities exist.<br />

(MFSA2011-13)\n\n - A Java applet could be used to mimic interaction with form<br />

autocomplete controls and steal entries from the form history. (MFSA2011-14)\n\n - The<br />

Java Embedding Plugin (JEP) shipped with the Mac OS X versions of Firefox could be<br />

exploited to obtain elevated access to resources on a user's system. (MFSA2011-15)\n\n -<br />

The 'resource: ' protocol could be exploited to allow directory traversal on Windows and<br />

the potential loading of resources from non-permitted locations. (MFSA2011-16)\n\n - The<br />

XSLT 'generate-id()' function returned a string that revealed a specific valid address of an<br />

object on the memory heap. (MFSA2011-18)<br />

Solution: Upgrade to Firefox 3.6.17 or later.<br />

CVE-2011-1202<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Firefox 4.0.x < 4.0.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5902 FAMILY: Web Clients RISK: HIGH NESSUS ID:53595<br />

Family Internet Services 1604


Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox 4.0.x earlier than 4.0.1 are potentially affected by multiple<br />

vulnerabilities : \n\nMultiple memory corruption issues could lead to arbitrary code<br />

execution. (MFSA2011-12)\n\n - Multiple vulnerabilities in the WebGL feature and<br />

WebGLES could be exploited to execute arbitrary code or bypass ASLR protection on<br />

Windows. (MFSA2011-17) - The XSLT 'generate-id()' function returned a string that<br />

revealed a specific valid address of an object on the memory heap. (MFSA2011-18)<br />

Solution: Upgrade to Firefox 4.0.1 or later.<br />

CVE-2011-1202<br />

Mozilla Thunderbird 3.1.x < 3.1.10 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5903 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:53596<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Thunderbird is<br />

:%L.\n\nVersions of Thunderbird 3.1.x earlier than 3.1.10 are potentially affected by<br />

multiple vulnerabilities :\n\n - Multiple memory corruption issues could lead to arbitrary<br />

code execution. (MFSA2011-12)\n\n - The 'resource:' protocol could be exploited to allow<br />

directory traversal on Windows and the potential loading of resources from non-permitted<br />

locations. (MFSA2011-16)<br />

Solution: Upgrade to Thunderbird 3.1.10 or later.<br />

CVE-2011-0081<br />

Mozilla SeaMonkey < 2.0.14 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5904 FAMILY: Web Clients RISK: HIGH NESSUS ID:53597<br />

Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of SeaMonkey is : \n %L<br />

\n\nVersions of SeaMonkey earlier than 2.0.14 are potentially affected by multiple<br />

vulnerabilities : \n\nMultiple memory corruption issues could lead to arbitrary code<br />

execution. (MFSA2011-12)\n\n - Multiple dangling pointer vulnerabilities exist.<br />

(MFSA2011-13)\n\n - A Java applet could be used to mimic interaction with form<br />

autocomplete controls and steal entries from the form history. (MFSA2011-14)\n\n - The<br />

Java Embedding Plugin (JEP) shipped with the Mac OS X versions of SeaMonkey could be<br />

exploited to obtain elevated access to resources on a user's system. (MFSA2011-15)\n\n -<br />

The 'resource: ' protocol could be exploited to allow directory traversal on Windows and<br />

the potential loading of resources from non-permitted locations. (MFSA2011-16)\n\n - The<br />

XSLT 'generate-id()' function returned a string that revealed a specific valid address of an<br />

object on the memory heap. (MFSA2011-18)<br />

Solution: Upgrade to SeaMonkey 2.0.14 or later.<br />

CVE-2011-1202<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1605


HP <strong>Network</strong> Node Manager i (NNMi) Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5905 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host contains a web application that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host contains HP <strong>Network</strong> Node Manager i, a fault<br />

management application.\n\nFor your information, the observed version of HP <strong>Network</strong><br />

Node Manager i is : \n %L \n\nVersions of HP <strong>Network</strong> Node Manager i earlier than<br />

9.01.003 are potentially affected by multiple issues : \n\n - An unspecified vulnerability<br />

allows local users to read arbitrary files via unknown vectors. (CVE-2011-0897)\n\n - A<br />

cross-site scripting vulnerability exists. (CVE-2011-0898)<br />

Solution: Apply the patch supplied by HP.<br />

CVE-2011-0898<br />

IBM Solid Database < 4.5.182 / 6.0.1069 / 6.3.49 / 6.5.0.4 Denial of Service Vulnerability<br />

<strong>PVS</strong> ID: 5906 FAMILY: Database RISK: HIGH NESSUS ID:53812<br />

Description: Synopsis :\n\nThe remote database server is vulnerable to a remote code execution<br />

attack.\n\nThe remote host is running IBM solidDB. For your information, the observed<br />

version of solidDB is :%L.\n\nVersions of solidDB earlier than 4.5.182, 6.0.x earlier than<br />

6.0.1069, 6.3.x earlier than 6.3 Fix Pack 8, and 6.5.x earlier than 6.5.0.4 are potentially<br />

affected by a denial of service vulnerability due to a flaw in the way the application handles<br />

the rpc_test_svc_readwrite and rpc_test_svc_done commands. A remote unauthenticated<br />

attacker, exploiting this flaw, could crash the affected host.<br />

Solution: Upgrade to IBM solidDB 4.5.182, 6.0.1069, 6.3 Fix Pack 8, 6.5 Fix Pack 4, or later.<br />

CVE-2011-1208<br />

Novell File Reporter Agent XML Parsing Remote Code Execution<br />

<strong>PVS</strong> ID: 5907 FAMILY: Generic RISK: HIGH NESSUS ID:53536<br />

Description: Synopsis : \n\nThe remote host contains a service that is vulnerable to a remote buffer<br />

overflow attack.\n\nNovell File Reporter Agent, a tool for identifying files stored on the<br />

network, is installed on the remote host. For your information, the observed version of<br />

Novell File Reporter Agent is : \n %L \n\nVersions of Novell File Reporter Agent earlier<br />

than 1.0.4.2 are potentially affected by a buffer overflow vulnerability because the service,<br />

which listens by default on TCP port 3037, blindly copies user-supplied data into a<br />

fixed-length buffer on the stack when handling the contents of an XML tag. An<br />

unauthenticated remote attacker who can access the agent service can leverage this issue to<br />

execute arbitrary code under the context of the user running the affected application.<br />

Solution: Upgrade to Novell File Reporter 1.0.2, which includes NFR Agent version 1.0.4.2.<br />

CVE-2011-0994<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1606


Oracle Database Client Traffic Detection<br />

<strong>PVS</strong> ID: 5908 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server is running a database client<br />

realtime<br />

Solution: N/A<br />

CVE Not available<br />

Bind9 9.8.0 RRSIG Query Type Remote Denial of Service Vulnerability<br />

<strong>PVS</strong> ID: 5909 FAMILY: DNS Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:53842<br />

Description: Synopsis : \n\nThe remote DNS server is vulnerable to a denial of service attack.\n\nThe<br />

remote host is running Bind, a popular name server. For your information, the observed<br />

version of Bind is : \n %L \n\nBind9 9.8.0 is potentially affected by a denial of service<br />

vulnerability. This issue only affects BIND users who use the RPZ feature configured for<br />

RRset replacement. When RPZ is being used, a query of type RRSIG for a name<br />

configured for RRset replacement will trigger an assertion failure and cause the name<br />

server process to exit.<br />

Solution: Upgrade to BIND 9.8.0-P1 or later.<br />

CVE-2011-1907<br />

Exim < 4.70 string_format Function Remote Overflow<br />

<strong>PVS</strong> ID: 5910 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:51179<br />

Description: Synopsis : \n\nThe remote mail server is vulnerable to a command execution<br />

attack.\n\nThe remote host is running Exim, a message transfer agent. For your<br />

information, the observed version of Exim is : \n %L .\n\nVersions of Exim earlier<br />

than 4.70 are potentially affected by a heap overflow vulnerability. By sending a<br />

specially crafted message to the server, a remote attacker can leverage this<br />

vulnerability to execute arbitrary code on the server subject to the privileges of the<br />

user running the affected application.<br />

Solution: Upgrade to Exim 4.70 or later.<br />

CVE-2010-4344<br />

Exim < 4.76 dkim_exim_verify_finish Remote Format String Vulnerability<br />

<strong>PVS</strong> ID: 5911 FAMILY: SMTP Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:53856<br />

Family Internet Services 1607


Description: Synopsis : \n\nThe remote mail server is vulnerable to a command execution attack.\n\nThe<br />

remote host is running Exim, a message transfer agent. For your information, the observed<br />

version of Exim is : \n %L .\n\nVersions of Exim earlier than 4.76 are potentially affected<br />

by a format string vulnerability in logging DKIM information from an inbound email. By<br />

sending a specially crafted message to the server, a remote attacker can leverage this<br />

vulnerability to execute arbitrary code on the server subject to the privileges of the user<br />

running the affected application.<br />

Solution: Upgrade to Exim 4.76 or later.<br />

CVE-2011-1764<br />

Google Chrome < 11.0.696.68 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5912 FAMILY: Web Clients RISK: HIGH NESSUS ID:53879<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by a code execution<br />

vulnerability.\n\nFor your information, the observed version of Google Chrome is<br />

\n%L.\n\nVersions of Google Chrome earlier than 11.0.696.68 are potentially affected by<br />

multiple vulnerabilities :\n\n - Bad casts exist in Chromium WebKit glue.<br />

(CVE-2011-1799)\n\n - Integer overflows exist in the SVG filters. (CVE-2011-1800)<br />

Solution: Upgrade to Google Chrome 11.0.696.68 or later.<br />

CVE-2011-1800<br />

FTP Client Data Leakage<br />

<strong>PVS</strong> ID: 5913 FAMILY: FTP Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running an FTP client which appears to be leaking the following<br />

confidential data: %L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

FTP Client Data Leakage<br />

<strong>PVS</strong> ID: 5914 FAMILY: FTP Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running an FTP client which appears to be leaking the following<br />

confidential data: %L<br />

Solution: N/A<br />

realtimeonly<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1608


CVE Not available<br />

FTP Client Data Leakage<br />

<strong>PVS</strong> ID: 5915 FAMILY: FTP Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running an FTP client which appears to be leaking the following<br />

confidential data: %L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Flash Player < 10.3.181.14 Multiple Vulnerabilities (APSB11-12)<br />

<strong>PVS</strong> ID: 5916 FAMILY: Web Clients RISK: HIGH NESSUS ID:54299<br />

Description: Synopsis : \n\nThe remote host contains a browser plug-in that is affected by a memory<br />

corruption vulnerability.\n\nThe remote host has Adobe Flash Player installed. For your<br />

information, the observed version of Adobe Flash Player is : \n %L .\n\nVersions of Flash<br />

Player earlier than 10.3.181.14 are potentially affected by multiple vulnerabilities : \n\n - A<br />

design flaw exists that could lead to information disclosure. (CVE-2011-0579)\n\n - An<br />

integer overflow exists that could lead to code execution. (CVE-2011-0618,<br />

CVE-2011-0628)\n\n - Multiple memory corruption issues exist that could lead to code<br />

execution. (CVE-2011-0619, CVE-2011-0620, CVE-2011-0621, CVE-2011-0622,<br />

CVE-2011-0627)\n\n - Multiple bounds checking issues exist that could lead to code<br />

execution. (CVE-2011-0623, CVE-2011-0624, CVE-2011-0625, CVE-2011-0626)<br />

Solution: Upgrade to Flash Player 10.3.181.14 or later.<br />

CVE-2011-0628<br />

FTP Client Data Leakage<br />

<strong>PVS</strong> ID: 5917 FAMILY: FTP Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running an FTP client which appears to be leaking the following<br />

confidential data: %L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

FTP Client Data Leakage<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5918 FAMILY: FTP Clients RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1609


Description: The remote host is running an FTP client which appears to be leaking the following<br />

confidential data: %L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

FTP Client Data Leakage<br />

<strong>PVS</strong> ID: 5919 FAMILY: FTP Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running an FTP client which appears to be leaking the following<br />

confidential data: %L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

FTP Client Data Leakage<br />

<strong>PVS</strong> ID: 5920 FAMILY: FTP Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running an FTP client which appears to be leaking the following<br />

confidential data: %L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

FTP Client Data Leakage<br />

<strong>PVS</strong> ID: 5921 FAMILY: FTP Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running an FTP client which appears to be leaking the following<br />

confidential data: %L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

FTP Client Data Leakage<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5922 FAMILY: FTP Clients RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1610


Description: The remote host is running an FTP client which appears to be leaking the following<br />

confidential data: %L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

FTP Client Data Leakage<br />

<strong>PVS</strong> ID: 5923 FAMILY: FTP Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running an FTP client which appears to be leaking the following<br />

confidential data: %L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Adobe Flash Media server < 3.5.6 / 4.0.2 Multiple Vulnerabilities (APSB11-11)<br />

<strong>PVS</strong> ID: 5924 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:53895<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Adobe Flash Media server. For your information, the observed version of Adobe<br />

Flash Media Sever is : \n %L \n\nVersions of Adobe FLash Media Server earlier than 3.5.6<br />

or 4.0.2 are potentially affected by multiple vulnerabilities : \n\n - A memory corruption<br />

issue exists due to a race condition in the TLS extension code provided by the bundled<br />

version of OpenSSL. (CVE-2010-3864)\n\n - An unspecified error relating to processing<br />

certain XML content could lead to a denial of service. (CVE-2011-0612)<br />

Solution: Upgrade to Flash Media Server 3.5.6, 4.0.2, or later.<br />

CVE-2010-3864<br />

Opera < 11.11 Frameset Memory Corruption<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5925 FAMILY: Web Clients RISK: HIGH NESSUS ID:54587<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is affected by a memory<br />

corruption vulnerability.\n\nThe remote host is running the Opera web browser. For your<br />

information, the observed version of Opera is \n%L\n\nVersions of Opera earlier than<br />

11.11 are potentially affected by a memory corruption vulnerability because the application<br />

does not properly handle specific framesets when unloading a page. An attacker could craft<br />

a web page that will trigger the vulnerability which may allow arbitrary code execution<br />

subject to the privileges of the user running the affected application.<br />

Family Internet Services 1611


Solution: Upgrade to Opera 11.11 or later.<br />

CVE Not available<br />

HP Intelligent Management Center Detection<br />

<strong>PVS</strong> ID: 5926 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host has a network management application installed.\n\nHP<br />

Intelligent Management Center, a network management application, is installed on the<br />

remote host. For your information, the observed version of HP Intelligent Management<br />

Center is : \n %L \n\n<br />

Solution: n/a<br />

CVE Not available<br />

HP Intelligent Management Center < 5.0 E0101-L02 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5927 FAMILY: Generic RISK: HIGH NESSUS ID:54999<br />

Description: Synopsis : \n\nThe remote host has an application installed that is affected by multiple<br />

vulnerabilities.\n\nFor your information, the version of HP Intelligent Management Center<br />

installed on the remote host is : \n %L \n\nVersions of HP Intelligent Management Center<br />

earlier than 5.0 E0101-L02 are potentially affected by multiple vulnerabilities : \n\n - A<br />

stack-based buffer overflow vulnerability exists in the 'img.exe' component.<br />

(CVE-2011-1848)\n\n - An unspecified vulnerability in the 'tftpserver.exe' component<br />

exists which could allow an attacker to create arbitrary files on the server.<br />

(CVE-2011-1849)\n\n - A stack-based buffer overflow vulnerability exists in the<br />

'dbman.exe' component. (CVE-2011-1850)\n\n - Multiple buffer overflow vulnerabilities<br />

exist in the 'tftpserver.exe' component. (CVE-2011-1851, CVE-2011-1852,<br />

CVE-2011-1853)\n\n - A use-after-free vulnerability exists in the 'imcsyslogdm.exe'<br />

component. (CVE-2011-1854)<br />

Solution: Upgrade to HP Intelligent Management Center 5.0 E0101-L02 or later.<br />

CVE-2011-1854<br />

MySQL Community Server 5.1 < 5.1.52 Multiple Denial of Service Vulnerabilities<br />

<strong>PVS</strong> ID: 5928 FAMILY: Database<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:50527<br />

Description: Synopsis : \n\nThe remote database server is vulnerable to multiple attack vectors.\n\nFor<br />

your information, the observed version of MySQL Community Server is : \n %L<br />

\n\nVersions of MySQL Community Server 5.1 earlier than 5.1.52 are potentially affected<br />

by multiple vulnerabilities : \n\n - An error exists in the handling of 'EXPLAIN' for a<br />

'SELECT' statement from a derived table which can cause the server to crash. (54488)\n\n -<br />

An error exists int he handling of 'EXPLAIN EXTENDED' when used in some prepared<br />

statements, which can cause the server to crash. (54494)\n\n - The server does not check the<br />

Family Internet Services 1612


type of values assigned to items of type 'GeometryCollection'. Such assignments can cause<br />

the server to crash. (55531)<br />

Solution: Upgrade to MySQL Community Server 5.1.52 or later.<br />

CVE Not available<br />

Checkpoint Firewall ESMTP Service Detection<br />

<strong>PVS</strong> ID: 5929 FAMILY: SMTP Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Checkpoint Firewall ESMTP server. The banner is: %L<br />

Solution: N/A<br />

CVE Not available<br />

phpMyAdmin 3.3.x < 3.3.10.1 / 3.4.x < 3.4.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5930 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:55023<br />

Description: Synopsis : \n\nThe remote web server contains a PHP application that is vulnerable to<br />

multiple attack vectors.\n\nFor your information, the observed version of phpMyAdmin is :<br />

\n %L \n\nVersions of phpMyAdmin 3.3.x earlier than 3.3.10.1 and 3.4.x earlier than 3.4.1<br />

are potentially affected by multiple vulnerabilities : \n\n - It is possible to create a crafted<br />

table name that could lead to a cross-site scripting attack. (PMASA-2011-3)\n\n - It is<br />

possible to redirect to an arbitrary, untrusted site, leading to a possible phishing site.<br />

(PMASA-2011-4)<br />

Solution: Upgrade to phpMyAdmin 3.3.10.1, 3.4.1, or later.<br />

CVE Not available<br />

Google Chrome < 11.0.696.71 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5931 FAMILY: Web Clients RISK: HIGH NESSUS ID:54647<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by a code execution<br />

vulnerability.\n\nFor your information, the observed version of Google Chrome is<br />

\n%L.\n\nVersions of Google Chrome earlier than 11.0.696.71 are potentially affected by<br />

multiple vulnerabilities :\n\n - It may be possible to bypass the pop-up blocker.<br />

(CVE-2011-1801)\n\n - A stale pointer exists in floats rendering. (CVE-2011-1804)\n\n - A<br />

memory corruption issue exists in the GPU command buffer. (CVE-2011-1806)\n\n - An<br />

out-of-bounds write exists in blob handling. (CVE-2011-1807)<br />

Solution: Upgrade to Google Chrome 11.0.696.71 or later.<br />

CVE-2011-1807<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1613


IBM Tivoli Management Framework Endpoint '/addr' Remote Buffer Overflow<br />

<strong>PVS</strong> ID: 5932 FAMILY: Web Servers RISK: HIGH NESSUS ID:54924<br />

Description: Synopsis : \n\nThe remote host is running a web server that is affected by a buffer overflow<br />

vulnerability.\n\nThe remote host is running IBM Tivoli Endpoint, a component of Tivoli<br />

Management Framework. For your information, the observed version of IBM Tivoli<br />

Endpoint is : \n %L \n\nVersions of IBM Tivoli Endpoint earlier than 4.1.1-LCF-0076 or<br />

4.3.1-LCF-0012LA are potentially affected by a buffer overflow vulnerability because<br />

input to the 'opts' parameter of '/addr' is not properly validated. A remote, authenticated<br />

attacker could exploit this by sending a malicious POST request to the server, resulting in<br />

arbitrary code execution. \nIAVA Reference : 2011-A-0072\nSTIG Finding Severity :<br />

Category I<br />

Solution: Upgrade to Tivoli Endpoint 4.1.1-LCF-0076 / 4.3.1-LCF-0012LA or later. Alternatively,<br />

use the workaround described in the IBM advisory.<br />

CVE-2011-1220<br />

ISC BIND 9 Large RRSIG RRsets Negative Caching Remote DoS<br />

<strong>PVS</strong> ID: 5933 FAMILY: DNS Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:54923<br />

Description: Synopsis : \n\nThe remote DNS server is vulnerable to a denial of service attack.\n\nThe<br />

remote host is running Bind, a popular name server. For your information, the observed<br />

version of Bind is : \n %L \n\nVersions of BIND 9.4 earlier than 9.4-ESV-R4-P1, 9.6<br />

earlier than 9.6-ESV-R4-P1, 9.7 earlier than 9.7.3-P1, and 9.8 earlier than 9.8.0-P2 are<br />

potentially affected by a denial of service vulnerability. If BIND queries a domain with<br />

large RRSIG resource record sets it may trigger an assertion failure and cause the name<br />

server process to crash due to an off-by-one error in the buffer size check.<br />

Solution: Upgrade to BIND 9.4-ESV-R4-P1 / 9.6-ESV-R4-P1, 9.7.3-P1, 9.8.0-P2, or later.<br />

VNC Detection<br />

CVE-2011-1910<br />

<strong>PVS</strong> ID: 5934 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: VNC (Virtual <strong>Network</strong> Computing) is installed on this host on this port. Disable this<br />

service if it is not used actively and for a legitimate purpose.<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Windows RDP / Terminal Services Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1614


<strong>PVS</strong> ID: 5935 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Terminal Services or Remote Desktop Protocol (RDP). This<br />

protocol is used to manage remote servers and is installed, by default, on Windows XP<br />

Systems. An attacker can use this port to brute force the user accounts present on the<br />

server.<br />

realtimeonly<br />

Solution: Ensure that RDP is required for the machine in question.<br />

CVE Not available<br />

<strong>PVS</strong>-SSH-Server-Session_Start<br />

<strong>PVS</strong> ID: 5936 FAMILY: SSH RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a SSH server : \n %L<br />

Solution: N/A<br />

realtimeonly<br />

<strong>PVS</strong>-SSH-Session_Start<br />

CVE Not available<br />

<strong>PVS</strong> ID: 5937 FAMILY: SSH RISK: NONE NESSUS ID:Not Available<br />

Description: The remote host client just initiated a SSH session<br />

Solution: N/A<br />

SSL Client Detection<br />

realtimeonly<br />

CVE Not available<br />

<strong>PVS</strong> ID: 5938 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is an SSL/TLS client<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Asterisk SIP Channel Driver Denial of Service (AST-2011-007)<br />

Family Internet Services 1615


<strong>PVS</strong> ID: 5939 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:54971<br />

Description: Synopsis : \n\nThe remote VoIP server is vulnerable to a denial of service attack.\n\nFor<br />

your information, the observed version of Asterisk is : \n %L \n\nThe version of Asterisk<br />

running on the remote host is potentially affected by a denial of service vulnerability. If a<br />

remote attacker initiates a SIP call and the recipient picks up, the remote user can reply<br />

with a malformed Contact header that will cause Asterisk to crash.<br />

Solution: Upgrade to Asterisk 1.8.4.2 or later.<br />

CVE-2011-2216<br />

Havij SQL Injection Tool Detection<br />

<strong>PVS</strong> ID: 5940 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote host is running the Havij SQL injection tool. Havij is a<br />

web application testing tool that allows users to automatically scan web application servers<br />

for SQL injection vulnerabilities.<br />

Solution: Ensure that this application is authorized according to corporate policies and guidelines.<br />

CVE Not available<br />

Flash Player < 10.3.181.22 Cross-Site Scripting (APSB11-13)<br />

<strong>PVS</strong> ID: 5941 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:54973<br />

Description: Synopsis : \n\nThe remote host contains a browser plug-in that is affected by a cross-site<br />

scripting vulnerability.\n\nThe remote host has Adobe Flash Player installed. For your<br />

information, the observed version of Adobe Flash Player is : \n %L .\n\nVersions of Flash<br />

Player earlier than 10.3.181.22, or 10.3.181.23 for the ActiveX control, are potentially<br />

affected by an unspecified cross-site scripting vulnerability.<br />

Solution: Upgrade to Flash Player 10.3.181.22 (10.3.181.23 for ActiveX) or later.<br />

CVE-2011-2107<br />

Novell iPrint Client < 5.64 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5942 FAMILY: Web Clients RISK: HIGH NESSUS ID:54988<br />

Description: Synopsis :\n\nThe remote host contains an application that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Novell iPrint Client is<br />

%L.\n\nVersions of Novell iPrint Client earlier than 5.64 are potentially affected by<br />

multiple vulnerabilities :\n\n - The nipplib.dll component, as used by both types of browser<br />

plugins, does not properly handle the uri parameter from the user specified printer-url<br />

before passing it to a fixed-length buffer on the heap. (ZDI-11-172 / CVE-2011-1699)\n\n -<br />

Family Internet Services 1616


The nipplib.dll component, as used by both types of browser plugins, does not properly<br />

handle the profile time parameter from the user specified printer-url before passing it to a<br />

fixed-length buffer on the heap. (ZDI-11-173 / CVE-2011-1700)\n\n - The nipplib.dll<br />

component, as used by both types of browser plugins, does not properly handle the<br />

profile-name parameter from the user specified printer url before passing it to a<br />

fixed-length buffer on the heap. (ZDI-11-174 / CVE-2011-1701)\n\n - The nipplib.dll<br />

component, as used by both types of browser plugins, does not properly handle the<br />

file-date-time parameter from the user specified printer-url before passing it to a<br />

fixed-length buffer on the heap. (ZDI-11-175 / CVE-2011-1702)\n\n - The nipplib.dll<br />

component, as used by both types of browser plugins, does not properly handle the driver<br />

version parameter from the user-specified printer-url before passing it to a fixed-length<br />

buffer on the heap. (ZDI-11-176 / CVE-2011-1703)\n\n - The nipplib.dll component, as<br />

used by both types of browser plugins, does not properly handle the core-package<br />

parameter from the user specified printer-url before passing it to a fixed-length buffer on<br />

the heap. (ZDI-11-177 / CVE_2011-1704)\n\n - The nipplib.dll component, as used by both<br />

types of browser plugins, does not properly handle the client-file-name parameter from the<br />

user specified printer-url before passing it to a fixed-length buffer on the heap.<br />

(ZDI-11-178 / CVE-2011-1705)\n\n - The nipplib.dll component, as used by both types of<br />

browser plugins, does not properly handle the iprint-client-config-info parameter form the<br />

user specified printer-url before passing it to a fixed-length buffer on the heap.<br />

(ZDI-11-179 / CVE-2011-1706)\n\n - The nipplib.dll component, as used by both types of<br />

browser plugins, does not properly handle the op-printer-list-all-jobs parameter from the<br />

user specified printer-url before passing it to a fixed-length buffer on the heap.<br />

(ZDI-11-180 / CVE-2011-1708)\n\n - The nipplib.dll component, as used by both types of<br />

browser plugins, does not properly handle the op-printer-list-all-jobs parameter from the<br />

user specified printer-url before passing it to a fixed-length buffer on the heap.<br />

(ZDI-11-181 / CVE-2011-1707)<br />

Solution: Upgrade to Novell iPrint Client 5.64 or later.<br />

CVE-2011-1708<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Google Chrome < 12.0.742.91 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5943 FAMILY: Web Clients RISK: HIGH NESSUS ID:54989<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by a code execution<br />

vulnerability.\n\nFor your information, the observed version of Google Chrome is<br />

\n%L.\n\nVersions of Google Chrome earlier than 12.0.742.91 are potentially affected by<br />

multiple vulnerabilities :\n\n - A use-after-free issue exists due to integer issues in float<br />

handling. (Issue 73962, 79746)\n\n - A use-after-free issue exists in accessibility support.<br />

(Issue 75496)\n\n - A visit history information leak exists in CSS. (Issue 75643)\n\n - It is<br />

possible to crash the browser with lots of form submissions. (Issue 76034)\n\n - An<br />

extensions permission bypass exists. (Issue 77026)\n\n - A stale pointer exists in the<br />

extension framework. (Issue 78516)\n\n - It is possible to read from an uninitialized<br />

pointer. (Issue 79362)\n\n - It is possible to perform script injection into the new tab page.<br />

(Issue 79862)\n\n - A use-after-free issue exists in developer tools. (Issue 80358)\n\n - A<br />

memory corruption issue exists in history deletion. (Issue 81916)\n\n - A use-after-free<br />

issue exists in the image loader. (Issue 81949)\n\n - It is possible to perform an extension<br />

injection into chrome:// pages. (Issue 83010\n\n - A same origin bypass exists in V8. (Issue<br />

Family Internet Services 1617


83275)\n\n - A same origin bypass exists in DOM. (Issue 83743)<br />

Solution: Upgrade to Google Chrome 12.0.742.91 or later.<br />

CVE-2011-2342<br />

Hulu Username Detection<br />

<strong>PVS</strong> ID: 5944 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The following Hulu username is being used to access Hulu video resources: %L<br />

realtimeonly<br />

Solution: Ensure that such usage is in alignment with existing policies and guidelines regarding<br />

network/pc resources<br />

CVE Not available<br />

Hulu Start Video Session Detection<br />

<strong>PVS</strong> ID: 5945 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Hulu client just started watching: %L<br />

realtimeonly<br />

Solution: Ensure that such usage is in alignment with existing policies and guidelines regarding<br />

network/pc resources<br />

CVE Not available<br />

VLC Media Player < 1.1.10 XSPF Playlist Parser Integer Overflow<br />

<strong>PVS</strong> ID: 5946 FAMILY: Web Clients RISK: HIGH NESSUS ID:55024<br />

Description: Synopsis : \n\nThe remote host contains an application that allows arbitrary code<br />

execution.\n\nThe remote host contains VLC player, a multi-media application. For your<br />

information, the observed version of VLC is : \n %L .\n\nVersions of VLC media player<br />

earlier than 1.1.10 are potentially affected by an integer overflow in the XSPF playlist<br />

parser. Exploiting this vulnerability can lead to application crashes and possibly code<br />

execution.<br />

Solution: Upgrade to VLC Media Player version 1.1.10 or later.<br />

CVE-2011-2194<br />

BitTorrent Protocol Traffic Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5947 FAMILY: Peer-To-Peer File Sharing RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1618


Description: The remote host has just passed BitTorrent client/server traffic.<br />

realtimeonly<br />

Solution: Ensure that BitTorrent is allowed with respect to corporate policies and guidelines.<br />

Box.net Client Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 5948 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Box.net client. Box.net is used to share files with multiple recipients.<br />

Solution: Ensure that Box.net is allowed with respect to corporate policies and guidelines.<br />

CVE Not available<br />

Box.net File Share Detection<br />

<strong>PVS</strong> ID: 5949 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Box.net client. Box.net is used to share files with multiple recipients.<br />

The following email recipients were sent a box.net file: %L<br />

realtimeonly<br />

Solution: Ensure that Box.net is allowed with respect to corporate policies and guidelines.<br />

CVE Not available<br />

Box.net File Share Detection<br />

<strong>PVS</strong> ID: 5950 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Box.net client. Box.net is used to share files with multiple recipients.<br />

The following file was just uploaded to box.net: %L<br />

realtimeonly<br />

Solution: Ensure that Box.net is allowed with respect to corporate policies and guidelines.<br />

CVE Not available<br />

Box.net File Share Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5951 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1619


Description: The remote host is a Box.net client. Box.net is used to share files with multiple recipients.<br />

The following file was just uploaded to box.net: %L<br />

realtimeonly<br />

Solution: Ensure that Box.net is allowed with respect to corporate policies and guidelines.<br />

CVE Not available<br />

Movable Type < 4.361 / 5.051 / 5.11 Multiple Unspecified Vulnerabilities<br />

<strong>PVS</strong> ID: 5952 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:55410<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple unspecified vulnerabilities\n\nThe<br />

remote host is running Movable Type, a blogging software for Unix and Windows<br />

platforms. For your information, the observed version of Movable Type is : \n %L<br />

\n\nVersions of Movable Type earlier than 4.361, 5.0x earlier than 5.051, or 5.1x earlier<br />

than 5.11, are reportedly affected by multiple unspecified vulnerabilities.<br />

Solution: Upgrade to Movable Type 4.361, 5.051, 5.11, or later.<br />

CVE Not available<br />

Hulu Start Video Session Detection<br />

<strong>PVS</strong> ID: 5953 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Hulu client just started watching: %L<br />

realtimeonly<br />

Solution: Ensure that such usage is in alignment with existing policies and guidelines regarding<br />

network/pc resources<br />

CVE Not available<br />

Windows RDP / Terminal Services Detection<br />

<strong>PVS</strong> ID: 5954 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote RDP server was just logged into<br />

realtimeonly<br />

Solution: Ensure that RDP is required for the machine in question.<br />

CVE Not available<br />

LinkedIn Status Update Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1620


<strong>PVS</strong> ID: 5955 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client updated their LinkedIn status with: %L<br />

realtimeonly<br />

Solution: Ensure that such usage is in alignment with existing policies and guidelines regarding<br />

network/pc resources<br />

CVE Not available<br />

Symantec Enterprise AV Server detection<br />

<strong>PVS</strong> ID: 5956 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is an Symantec Enterprise AV Server<br />

Solution: N/A<br />

CVE Not available<br />

LinkedIn Profile Update Detection<br />

<strong>PVS</strong> ID: 5957 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client edited their LinkedIn profile<br />

realtimeonly<br />

Solution: Ensure that such usage is in alignment with existing policies and guidelines regarding<br />

network/pc resources<br />

CVE Not available<br />

LinkedIn Message Inbox Access Detection<br />

<strong>PVS</strong> ID: 5958 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client accessed their LinkedIn message inbox<br />

realtimeonly<br />

Solution: Ensure that such usage is in alignment with existing policies and guidelines regarding<br />

network/pc resources<br />

CVE Not available<br />

LinkedIn Message Creation Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5959 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1621


Description: The remote client accessed their LinkedIn mail and created a new message to : %L<br />

realtimeonly<br />

Solution: Ensure that such usage is in alignment with existing policies and guidelines regarding<br />

network/pc resources<br />

CVE Not available<br />

LinkedIn User Name Detection<br />

<strong>PVS</strong> ID: 5960 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is using LinkedIn. The name used within LinkedIn is: %L<br />

realtimeonly<br />

Solution: Ensure that such usage is in alignment with existing policies and guidelines regarding<br />

network/pc resources<br />

CVE Not available<br />

Xbox Live Login Detection<br />

<strong>PVS</strong> ID: 5961 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Xbox Live and just logged into the network.<br />

realtimeonly<br />

Solution: Ensure that such systems are authorized with respect to corporate policies.<br />

CVE Not available<br />

XM Radio Usage Detection<br />

<strong>PVS</strong> ID: 5962 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client was observed logging into their XM radio account. The user account was<br />

logged as:\n %L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Hotmail UserID Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5963 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1622


Description: Hotmail UserID is: %P<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Mozilla Firefox 3.6.x < 3.6.18 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5964 FAMILY: Web Clients RISK: HIGH NESSUS ID:55418<br />

Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox 3.6.x earlier than 3.6.18 are potentially affected by multiple<br />

vulnerabilities : \n\n - Multiple memory safety issues can lead to application crashes and<br />

possibly remote code execution. (CVE-2011-2374, CVE-2011-2376, CVE-2011-2364,<br />

CVE-2011-2365, CVE-2011-2605)\n\n - A use-after-free issue when viewing XUL<br />

documents with scripts disabled could lead to code execution. (CVE-2011-2373)\n\n - A<br />

memory corruption issue due to multipart/x-mixed-replace images could lead to memory<br />

corruption. (CVE-2011-2377)\n\n - When a JavaScript Array object has its length set to an<br />

extremely large value, the iteration of array elements that occurs when its reduceRight<br />

method is called could result in code execution due to an invalid index value being used.<br />

(CVE-211-2371)\n\n - Multiple dangling pointer vulnerabilities could lead to code<br />

execution. (CVE-2011-0083, CVE-2011-2363, CVE-2011-0085)\n\n - An error in the way<br />

cookies are handled could lead to information disclosure. (CVE-2011-2362)<br />

Solution: Upgrade to Firefox 3.6.18 or later.<br />

CVE-2011-2605<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Firefox > 4.0 and < 5.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5965 FAMILY: Web Clients RISK: HIGH NESSUS ID:55419<br />

Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host has a web browser installed that is vulnerable to<br />

multiple attack vectors.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox greater than 4.0 and earlier than 5.0 are potentially affected by<br />

multiple vulnerabilities : \n\n - Multiple memory safety issues can lead to application<br />

crashes and possibly remote code execution. (CVE-2011-2374, CVE-2011-2375,<br />

CVE-2011-2605)\n\n - A use-after-free issue when viewing XUL documents with scripts<br />

disabled could lead to code execution. (CVE-2011-2373)\n\n - A memory corruption issue<br />

due to multipart/x-mixed-replace images could lead to memory corruption.<br />

(CVE-2011-2377)\n\n - When a JavaScript Array object has its length set to an extremely<br />

large value, the iteration of array elements that occurs when its reduceRight method is<br />

called could result in code execution due to an invalid index value being used.<br />

(CVE-2011-2371)\n\n - It is possible for an image from a different domain to be loaded<br />

into a WebGL texture which could be used to steal image data from a different site.<br />

(CVE-2011-2366)\n\n - An out-of-bounds read issue and an invalid write issue could cause<br />

Family Internet Services 1623


the application to crash. (CVE-2011-2367, CVE-2011-2368)\n\n - HTML-encoded entities<br />

are improperly decoded when displayed inside SVG elements which could lead to<br />

cross-site scripting attacks. (CVE-2011-2369)\n\n - It is possible for a non-whitelisted site<br />

to trigger an install dialog for add-ons and themes. (CVE-2011-2370)<br />

Solution: Upgrade to Firefox 5.0 or later.<br />

CVE-2011-2605<br />

Mozilla Thunderbird 3.1.x < 3.1.11 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5966 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:55289<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Thunderbird is<br />

:%L.\n\nVersions of Thunderbird 3.1.x earlier than 3.1.11 are potentially affected by<br />

multiple vulnerabilities :\n\n - Multiple memory safety issues can lead to application<br />

crashes and possibly remote code execution. (CVE-2011-2374, CVE-2011-2376,<br />

CVE-2011-2364, CVE-2011-2365, CVE-2011-2605)\n\n - A use-after-free issue when<br />

viewing XUL documents with scripts disabled could lead to code execution.<br />

(CVE-2011-2373)\n\n - A memory corruption issue due to multipart/x-mixed-replace<br />

images could lead to memory corruption. (CVE-2011-2377)\n\n - When a JavaScript Array<br />

object has its length set to an extremely large value, the iteration of array elements that<br />

occurs when its reduceRight method is called could result in code execution due to an<br />

invalid index value being used. (CVE-2011-2371)\n\n - Multiple dangling pointer<br />

vulnerabilities could lead to code execution. (CVE-2011-0083, CVE-2011-2363,<br />

CVE-2011-0085)\n\n - An error in the way cookies are handled could lead to information<br />

disclosure. (CVE-2011-2362)<br />

Solution: Upgrade to Thunderbird 3.1.11 or later.<br />

CVE-2011-2605<br />

Flash Player < 10.3.181.26 Code Execution Vulnerability (APSB11-18)<br />

<strong>PVS</strong> ID: 5967 FAMILY: Web Clients RISK: HIGH NESSUS ID:55141<br />

Description: Synopsis : \n\nThe remote host contains a browser plug-in that is affected by a memory<br />

corruption vulnerability.\n\nThe remote host has Adobe Flash Player installed. For your<br />

information, the observed version of Adobe Flash Player is : \n %L .\n\nVersions of Flash<br />

Player earlier than 10.3.181.26 are potentially affected by a memory corruption<br />

vulnerability that could allow an attacker to execute arbitrary code subject to the privileges<br />

of the user running the affected application. This issue is reportedly being exploited in the<br />

wild in targeted attacks as of June 2011.<br />

Solution: Upgrade to Flash Player 10.3.181.26 or later.<br />

CVE-2011-2110<br />

Mac OS X 10.6 < 10.6.8 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1624


<strong>PVS</strong> ID: 5968 FAMILY: Generic RISK: HIGH NESSUS ID:55416<br />

Description: Synopsis :\n\nThe remote host is missing a Mac OS X update that fixes a security<br />

issue.\n\nFor your information, the observed version of Mac OS X is %L.\n\nVersions of<br />

Mac OS X 10.6 earlier than 10.6.8 are potentially affected by a security issue. Mac OS X<br />

10.6.8 contains a security fix for the following products :\n\n - App Store\n\n - ATS\n\n -<br />

Certificate Trust Policy\n\n - CoreFoundation\n\n - CoreGraphics\n\n - FTP Server\n\n -<br />

ImageIO\n\n - International Components for Unicode\n\n - Kernel\n\n - Libsystem\n\n -<br />

libxslt\n\n - MobileMe\n\n - MySQL\n\n - OpenSSL\n\n - patch\n\n - QuickLook\n\n -<br />

QuickTime\n\n - Samba\n\n - servermgrd\n\n - subversion\nIAVA Reference :<br />

2011-A-0160\nIAVB Reference : 2012-B-0038\nSTIG Finding Severity : Category I<br />

Solution: Upgrade to Mac OS X 10.6.8 or later.<br />

CVE-2011-1132<br />

Asterisk Multiple Channel Drivers Denial of Service (AST-2011-008/AST-2011-009/AST-2011-010)<br />

<strong>PVS</strong> ID: 5969 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:55457<br />

Description: Synopsis : \n\nThe remote VoIP server is vulnerable to multiple denial of service<br />

attacks.\n\nFor your information, the observed version of Asterisk is : \n %L<br />

\n\nThe version of Asterisk running on the remote host is potentially affected by<br />

multiple denial of service vulnerabilities : \n\n - If a remote user sends a SIP<br />

packet with a null, Asterisk reads data past the null even though the buffer is<br />

actually truncated when copied, which could lead to an application crash.<br />

(AST-2011-008)\n\n - A remote user sending a SIP packet containing a Contact<br />

header with a missing left angle bracket causes Asterisk to access a null pointer<br />

which could cause the application to crash. (AST-2011-009)\n\n - A memory<br />

address can be inadvertently transmitted over the network via IAX2 via an<br />

option control frame which would cause the remote party to try to access it.<br />

(AST-2011-010)<br />

Solution: Upgrade to Asterisk 1.4.41.1, 1.6.2.18.1, 1.8.4.3, Asterisk Business C.3.7.3, or later.<br />

CVE-2011-2535<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Google Chrome < 12.0.742.112 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5970 FAMILY: Web Clients RISK: HIGH NESSUS ID:55460<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by a code execution<br />

vulnerability.\n\nFor your information, the observed version of Google Chrome is<br />

\n%L.\n\nVersions of Google Chrome earlier than 12.0.742.112 are potentially affected by<br />

multiple vulnerabilities :\n\n - An out-of-bounds read in NPAPI string handling exists.<br />

(Issue 77493)\n\n - A user-after-free issue exists in SVG font handling. (Issue 84355)\n\n -<br />

A memory corruption issue exists in CSS parsing. (Issue 85003)\n\n - Multiple lifetime and<br />

re-entrancy issues exist in the HTML parser. (Issue 85102)\n\n - A bad bounds check exists<br />

in v8. (Issue 85177)\n\n - A use-after-free issue exists with the SVG use element. (Issue<br />

85211)\n\n - A use-after-free issue exists in text selection. (Issue 85418)<br />

Family Internet Services 1625


Solution: Upgrade to Google Chrome 12.0.742.112 or later.<br />

CVE-2011-2351<br />

Opera < 11.50 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5971 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:55470<br />

Description: Synopsis : \n\nThe remote host has a web browser installed that is affected by a memory<br />

corruption vulnerability.\n\nThe remote host is running the Opera web browser. For your<br />

information, the observed version of Opera is : \n %L \n\nVersions of Opera earlier than<br />

11.50 are potentially affected by multiple vulnerabilities : \n\n - An error in the handling of<br />

data URIs that allows cross-site scripting in some unspecified cases. (Issue 995)\n\n - An<br />

error exists in the browser's handling of error pages. Opera generates error pages in<br />

response to an invalid URL. If enough invalid URLs are attempted, the host's disk space is<br />

eventually filled, the browser crashes and the error files are left behind. (Issue 996)\n\n -<br />

An additional, moderately severe and unspecified error exists. Details regarding this error<br />

are to be released in the future. (CVE-2011-2610)\n\n - Several unspecified errors exist that<br />

can cause application crashes. Affected items or functionality are : printing, unspecified<br />

web content, JavaScript, Array.prototype.join method, drawing paths with many characters,<br />

selecting text nodes, iframes, closed or removed pop-up windows, moving audio or video<br />

elements between windows, canvas elements, SVG items, CSS files, form layouts, web<br />

workers, SVG BiDi, large tables and print preview, select elements with many items, and<br />

the src attribute of the iframe element. (CVE-2011-2611, CVE-2011-2612,<br />

CVE-2011-2613, CVE-2011-2614, CVE-2011-2615, CVE-2011-2616, CVE-2011-2617,<br />

CVE-2011-2618, CVE-2011-2619, CVE-2011-2620, CVE-2011-2621, CVE-2011-2622,<br />

CVE-2011-2623, CVE-2011-2624, CVE-2011-2625, CVE-2011-2626, CVE-2011-2627)<br />

Solution: Upgrade to Opera 11.50 or later.<br />

CVE-2011-2627<br />

FTP Server Session Initiated<br />

<strong>PVS</strong> ID: 5972 FAMILY: FTP Servers RISK: NONE NESSUS ID:Not Available<br />

Description: An FTP server is running on this port. The following user just logged into it: %P<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

FTP Client Session Initiated<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5973 FAMILY: FTP Clients RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 1626


Description: The following user just logged into an FTP server: %L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

MetaSploit Exploited Machine Detection<br />

<strong>PVS</strong> ID: 5974 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host has been compromised by a MetaSploit server. The machine was just<br />

observed downloading the staging executable from the server at %L<br />

realtimeonly<br />

Solution: Ensure that this application is authorized for your network<br />

CVE Not available<br />

MetaSploit Exploited Machine Detection<br />

<strong>PVS</strong> ID: 5975 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host has been compromised by a MetaSploit server. The machine was just<br />

observed connecting to the server to register itself as a connection. The server is at %L<br />

realtimeonly<br />

Solution: Ensure that this application is authorized for your network<br />

CVE Not available<br />

MetaSploit Server Detection<br />

<strong>PVS</strong> ID: 5976 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host is a MetaSploit server and has just exploited a machine and is currently<br />

controlling it via the reverse HTTP meterpreter. The meterpreter is listing on %P<br />

realtimeonly<br />

Solution: Ensure that this application is authorized for your network<br />

SSL Client Detection<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5977 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1627


Description: The remote host is an SSL/TLS client<br />

Solution: N/A<br />

CVE Not available<br />

Port 80 Non-HTTP Traffic Detection<br />

<strong>PVS</strong> ID: 5978 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running non-HTTP traffic over port 80<br />

realtimeonly<br />

Solution: Ensure that this application is authorized for your network<br />

TeamViewer Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 5979 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running TeamViewer, an application for managing machines remotely.<br />

TeamViewer relies on the host computer (usually behind a firewall) initiating an outbound<br />

connection on port 443. Given this, TeamViewer can subvert firewall rules by allowing<br />

direct access to an internal machine from untrusted networks.<br />

Solution: Ensure that this application is authorized for your network<br />

CVE Not available<br />

Yahoo! Messenger Detection<br />

<strong>PVS</strong> ID: 5980 FAMILY: Internet Messengers RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running a Yahoo Instant Messenger client.<br />

Solution: Ensure this software meets corporate guidelines for employee use.<br />

CVE Not available<br />

ISC BIND Response Policy Zones (RPZ) DNAME / CNAME Parsing Remote DoS<br />

<strong>PVS</strong> ID: 5981 FAMILY: DNS Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:55533<br />

Description: Synopsis : \n\nThe remote DNS server is vulnerable to a denial of service attack.\n\nThe<br />

remote host is running Bind, a popular name server. For your information, the observed<br />

version of Bind is : \n %L \n\nVersions of BIND 9.8 earlier than 9.8.0-P3 are potentially<br />

affected by a denial of service vulnerability. If an attacker sends a specially crafted request<br />

to a BIND server that has recursion enabled and Response Policy Zones (RPZ) configured,<br />

Family Internet Services 1628


it may cause the name server process to crash.<br />

Solution: Upgrade to BIND 9.8.0-P3 or later.<br />

CVE-2011-2465<br />

ISC BIND 9 Unspecified Packet Processing Remote DoS<br />

<strong>PVS</strong> ID: 5982 FAMILY: DNS Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:55534<br />

Description: Synopsis : \n\nThe remote DNS server is vulnerable to a denial of service attack.\n\nThe<br />

remote host is running Bind, a popular name server. For your information, the observed<br />

version of Bind is : \n %L \n\nVersions of BIND 9.6 earlier than 9.6-ESV-R4-P3, 9.7<br />

earlier than 9.7.3-P3, and 9.8 earlier than 9.8.0-P4 are potentially affected by a denial of<br />

service vulnerability. If an attacker sends a specially crafted request to a BIND server it<br />

may cause the name server process to crash.<br />

Solution: Upgrade to BIND 9.6-ESV-R4-P3, 9.7.3-P3, 9.8.0-P4, or later.<br />

CVE-2011-2464<br />

HP Intelligent Management Center User Access Manager < 5.0 E0101P03 Code Execution<br />

Vulnerability<br />

<strong>PVS</strong> ID: 5983 FAMILY: Generic RISK: HIGH NESSUS ID:55577<br />

Description: Synopsis : \n\nThe remote host has an application installed that is vulnerable to a code<br />

execution attack.\n\nFor your information, the version of HP Intelligent Management<br />

Center installed on the remote host is : \n %L \n\nVersions of HP Intelligent Management<br />

Center User Access Manager earlier than 5.0 E0101P03 are potentially affected by a code<br />

execution vulnerability in the 'iNOdeMngChecker.exe' component which listens by default<br />

on TCP port 9090 because the application fails to validate user supplied data when<br />

handling a '0x0A0BF007' packet type. A remote unauthenticated attacker, exploiting this<br />

flaw, could potentially execute arbitrary code on the remote host subject to the privileges of<br />

the user running the affected application.<br />

Solution: Upgrade to HP Intelligent Management Center User Access Manager 5.0 E0101P03 or<br />

later.<br />

CVE-2011-1867<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

HP Intelligent Management Center Endpoint Admission Defense < 5.0 E0101P03 Code Execution<br />

Vulnerability<br />

<strong>PVS</strong> ID: 5984 FAMILY: Generic RISK: HIGH NESSUS ID:55577<br />

Description: Synopsis : \n\nThe remote host has an application installed that is vulnerable to a code<br />

execution attack.\n\nFor your information, the version of HP Intelligent Management<br />

Center installed on the remote host is : \n %L \n\nVersions of HP Intelligent Management<br />

Center Endpoint Admission Defense earlier than 5.0 E0101P03 are potentially affected by a<br />

Family Internet Services 1629


code execution vulnerability in the 'iNOdeMngChecker.exe' component which listens by<br />

default on TCP port 9090 because the application fails to validate user supplied data when<br />

handling a '0x0A0BF007' packet type. A remote unauthenticated attacker, exploiting this<br />

flaw, could potentially execute arbitrary code on the remote host subject to the privileges of<br />

the user running the affected application.<br />

Solution: Upgrade to HP Intelligent Management Center Endpoint Admission Defense 5.0 E0101P03<br />

or later.<br />

CVE-2011-1867<br />

phpMyAdmin 3.3.x < 3.3.10.2 / 3.4.x < 3.4.3.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5985 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server contains a PHP application that is vulnerable to<br />

multiple attack vectors.\n\nFor your information, the observed version of phpMyAdmin is :<br />

\n %L \n\nVersions of phpMyAdmin 3.3.x earlier than 3.3.10.2 and 3.4.x earlier than<br />

3.4.3.1 are potentially affected by multiple vulnerabilities : \n\n - It is possible to<br />

manipulate the PHP session superglobal usig some of the Swekey authentication code.<br />

(PMASA-2011-5)\n\n - An unsanitized key from the Servers array is written in a comment<br />

of the generated config, which could allow an attacker to close the comment and inject<br />

code. (PMASA-2011-6)\n\n - It is possible to use a null byte to truncate the pattern string<br />

which would allow an attacker to inject the /e modifier causing the pre_replace function to<br />

execute its second argument as PHP code. (PMASA-2011-7)\n\n - An issue exists in the<br />

MIME-type transformation code, which allows for directory traversal. (PMASA-2011-8)<br />

Solution: Upgrade to phpMyAdmin 3.3.10.2, 3.4.3.1, or later.<br />

CVE-2011-2508<br />

Apple iPhone/iPad iOS < 4.3.4 and iOS 4.2.5 through 4.2.9 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5986 FAMILY: Mobile Devices RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is an iPhone, iPod Touch, or iPad running iOS. For your information, the observed version<br />

of iOS is %L.\n\nVersions of iOS 4.2.5 through 4.2.9 and 3.0 through 4.3.4 are potentially<br />

affected by multiple vulnerabilities. iOS 4.2.9 and 4.3.4 contain security fixes for the<br />

following products :\n\n - CoreGraphics\n\n - IOMobileFrameBuffer<br />

Solution: Upgrade to iOS 4.2.9, 4.3.4, or later.<br />

CVE-2011-0227<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

VLC Media Player > 0.5.0 and < 1.1.11 Multiple Code Execution Vulnerabilities<br />

<strong>PVS</strong> ID: 5987 FAMILY: Web Clients RISK: HIGH NESSUS ID:55608<br />

Family Internet Services 1630


Description: Synopsis : \n\nThe remote host contains an application that is vulnerable to multiple attack<br />

vectors\n\nThe remote host contains VLC player, a multi-media application. For your<br />

information, the observed version of VLC is : \n %L .\n\nVersions of VLC media player<br />

earlier than 1.1.11 are potentially affected by multiple vulnerabilities : \n\n - A buffer<br />

overflow vulnerability exists in the Read Media file parser. (SA-1105)\n\n - A heap<br />

overflow vulnerability exists in the AVI file parser. (SA-1106)<br />

Solution: Upgrade to VLC Media Player version 1.1.11 or later.<br />

CVE-2011-2588<br />

Opera < 11.10 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5988 FAMILY: Web Clients RISK: HIGH NESSUS ID:55506<br />

Description: Synopsis : \n\nThe remote host has a web browser that is vulnerable to multiple attack<br />

vectors.\n\nThe remote host is running the Opera web browser. For your information, the<br />

observed version of Opera is : \n %L .\n\nVersions of Opera earlier than 11.10 are<br />

potentially affected by multiple vulnerabilities : - An unspecified vulnerability allows<br />

remote attackers to hijack searches and customizations using unspecified third-party<br />

applications. (CVE-2011-2634)\n\n - Several errors exist that can cause application crashes.<br />

Affected items or functionalities are the handling of the CSS pseudo-class ': hover' if used<br />

with transforms on a floated element, unspecified web content, and the handling of an<br />

embedded Java applet with empty parameters. (CVE-2011-2635, CVE-2011-2636,<br />

CVE-2011-2637, CVE-2011-2638, CVE-2011-2640)\n\n - An error in the handling of<br />

hidden animated GIF images can cause a denial of service through CPU consumption as<br />

image repaints are triggered. (CVE-2011-2639)<br />

Solution: Upgrade to Opera 11.10 or later.<br />

CVE-2011-2640<br />

Symantec Web Gateway Detection<br />

<strong>PVS</strong> ID: 5989 FAMILY: CGI RISK: INFO NESSUS ID:55627<br />

Description: Synopsis :\n\nThe remote host is a web security appliance.\n\nThe remote host is running<br />

Symantec Web Gateway, a web security gateway appliance.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Symantec Web Gateway login.php Blind SQL Injection (SYM11-001)<br />

<strong>PVS</strong> ID: 5990 FAMILY: CGI RISK: HIGH NESSUS ID:55628<br />

Description: Synopsis : \n\nThe web security application running on the remote host has a SQL injection<br />

vulnerability.\n\nFor your information, the observed version of Symantec Web Gateway<br />

installed on the remote host is : \n %L \n\nVersions of Symantec Web Gateway 4.5 earlier<br />

than 4.5.0.376 are potentially affected by a SQL injection vulnerability. Input to the<br />

Family Internet Services 1631


'USERNAME' parameter of the 'login.php' script is not properly sanitized. A remote,<br />

unauthenticated attacker could exploit this to execute arbitrary SQL queries.<br />

Solution: Upgrade to Symantec Web Gateway version 4.5.0.376 or later.<br />

CVE-2010-0115<br />

Symantec Web Gateway forget.php Blind SQL Injection (SYM11-008)<br />

<strong>PVS</strong> ID: 5991 FAMILY: CGI RISK: HIGH NESSUS ID:55629<br />

Description: Synopsis : \n\nThe web security application running on the remote host has a SQL injection<br />

vulnerability.\n\nFor your information, the observed version of Symantec Web Gateway<br />

installed on the remote host : \n %L \n\nVersions of Symantec Web Gateway 4.5.x are<br />

potentially affected by a SQL injection vulnerability. Input to the 'username' parameter of<br />

the 'forget.php' script is not properly sanitized. A remote, unauthenticated attacker could<br />

exploit this to execute arbitrary SQL queries.<br />

Solution: Upgrade to Symantec Web Gateway version 5.0.1 or later.<br />

CVE-2011-0549<br />

Safari < 5.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5992 FAMILY: Web Clients RISK: HIGH NESSUS ID:55369<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nThe remote host has Safari installed. For your information, the observed version<br />

of Safari is %L.\n\nVersions of Safari earlier than 5.1 are potentially affected by several<br />

issues in the following component :\n\n - CF<strong>Network</strong>\n\n - ColorSync\n\n -<br />

CoreFoundation\n\n - CoreGraphics\n\n - International Components for Unicode\n\n -<br />

ImageIO\n\n - libxslt\n\n - libxml\n\n - Safari\n\n - WebKit<br />

Solution: Upgrade to Safari 5.1 or later.<br />

CVE-2011-1797<br />

Apple iOS < 4.2.10 / 4.3.5 Data <strong>Security</strong> Certificate Verification Vulnerability<br />

<strong>PVS</strong> ID: 5993 FAMILY: Mobile Devices<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is affected by a security bypass vulnerability.\n\nThe<br />

remote host is an iPhone, iPod Touch, or iPad running iOS. For your information, the<br />

observed version of iOS is : \n %L \n\nVersions of iOS 3.0 through 4.3.4 for iPhone, 3.1<br />

through 4.3.4 for the iPod touch, and 3.2 through 4.3.4 for the iPad are potentially affected<br />

by a security bypass vulnerability due to a certificate chain validation issue in the handling<br />

of X.509 certificates.<br />

Solution: Upgrade to iOS 4.2.10, 4.3.5, or later.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1632


CVE-2011-0228<br />

ClamAV < 0.97.2 'cli_hm_scan' Denial of Service<br />

<strong>PVS</strong> ID: 5994 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is running an anti-virus application that is vulnerable to a<br />

denial of service attack.\n\nThe reported version of ClamAV on the remote host is : \n %L<br />

\n\nVersions of ClamAV earlier than 0.97.2 are potentially affected by a denial of service<br />

vulnerability. An off-by-one error exists in the 'cli_hm_scan' function in the file<br />

'libclamav/matcher-hash.c' that can be exploited by a specially crafted message causing the<br />

clamd daemon to crash.<br />

Solution: Upgrade to ClamAV 0.97.2 or later.<br />

CVE Not available<br />

phpMyAdmin 3.3.x < 3.3.10.3 / 3.4.x < 3.4.3.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5995 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server contains a PHP application that is vulnerable to<br />

multiple attack vectors.\n\nFor your information, the observed version of phpMyAdmin is :<br />

\n %L \n\nVersions of phpMyAdmin 3.3.x earlier than 3.3.10.3 and 3.4.x earlier than<br />

3.4.3.2 are potentially affected by multiple vulnerabilities : \n\n - A cross-site scripting<br />

vulnerability exists in the table Print view. (PMASA-2011-9)\n\n - A local file inclusion<br />

vulnerability can be exploited via a specially crafted MIME-type transformation parameter.<br />

(PMASA-2011-10)\n\n - In the 'relational schema' code a parameter is not sanitized before<br />

being used to concatenate a class name which could lead to a local file inclusion or code<br />

execution. (PMASA-2011-11)\n\n - It is possible to manipulate the PHP superglobals<br />

(including SESSION) using some of the Swekey authentication code. (PMASA-2011-12)<br />

Solution: Upgrade to phpMyAdmin 3.3.10.3, 3.4.3.2, or later.<br />

CVE-2011-2643<br />

Apache Tomcat 7.0.x < 7.0.19 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5996 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:55759<br />

Description: Synopsis : \n\nThe remote web server is affected by multiple vulnerabilities.\n\nFor your<br />

information, the observed version of Apache Tomcat installed on the remote host is : \n %L<br />

\n\nVersions of Tomcat 7.0.x earlier than 7.0.19 are potentially affected by multiple<br />

vulnerabilities : \n\n - An issue exists in the error handling related to the<br />

MemoryUserDatabase that allows user passwords to be disclosed through log files.<br />

(CVE-2011-2204)\n\n - An input validation issue exists that allows a local attacker to either<br />

bypass security or carry out denial of service attacks when the APR or NIO connectors are<br />

Family Internet Services 1633


enabled. (CVE-2011-2526)<br />

Solution: Upgrade to Apache Tomcat 7.0.19 or later.<br />

CVE-2011-2526<br />

Android OS 2.3.4 / 3.1 Sandbox Bypass Vulnerability<br />

<strong>PVS</strong> ID: 5997 FAMILY: Mobile Devices<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is affected by a sandbox bypass vulnerability.\n\nFor your<br />

information, the observed version of Android OS installed on the remote device is : \n %L<br />

\n\nAndroid OS 2.3.4 and 3.1 are affected by a cross-application scripting vulnerability that<br />

could be exploited to bypass the sandbox.<br />

Solution: Upgrade to Android 2.3.5, 3.2, or later.<br />

CVE-2011-2357<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Google Chrome < 13.0.782.107 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5998 FAMILY: Web Clients RISK: HIGH NESSUS ID:55765<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by a code execution<br />

vulnerability.\n\nFor your information, the observed version of Google Chrome is<br />

\n%L.\n\nVersions of Google Chrome earlier than 13.0.782.107 are potentially affected by<br />

multiple vulnerabilities :\n\n - It is possible to install an extension without a confirmation<br />

dialog. (Issue 75821)\n\n - A stale pointer exists due to bad line box tracking in rendering.<br />

(Issue 78841)\n\n - It is possible to bypass the dangerous file prompt. (Issue 79266)\n\n -<br />

An unspecified issue exists relating to the designation of strings in the basic auth dialog.<br />

(Issue 79426)\n\n - A file permissions error exists with drag and drop. Note that this issue<br />

only affects Chrome on Linux. (Issue 81307)\n\n - Developer mode NPAPI extension<br />

installs are not always confirmed via browser dialog boxes. (Issue 83273)\n\n - It is<br />

possible for the local file path to be disclosed via a GL program log. (CVE-2011-2784)\n\n<br />

- The homepage URL in extensions is not properly sanitized. (Issue 84402)\n\n - The<br />

speech-input bubble is not always displayed on-screen. (Issue 84600)\n\n - It is possible to<br />

crash the browser due to a GPU lock re-entrancy issue. (Issue 84805)\n\n - A buffer<br />

overflow issue exists in inspector serialization. (Issue 85559)\n\n - A use-after-free issue<br />

exists in the Pepper plug-in installation. (Issue 85808)\n\n - A use-after-free issue exists<br />

with floating styles. (Issue 86502)\n\n - An out-of-bounds write exists in ICU. (Issue<br />

86900)\n\n - A use-after-free issue exists with float removal. (Issue 87148)\n\n - A<br />

use-after-free issue exists in media selectors. (Issue 87227)\n\n - An out-of-bounds read<br />

exists in text iteration. (Issue 87298)\n\n - A leak exists relating to cross-frame functions.<br />

(Issue 87339)\n\n - A use-after-free issue exists in Skia. (Issue 87548)\n\n - A use-after-free<br />

issue exists in resource caching. (Issue 87729)\n\n - Several unspecified internal schemes<br />

are web accessible. (Issue 87815)\n\n - A use-after-free issue exists in HTML range<br />

handling. (Issue 87925)\n\n - It is possible for a client side redirect target to be leaked.<br />

(Issue 88337)\n\n - It is possible for v8 to crash with const lookups. (Issue 88591)\n\n - A<br />

use-after-free issue exists in the frame loader. (Issue 88846)\n\n - A use-after-free issue<br />

Family Internet Services 1634


exists in display box rendering. (Issue 88889)\n\n - A PDF crash exists with nested<br />

functions. (Issue 89142)\n\n - A cross-origin script injection issue exists. (Issue 89520)\n\n<br />

- A cross-origin violation exists in base URI handling. (Issue 90222)<br />

Solution: Upgrade to Google Chrome 13.0.782.107 or later.<br />

CVE-2011-2819<br />

Apple FaceTime Detection<br />

<strong>PVS</strong> ID: 5999 FAMILY: Mobile Devices RISK: INFO NESSUS ID:Not Available<br />

Description: The remote mobile device is running FaceTime, a video calling application from Apple.<br />

Solution: N/A<br />

CVE Not available<br />

QuickTime < 7.7 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6000 FAMILY: Web Clients RISK: HIGH NESSUS ID:55764<br />

Description: Synopsis :\n\nThe remote host contains an application that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of QuickTime is %L.\n\nVersions<br />

of QuickTime earlier than 7.7 are potentially affected by multiple vulnerabilities :\n\n - A<br />

buffer overflow in QuickTime's handling of pict files may lead to an application crash or<br />

arbitrary code execution. (CVE-2011-0245)\n\n - A buffer overflow in QuickTime's<br />

handling of JPEG2000 files may lead to an application crash or arbitrary code execution.<br />

(CVE-2011-0186)\n\n - A cross-origin issue in QuickTime plug-in's handling of cross-site<br />

redirects may lead to disclosure of video data from another site. (CVE-2011-0187)\n\n - An<br />

integer overflow in QuickTime's handling of RIFF WAV files may lead to an application<br />

crash or arbitrary code execution. (CVE-2011-0209)\n\n - A memory corruption issue in<br />

QuickTime's handling of sample tables in QuickTime movie files may lead to an<br />

application crash or arbitrary code execution. (CVE-2011-0210)\n\n - An integer overflow<br />

in QuickTime's handling of audio channels in movie files may lead to an application crash<br />

or arbitrary code execution. (CVE-2011-0211)\n\n - A buffer overflow in QuickTime's<br />

handling of JPEG files may lead to an application crash or arbitrary code execution.<br />

(CVE-2011-0213)\n\n - A heap buffer overflow in QuickTime's handling of GIF files may<br />

lead to an application crash or arbitrary code execution. (CVE-2011-0246)\n\n - Multiple<br />

stack buffer overflows in QuickTime's handling of H.264 encoded movie files may lead to<br />

an application crash or arbitrary code execution. (CVE-2011-0247)\n\n - A stack buffer<br />

overflow in QuickTime ActiveX's handling of QTL files may lead to an application crash<br />

or arbitrary code execution. (CVE-2011-0248)\n\n - A heap buffer overflow in<br />

QuickTime's handling of STSC atoms in QuickTime movie files may lead to an application<br />

crash or arbitrary code execution. (CVE-2011-0249)\n\n - A heap buffer overflow in<br />

QuickTime's handling of STSS atoms in QuickTime movie files may lead to an application<br />

crash or arbitrary code execution. (CVE-2011-0250)\n\n - A heap buffer overflow in<br />

QuickTime's handling of STSZ atoms in QuickTime movie files may lead to an application<br />

crash or arbitrary code execution. (CVE-2011-0251)\n\n - A heap buffer overflow in<br />

QuickTime's handling of STTS atoms in QuickTime movie files may lead to an application<br />

Family Internet Services 1635


crash or arbitrary code execution. (CVE-2011-0252)<br />

Solution: Upgrade to QuickTime 7.7 or later.<br />

CVE-2011-0252<br />

Flash Player < 10.3.183.5 Multiple Vulnerabilities (APSB11-21)<br />

<strong>PVS</strong> ID: 6001 FAMILY: Web Clients RISK: HIGH NESSUS ID:55804<br />

Description: Synopsis :\n\nThe remote host contains a browser plug-in that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host has Adobe Flash Player installed. For your information,<br />

the observed version of Adobe Flash Player is : \n %L .\n\nVersions of Flash Player earlier<br />

than 10.3.183.5 are potentially affected by multiple vulnerabilities : \n\n - Multiple buffer<br />

overflow vulnerabilities could lead to code execution. (CVE-2011-2130, CVE-2011-2134,<br />

CVE-2011-2137, CVE-2011-2414, CVE-2011-2415)\n\n - Multiple memory corruption<br />

vulnerabilities could lead to code execution. (CVE-2011-2135, CVE-2011-2140,<br />

CVE-2011-2417, CVE-2011-2425)\n\n - Multiple integer overflow vulnerabilities could<br />

lead to code execution. (CVE-2011-2136, CVE-2011-2138, CVE-2011-2416)\n\n - A<br />

cross-site information disclosure vulnerability exists that could lead to code execution.<br />

(CVE-2011-2139)<br />

Solution: Upgrade to Flash Player 10.3.183.5 or later.<br />

CVE-2011-2425<br />

Adobe Flash Media server < 3.5.7 / 4.0.3 Multiple Vulnerabilities (APSB11-20)<br />

<strong>PVS</strong> ID: 6002 FAMILY: Web Servers RISK: HIGH NESSUS ID:55811<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a denial of service attack.\n\nThe remote<br />

host is running Adobe Flash Media server. For your information, the observed version of<br />

Adobe Flash Media Sever is : \n %L \n\nVersions of Adobe Flash Media Server earlier than<br />

3.5.7 or 4.0.3 are potentially affected by a memory corruption issue that could lead to a<br />

denial of service.\nIAVA Reference : 2011-A-0109\nSTIG Finding Severity : Category I<br />

Solution: Upgrade to Flash Media Server 3.5.7, 4.0.3, or later.<br />

CVE-2011-2132<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Adobe Flash Media Server Unsupported Version Detection<br />

<strong>PVS</strong> ID: 6003 FAMILY: Web Servers RISK: HIGH NESSUS ID:55814<br />

Description: Synopsis : \n\nThe remote host contains an unsupported version of Adobe Flash Media<br />

Server.\n\nThe remote host is running Adobe Flash Media server. For your information, the<br />

observed version of Adobe Flash Media Sever is : \n %L \n\nThe version of Adobe Flash<br />

Media Server installed on the remote host is no longer supported. As a result, it is likely to<br />

contain security vulnerabilities.<br />

Family Internet Services 1636


Solution: Upgrade to a version of Flash Media Server that is currently supported.<br />

CVE Not available<br />

Oracle Database Unsupported Version Detection<br />

<strong>PVS</strong> ID: 6004 FAMILY: Database RISK: HIGH NESSUS ID:55786<br />

Description: Synopsis : \n\nThe remote host is running an unsupported version of a database<br />

server.\n\nThe remote host is running Oracle Database. For your information, the version of<br />

Oracle Database installed on the remote host is : \n %L \n\nThe version of Oracle Database<br />

installed on the remote host is no longer supported. As a result, it is likely to contain<br />

security vulnerabilities.<br />

Solution: Upgrade to a version of Oracle Database that is currently supported.<br />

DNS Client Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 6005 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: DNS TCP Client<br />

Solution: N/A<br />

DNS Client Detection<br />

realtimeonly<br />

CVE Not available<br />

<strong>PVS</strong> ID: 6006 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: DNS UDP client<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Apache Tomcat 7.0.x < 7.0.20 'jsvc' Information Disclosure<br />

<strong>PVS</strong> ID: 6007 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:55859<br />

Description: Synopsis : \n\nThe remote web server is affected by an information disclosure<br />

vulnerability.\n\nFor your information, the observed version of Apache Tomcat installed on<br />

the remote host is : \n %L \n\nVersions of Tomcat 7.0.x earlier than 7.0.20 are potentially<br />

affected by an information disclosure vulnerability. A component that Apache Tomcat<br />

Family Internet Services 1637


elies on called 'jsvc' contains an error in that it does not drop capabilities after starting and<br />

can allow access to sensitive files owned by the super user. Note that this vulnerability only<br />

affects Linux operating systems and only when the following are true : \n\n - jsvc is<br />

compiled with libpcap.\n\n - The '-user' parameter is used<br />

Solution: Upgrade to Apache Tomcat 7.0.20 or later.<br />

CVE-2011-2729<br />

Mozilla Firefox 5.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6008 FAMILY: Web Clients RISK: HIGH NESSUS ID:55902<br />

Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host has a web browser installed that is vulnerable to<br />

multiple attack vectors.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox 5 are potentially affected by the following security issues : \n\n - A<br />

dangling pointer vulnerability exists in an SVG text manipulation routine.<br />

(CVE-2011-0084)\n\n - Several memory safety bugs exist in the browser engine that may<br />

permit remote code execution. (CVE-2011-2985, CVE-2011-2989, CVE-2011-2991,<br />

CVE-2011-2992)\n\n - A cross-origin data theft vulnerability exists when using CANVAS<br />

and Windows D2D hardware acceleration. (CVE-2011-2986)\n\n - A heap overflow<br />

vulnerability exists in WebGL's ANGLE library. (CVE-2011-2987)\n\n - A buffer overflow<br />

vulnerability exists in WebGL when using an overly long shader program.<br />

(CVE-2011-2988)\n\n - Two errors exist related to Content <strong>Security</strong> Policy that can lead to<br />

information disclosure. (CVE-2011-2990)\n\n - An unspecified error exists that can allow<br />

unsigned JavaScript to call into a signed JAR and inherit the signed JAR's permissions and<br />

identity. (CVE-2011-2993)<br />

Solution: Upgrade to Firefox 6.0 or later.<br />

CVE-2011-2993<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Firefox 3.6 < 3.6.20 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6009 FAMILY: Web Clients RISK: HIGH NESSUS ID:55901<br />

Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host has a web browser installed that is vulnerable to<br />

multiple attack vectors.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox 3.6 earlier than 3.6.20 are potentially affected by the following<br />

security issues : \n\n - A dangling pointer vulnerability exists in an SVG text manipulation<br />

routine. (CVE-2011-0084)\n\n. -A DOM accounting error exists in the 'appendChild'<br />

JavaScript function that can allow an invalid pointer to be dereferenced.<br />

(CVE-2011-2378)\n\n - An error exists in 'ThinkPadSensor: : Startup' that can allow<br />

malicious DLLs to be loaded. (CVE-2011-2980)\n\n - An error exists in the event<br />

management code that can allow JavaScript to execute in the context of a different website<br />

and possibly in the chrome-privileged context. (CVE-2011-2981)\n\n - Various unspecified<br />

memory safety issues exist. (CVE-2011-2982)\n\n - A cross-domain information disclosure<br />

vulnerability exists if the configuration option 'RegExp.input' is set. (CVE-2011-2983)\n\n -<br />

Family Internet Services 1638


A privilege escalation vulnerability exists if web content is registered to handle 'drop'<br />

events and a browser tab is dropped in that element's area. This can allow the web content<br />

to execute with browser chrome privileges. (CVE-2011-2984)<br />

Solution: Upgrade to Firefox 6.0 or later.<br />

CVE-2011-2984<br />

Mozilla Thunderbird 5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6010 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:55887<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Thunderbird is<br />

:%L.\n\nVersions of Thunderbird 5.x are potentially affected by multiple vulnerabilities<br />

:\n\n - Several memory safety bugs exist in the browser engine that may permit remote code<br />

execution. (CVE-2011-2985, CVE-2011-2989, CVE-2011-2991, CVE-2011-2992)\n\n - A<br />

dangling pointer vulnerability exists in an SVG text manipulation routine.<br />

(CVE-2011-0084)\n\n - A buffer overflow vulnerability exists in WebGL when using an<br />

overly long shader program. (CVE-2011-2988)\n\n - A heap overflow vulnerability exists<br />

in WebGL's ANGLE library. (CVE-2011-2987)\n\n - A cross-origin data theft vulnerability<br />

exists when using canvas and Windows D2D hardware acceleration. (CVE-2011-2986)<br />

Solution: Upgrade to Thunderbird 6.0 or later.<br />

CVE-2011-2992<br />

Mozilla Thunderbird 3.1 < 3.1.12 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6011 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:55886<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Thunderbird is<br />

:%L.\n\nVersions of Thunderbird 3.1 earlier than 3.1.12 are potentially affected by multiple<br />

vulnerabilities :\n\n - Several memory safety bugs exist in the browser engine that may<br />

permit remote code execution. (CVE-2011-2982)\n\n - A dangling pointer vulnerability<br />

exists in an SVG text manipulation routine. (CVE-2011-0084)\n\n - A dangling pointer<br />

vulnerability exists in appendChild, which did not correctly account for DOM objects it<br />

operated upon. (CVE-2011-2378)\n\n - A privilege escalation vulnerability in the event<br />

management code could permit JavaScript to be run in the wrong context.<br />

(CVE-2011-2981)\n\n - A privilege escalation vulnerability exists if a web page registered<br />

for drop events and a browser tab element was dropped into the content area.<br />

(CVE-2011-2984)\n\n - A binary planing vulnerability in ThinkPadSensor::Startup could<br />

permit loading a malicious DLL into the running process. (CVE-2011-2980)\n\n - A data<br />

leakage vulnerability triggered when RegExp.input was set could allow data from other<br />

domains to be read. (CVE-2011-2983)<<br />

Solution: Upgrade to Thunderbird 6.0 or later.<br />

CVE-2011-2984<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1639


Mozilla SeaMonkey 2.x < 2.3.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6012 FAMILY: Web Clients RISK: HIGH NESSUS ID:55885<br />

Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of SeaMonkey is : \n %L<br />

\n\nVersions of SeaMonkey earlier than 2.3.0 are potentially affected by multiple<br />

vulnerabilities : \n\n - An error in SVG text manipulation code createes a dangling pointer<br />

vulnerability. (CVE-2011-0084)\n\n - Multiple unspecified memory safety issues exist.<br />

(CVE-2011-2985)\n\n - An errir in the D2D hardware acceleration code can allow image<br />

data from one domain to be read by another domain. (CVE-2011-2986)\n\n - An error in<br />

the ANGLE library used by the WebGL implementation can allow heap overflows,<br />

possibly leading to code execution. (CVE-2011-2987)\n\n - An error in the shader program<br />

handling code can allow a large shader program to overflow a buffer and crash.<br />

(CVE-2011-2988)\n\n - An unspecified error exists related to WebGL.<br />

(CVE-2011-2989)\n\n - Two errors exist related to Content <strong>Security</strong> Policy and can lead to<br />

information disclosure. (CVE-2011-2990)\n\n - An unspecified error exists that can allow<br />

JavaScript crashes. (CVE-2011-2991)\n\n - An unspecified error exists that can allow the<br />

Ogg reader to crash. (CVE-2011-2992)\n\n - An unspecified error exists that can allow<br />

unsigned JavaScript to call into a signed JAR and inherit the signed JAR's permissions and<br />

identity. (CVE-2011-2993)<br />

Solution: Upgrade to SeaMonkey 2.3.0 or later.<br />

DHCP Client Detection<br />

CVE-2011-2993<br />

<strong>PVS</strong> ID: 6013 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: A DHCP client is running on this host.<br />

Solution: N/A<br />

realtimeonly<br />

mDNS Client Queries<br />

CVE Not available<br />

<strong>PVS</strong> ID: 6014 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client has issued a name query for the following resource name.<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

PHP 5.3 < 5.3.7 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1640


<strong>PVS</strong> ID: 6015 FAMILY: Web Servers RISK: HIGH NESSUS ID:57753<br />

Description: Synopsis \n\nThe remote web server uses a version of PHP that is affected by multiple<br />

vulnerabilities.\n\nFor your information, the version of PHP installed on the remote host is :<br />

\n %L \n\nVersions of PHP 5.3 earlier than 5.3.7 are potentially affected by multiple<br />

vulnerabilities : \n\n - A stack buffer overflow exists in socket_connect().<br />

(CVE-2011-1938)\n\n - A use-after-free vulnerability exists in substr_replace().<br />

(CVE-2011-1148)\n\n - A code execution vulnerability exists in ZipArchive: : addGlob().<br />

(CVE-2011-1657)\n\n - crypt_blowfish was updated to 1.2. (CVE-2011-2483)\n\n -<br />

Multiple null pointer dereferences exist.\n\n - An unspecified crash exists in<br />

error_log().\n\n - A buffer overflow vulnerability exists in crypt().<br />

Solution: Upgrade to PHP version 5.3.7 or later.<br />

CVE-2011-3268<br />

Google Chrome < 13.0.782.215 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6016 FAMILY: Web Clients RISK: HIGH NESSUS ID:55959<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by a code execution<br />

vulnerability.\n\nFor your information, the observed version of Google Chrome is<br />

\n%L\n\nVersions of Google Chrome earlier than 13.0.782.215 are potentially affected by<br />

multiple vulnerabilities :\n\n - An unspecified error related to command line URL parsing.<br />

(Issue #72892)\n - Use-after-free errors related to line box handling, counter nodes, custom<br />

fonts, and text searching. (Issue #82552, #88216, #88670, #90668)\n - A double-free error<br />

related to libxml XPath handling. (Issue #89402)\n - An error related to empty origins<br />

exists that can allow cross-domain violation. (Issue #87453)\n - A memory corruption error<br />

exists related to vertex handling. (Issue #89836)\n - An out-of-bounds write error exists in<br />

the v8 JavaScript engine. (Issue #91517)\n - An integer overrun error exists in the handling<br />

of uniform arrays. (Issue #91598)\n - An unspecified issue exists in memset() in PDF.<br />

Solution: Upgrade to Google Chrome 13.0.782.215 or later.<br />

CVE-2011-2839<br />

PHP 5.3.7 crypt() MD5 Incorrect Return Value<br />

<strong>PVS</strong> ID: 6017 FAMILY: Web Servers RISK: HIGH NESSUS ID:55969<br />

Description: Synopsis : \n\nThe remote web server uses a version of PHP that is affected by a security<br />

bypass vulnerability.\n\nFor your information, the version of PHP installed on the remote<br />

host is : \n %L \n\nPHP version 5.3.7 contains a bug in the crypt() function when<br />

generating salted MD5 hashes. The function only returns the salt rather than the salt and<br />

hash. Any authentication mechanism that uses crypt() could authorize all authentication<br />

attempts due to this bug.<br />

Solution: Upgrade to PHP version 5.3.8 or later.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1641


Apache Tomcat 6.0.x < 6.0.33 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6018 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:56008<br />

Description: Synopsis : \n\nThe remote web server is vulnerable to multiple attack vectors.\n\nFor your<br />

information, the observed version of Apache Tomcat installed on the remote host is : \n %L<br />

\n\nVersions of Tomcat 6.x earlier than 6.0.33 are potentially affected by multiple<br />

vulnerabilities : \n\n - An error handling issue exists related to the MemoryUserDatabase<br />

that allows user passwords to be disclosed through log files. (CVE-2011-2204)\n\n - An<br />

input validation error exists that allows a local attacker to either bypass security or carry out<br />

denial of service attacks when the APR or NIO connectors are enabled.<br />

(CVE-2011-2526)\n\n - A component that Apache Tomcat relies on called 'jsvc' contains an<br />

error in that it does not drop capabilities after starting and can allow access to sensitive files<br />

owned by the super user. Note this vulnerability only affects Linux operating systems and<br />

only when the following are true: jsvc is compiled with libpcap and the '-user' parameter is<br />

used. (CVE-2011-2729)<br />

Solution: Upgrade to Apache Tomcat 6.0.33 or later.<br />

CVE-2011-2729<br />

Opera < 11.51 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6019 FAMILY: Web Clients RISK: HIGH NESSUS ID:56042<br />

Description: Synopsis : \n\nThe remote host has a web browser installed that is affected by a memory<br />

corruption vulnerability.\n\nThe remote host is running the Opera web browser. For your<br />

information, the observed version of Opera is : \n %L \n\nVersions of Opera earlier than<br />

11.51 are potentially affected by multiple vulnerabilities : \n\n - Unsecured web content<br />

could appear secure. (Issue 1000)\n\n - An unspecified issue.<br />

Solution: Upgrade to Opera 11.51 or later.<br />

CVE-2011-3389<br />

Google Chrome < 13.0.782.218 Out of Date CA List<br />

<strong>PVS</strong> ID: 6020 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:56023<br />

Description: Synopsis :\n\nThe remote host contains a web browser that uses an out of date certificate<br />

authority list.\n\nFor your information, the observed version of Google Chrome is<br />

\n%L\n\nVersions of Google Chrome earlier than 13.0.782.218 use an out of date<br />

certificate authority list. Due to the issuance of several fraudulent SSL certificates, the<br />

certificate authority DigiNotar has been disabled in Google Chrome.<br />

Solution: Upgrade to Google Chrome 13.0.782.218 or later.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1642


Apache 2.2 < 2.2.20 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6021 FAMILY: Web Servers RISK: HIGH NESSUS ID:55976<br />

Description: Synopsis :\n\nThe remote web server is vulnerable to a denial of service attack.\n\nFor your<br />

information, the observed version of Apache HTTP server is \n%L\n\nVersions of Apache<br />

2.2 earlier than 2.2.20 are potentially affected by a denial of service vulnerability. Making a<br />

series of HTTP requests with overlapping ranges in the Range or Request-Range request<br />

headers can result in memory and CPU exhaustion. A remote, unauthenticated attacker<br />

could exploit this flaw to make the system unresponsive.<br />

Solution: Upgrade to Apache version 2.2.20 or later or use one of the workarounds in Apache's<br />

advisories for CVE-2011-3192.<br />

CVE-2011-3192<br />

OpenSSL 1.x < 1.0.0e Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6022 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:56162<br />

Description: Synopsis : \n\nThe remote web server is affected by multiple vulnerabilities.\n\nFor your<br />

information, the observed version of OpenSSL is : \n %L \n\nVersions of OpenSSL 1.0.0<br />

earlier than and 1.0.0e are potentially affected by the following vulnerabilities : \n\n - An<br />

error exists in the internal certificate verification process that can allow improper<br />

acceptance of a certificate revolcation list (CRL) if the lists's 'nextUpdate' field contains a<br />

date in teh past. Note that this internal CRL checking is not enabled by defaut.<br />

(CVE-2011-3207)\n\n - An error exists in the code for the ephemeral (EC)DH ciphersuites<br />

that can allow a remote attacker to crash the process. (CVE-2011-3210)<br />

Solution: Upgrade to OpenSSL 1.0.0e or later.<br />

CVE-2011-3210<br />

Google Chrome < 14.0.835.186 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6023 FAMILY: Web Clients RISK: HIGH NESSUS ID:56241<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Google Chrome is : \n %L<br />

\n\nVersions of Google Chrome earlier than 14.0.835.186 contain a vulnerable version of<br />

Adobe Flash Player that is affected by the following vulnerabilities : \n\n - An unspecified,<br />

critical error for which no further details are available at this time.\n\n - An unspecified<br />

cross-site scripting vulnerability.<br />

Solution: Upgrade to Google Chrome 14.0.835.186 or later.<br />

2011-2444<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Google Chrome < 14.0.835.163 Multiple Vulnerabilities<br />

Family Internet Services 1643


<strong>PVS</strong> ID: 6024 FAMILY: Web Clients RISK: HIGH NESSUS ID:56230<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Google Chrome is : \n %L<br />

\n\nVersions of Google Chrome earlier than 14.0.835.163 are affected by multiple<br />

vulnerabilities : \n\n - A race condition exists related to the certificate cache. (Issue<br />

49377)\n\n - The Windows Media Player plugin allows click-free access to the system<br />

Flash. (Issue 51464)\n - PIC / pie compiler lags are not used. (Linux only)(Issue 57908)\n -<br />

MIME types are not treated authoritatively at plugin load time. (Issue 75070)\n - An<br />

unspecified error allows V8 script object wrappers to crash. (Issue 76771)\n - The included<br />

PDF functionality contains a garbage collection error. (Issue 78639)\n - The Mac installer<br />

insecurely handles lock files. (Mac only)(Issue 80680) - Out-of-bounds read issues exist<br />

related to media buffers, mp3 files, box handling, Khmer characters, video handling,<br />

Tibetan characters, and triangle arrays. (Issues 82438, 85041, 89991, 90134, 90173, 95563,<br />

95625)\n - An unspecified error allows data displayed in the URL to be spoofed. (Issue<br />

83031)\n - Use-after-free error exist related to unload event handling, the document loader,<br />

plugin handling, ruby table style handling, and the focus controller. (Issues 89219, 89330,<br />

91197, 92651, 94800, 93420, 93587)\n - The URL bar can be spoofed in an unspecified<br />

manner related to the forward button. (Issue 89564)\n - A NULL pointer error exists related<br />

to WebSockets. Issue 89795)\n An off-by-one error exists related to the V8 JavaScript<br />

engine. (Issue 91120)\n - A stale node error exists related to CSS stylesheet handling.<br />

(Issue 92959)\n - A cross-origin bypass error exists related to the V8 JavaScript engine.<br />

(Issue 93416)\n - A double-free error exists related to XPath handling in libxml. (Issue<br />

93472)\n - Incorrect permissions are assigned to non-gallery pages. (Issue 93497)\n - An<br />

improper string read occurs in the included PDF functionality. (Issue 93596)\n - An<br />

unspecified error allows unintended access to objects build in to the V8 JavaScript engine.<br />

(Issue 93906)\n - Self-signed certificates are not pinned properly. (Issue 95917)\n - A<br />

variable-type confusion issue exists in the V8 JavaScript engine related to object sealing.<br />

(Issue 95920)<br />

Solution: Upgrade to Google Chrome 14.0.835.163 or later.<br />

CVE-2011-3234<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Flash Player < 10.3.183.10 Multiple Vulnerabilities (APSB11-26)<br />

<strong>PVS</strong> ID: 6025 FAMILY: Web Clients RISK: HIGH NESSUS ID:56259<br />

Description: Synopsis : \n\nThe remote host contains a browser plug-in that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host has Adobe Flash Player installed. For your information,<br />

the observed version of Adobe Flash Player is : \n %L \nVersions of Flash Player earlier<br />

than 10.3.183.10 are potentially affected by multiple vulnerabilities : \n - Multiple AVM<br />

stack overflow vulnerabilities could lead to code execution. (CVE-2011-2426,<br />

CVE-2011-2427)\n - A logic error issue could lead to code execution or a browser crash.<br />

(CVE-2011-2428)\n - A Flash Player security control bypass vulnerability could lead to<br />

information disclosure. (CVE-2011-2429)\n - A streaming media logic error vulnerability<br />

could lead to code execution. (CVE-2011-2430)\n - A universal cross-site scripting<br />

vulnerability could be abused to take actions on a user's behalf on any website if the user is<br />

tricked into visiting a malicious website. Note that this issue is reportedly being actively<br />

exploited in targeted attacks. (CVE-2011-2444)<br />

Family Internet Services 1644


Solution: Upgrade to Flash Player 10.3.183.10 or later.<br />

CVE-2011-2444<br />

phpMyAdmin 3.4.x < 3.4.5 Cross-site Scripting (PMASA-2011-14)<br />

<strong>PVS</strong> ID: 6026 FAMILY: CGI RISK: LOW NESSUS ID:56379<br />

Description: Synopsis : \n\nThe remote web server contains a PHP application that is affected by<br />

multiple cross-site scripting vulnerabilities.\n\nFor your information, the observed version<br />

of phpMyAdmin is : \n %L \n\nVersions of phpMyAdmin 3.4.x earlier than 3.4.5 are<br />

potentially affected by multiple cross-site scripting vulnerabilities : \n - The data used in the<br />

row content display after inline editing is not properly sanitized before it is passed back to<br />

the browser.\n - The data passed in as table, column, and index names is not properly<br />

sanitized before it is passed back to the browser.\nA remote attacker may use these issues<br />

to cause arbitrary code to be executed in a user's browser, to steal authentication cookies<br />

and the like.<br />

Solution: Apply the vendor patches or upgrade to phpMyAdmin 3.4.5 or later.<br />

CVE Not available<br />

Mozilla Firefox 3.6 < 3.6.23 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6027 FAMILY: Web Clients RISK: HIGH NESSUS ID:56334<br />

Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host has a web browser installed that is vulnerable to<br />

multiple attack vectors.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox 3.6 earlier than 3.6.23 are potentially affected by the following<br />

security issues : \n - An integer underflow exists when handling a large JavaScript 'RegExp'<br />

expression that can allow a potentially exploitable crash. (Issue 684815)\n - If an attacker<br />

could trick a user into holding down the 'Enter' key, via a malicious game for example, a<br />

malicious application or extension could be downloaded and executed. (CVE-2011-2372)\n<br />

- Unspecified error exist that can be exploited to corrupt memory. No additional<br />

information is available at this time. (CVE-2011-2995, CVE-2011-2996)\n - There is an<br />

error in the implementation of the 'window.location' JavaScript object when creating named<br />

frames. This can be exploited to bypass the same-origin policy and potentially conduct<br />

cross-site scripting attacks. (CVE-2011-2999)\n - A weakness exists when handling the<br />

'Location' header. This can lead to response splitting attacks when visiting a vulnerable web<br />

server. The same fix has been applied to the headers 'Content-Length' and<br />

'Content-Disposition'. (CVE-2011-3000)<br />

Solution: Upgrade to Firefox 3.6.23 or later.<br />

CVE-2011-3000<br />

Mozilla Firefox 6.0 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6028 FAMILY: Web Clients RISK: HIGH NESSUS ID:56335<br />

Family Internet Services 1645


Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host has a web browser installed that is vulnerable to<br />

multiple attack vectors.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox 6.0 are potentially affected by the following security issues : \n\n -<br />

If an attacker could trick a user into holding down the 'Enter' key, via a malicious game, for<br />

example, a malicious application or extension could be downloaded and executed.<br />

(CVE-2011-2372)\n\n - Unspecified errors exist that can be exploited to corrupt memory.<br />

No additional information is available at this time. (CVE-2011-2995, CVE-2011-2997)\n\n<br />

- A weakness exists when handling the 'Location' header. This can lead to response splitting<br />

attacks when visiting a vulnerable web server. The same fix has been applied to the headers<br />

'Content-Length' and 'Content-Disposition'. (CVE-2011-3000)\n\n - An error exists within<br />

WebGL's ANGLE library. It does not properly check for return values from the<br />

'GrowAtomTable()' function. This vulnerability can be exploited to cause a buffer overflow<br />

by sending a series of requests. Additionally, an unspecified error exists within WebGL that<br />

can be exploited to corrupt memory. (CVE-2011-3002, CVE-2011-3003)\n\n - There is an<br />

error within the JSSubScriptLoader that incorrectly unwraps 'XPCNativeWrappers'. By<br />

tricking a user into installing a malicious plug-in, an attacker could exploit this issue to<br />

execute arbitrary code. (CVE-2011-3004)\n\n - A use-after-free error exists when parsing<br />

OGG headers. (CVE-2011-3005)\n\n - There is an unspecified error within the YARR<br />

regular expression library that can be exploited to corrupt memory. (CVE-2011-3232)<br />

Solution: Upgrade to Firefox 7.0 or later.<br />

CVE-2011-3232<br />

Mozilla Thunderbird 6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6029 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:56336<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Thunderbird is<br />

:%L.\n\nThunderbird 6.0 is potentially affected by multiple vulnerabilities :\n\n - If an<br />

attacker could trick a user into holding down the 'Enter' key, via a malicious game, for<br />

example, a malicious application or extension could be downloaded or executed.<br />

(CVE-2011-2372, CVE-2011-3001)\n\n - Unspecified errors exist that can be exploited to<br />

corrupt memory. No additional information is avialable at this time. (CVE-2011-2995,<br />

CVE-2011-2997)\n\n - A weakness exists when handling the 'Location' header. This can<br />

lead to response splitting attacks when visiting a vulnerable web server. The same fix has<br />

been applied to the headers 'Content-Length' and 'Content-Disposition.<br />

(CVE-2011-3000)\n\n - A use-after-free error exists when parsing OGG headers.<br />

(CVE-2011-3005)\n\n - There is an unspecified error within the YARR regular expression<br />

library that can be exploited to corrupt memory. (CVE-2011-3232)<br />

Solution: Upgrade to Thunderbird 7.0 or later.<br />

CVE-2011-3232<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla SeaMonkey 2.x < 2.4.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6030 FAMILY: Web Clients RISK: HIGH NESSUS ID:56337<br />

Family Internet Services 1646


Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of SeaMonkey is : \n %L<br />

\n\nVersions of SeaMonkey earlier than 2.4.0 are potentially affected by multiple<br />

vulnerabilities : \n\n - If an attacker could trick a user into holding down the 'Enter' key, via<br />

a malicious game, for example, a malicious application or extension could be downloaded<br />

and executed. (CVE-2011-2372, CVE-2011-3001)\n\n - Unspecified errors exist that can be<br />

exploited to corrupt memory. No additional information is available at this time.<br />

(CVE-2011-2995, CVE-2011-2997)\n\n - A weakness exists when handling the 'Location'<br />

header. This can be lead to response splitting attacks when visiting a vulnerable web server.<br />

The same fix has been applied to the headers 'Content-Length' and 'Content-Disposition'.<br />

(CVE-2011-3000)\n\n - An error exists with WebGL's ANGLE library. It does not properly<br />

check for return values from the 'GrowAtomTable()' function. This vulnerability can be<br />

exploited to cause a buffer overflow by sending a series of requests. Additionally, an<br />

unspecified error exists within WebGL that can be exploited to corrupt memory.<br />

(CVE-2011-3002, CVE-2011-3003)\n\n - There is an error within the JSSubScriptLoader<br />

that incorrectly unwraps 'XPCNativeWrappers'. By tricking a user into installing a<br />

malicious plug-in, an attacker could exploit this issue to execute arbitrary code.<br />

(CVE-2011-3004)\n\n - A use-after-free error exists when parsing OGG headers.<br />

(CVE-2011-3005)\n\n - There is an unspecified error within the YARR regular expression<br />

library that can be exploited to corrupt memory. (CVE-2011-3232)<br />

Solution: Upgrade to SeaMonkey 2.4.0 or later.<br />

CVE-2011-3232<br />

Symantec IM Manager < 8.4.18 Multiple Vulnerabilities (SYM11-012)<br />

<strong>PVS</strong> ID: 6031 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:56378<br />

Description: Synopsis : \n\nThe remote host contains a web application that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running Symantec IM Manager, an application for<br />

managing instant messaging traffic. For your information, the observed version of<br />

Symantec IM Manager is : \n %L \n\nVersions of Symantec IM Manager earlier than build<br />

8.4.18 are potentially affected by multiple vulnerabilities : \n\n - An unspecified cross-site<br />

scripting vulnerability. (CVE-2011-0552)\n\n - An unspecified SQL injection vulnerability.<br />

(CVE-2011-0553)\n\n - An unspecified code injection vulnerability. (CVE-2011-0554)<br />

Solution: Upgrade to Symantec IM Manager build 8.4.18 or later.<br />

CVE-2011-0554<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Google Chrome < 14.0.835.202 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6032 FAMILY: Web Clients RISK: HIGH NESSUS ID:56391<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Google Chrome is : \n %L<br />

.\n\nVersions of Google Chrome earlier than 14.0.835.202 are affected by multiple<br />

vulnerabilities : \n\n - A use-after-free issue exists in text line box handling. (Issue<br />

Family Internet Services 1647


93788)\n\n - A stale font issue exists in SVG text handling. (Issue 95072)\n\n - An<br />

inappropriate cross-origin access to the window prototype exists. (Issue 95671)\n\n -<br />

Lifetime and threading issues exist in audio node handling. (Issue 96150)\n\n - A<br />

use-after-free issue exists in the v8 bindings. (Issues 97451, 97520, 97615)\n\n - A memory<br />

corruption issue exists in v8 hidden objects. (Issue 97784)\n\n - A memory corruption issue<br />

exists in the shader translator. (Issue 98089)<br />

Solution: Upgrade to Google Chrome 14.0.835.202 or later.<br />

CVE-2011-3873<br />

'.dll' File Download Detection<br />

<strong>PVS</strong> ID: 6033 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web client downloaded a .dll file. The file downloaded was %L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

'.dll' File Download Detection<br />

<strong>PVS</strong> ID: 6034 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web client downloaded a .dll file. The file downloaded was %L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

'.dll' File Download Detection<br />

<strong>PVS</strong> ID: 6035 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web client downloaded a .dll file. The file downloaded was %L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

'.dll' File Download Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6036 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1648


Description: The remote web client downloaded a .dll file. The file downloaded was %L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

iTunes < 10.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6037 FAMILY: Web Clients RISK: HIGH NESSUS ID:56470<br />

Description: Synopsis :\n\nThe remote host contains an application that is vulnerable to multiple attack<br />

vectors.\n\nThe remote host has iTunes installed, a popular media player for Windows and<br />

Mac OS. For your information, the observed version of iTunes is \n%L.\n\nVersions of<br />

iTunes earlier than 10.5 are potentially affected by numerous issues in the following<br />

components :\n\n - CoreFoundation\n\n - ColorSync\n\n - CoreAudio\n\n - CoreMedia\n\n -<br />

ImageIO\n\n - WebKit<br />

Solution: Upgrade to iTunes 10.5 or later.<br />

CVE-2011-3252<br />

Safari < 5.1.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6038 FAMILY: Web Clients RISK: HIGH NESSUS ID:56483<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nThe remote host has Safari installed. For your information, the observed version<br />

of Safari is : \n %L .\n\nVersions of Safari earlier than 5.1.1 are potentially affected by<br />

several issues in the following components : \n\n - Safari\n\n - WebKit<br />

Solution: Upgrade to Safari 5.1.1 or later.<br />

CVE-2011-3243<br />

Mac OS X 10.7 < 10.7.2 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6039 FAMILY: Generic RISK: HIGH NESSUS ID:56480<br />

Description: Synopsis : \n\nThe remote host is missing a Mac OS X update that fixes a security<br />

issue.\n\nFor your information, the observed version of Mac OS X is : \n %L \n\nVersions<br />

of Mac OS X 10.7 earlier than 10.7.2 are potentially affected by a security issue. Mac OS X<br />

10.7.2 contains a security fix for the following products : \n\n - Apache\n\n - Application<br />

Firewall\n\n - ATS\n\n - BIND\n\n - Certificate Trust Policy\n\n - CF<strong>Network</strong>\n\n -<br />

CoreMedia\n\n - CoreProcesses\n\n - CoreStorage\n\n - File Systems\n\n - iChat Server\n\n<br />

- Kernel\n\n - libsecurity\n\n - Open Directory\n\n - PHP\n\n - python\n\n - QuickTime\n\n<br />

- SMB File Server\n\n - X11\nIAVA Reference : 2012-A-0020\nIAVA Reference :<br />

2012-A-0085\nSTIG Finding Severity : Category I<br />

Family Internet Services 1649


Solution: Upgrade to Mac OS X 10.7.2 or later.<br />

NetFlix User Detection<br />

CVE-2011-3437<br />

<strong>PVS</strong> ID: 6040 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a NetFlix client. NetFlix is an online service which allows users<br />

to stream videos to their computer or network equipment.<br />

realtime<br />

Solution: Ensure that this application is authorized for your network<br />

CVE Not available<br />

Apple iOS 3.0 through 4.3.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6041 FAMILY: Mobile Devices RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is an iPhone, iPod Touch, or iPad running iOS. For your information, the observed version<br />

of iOS is : \n %L \n\nVersions of iOS 3.0 through 4.3.5 are potentially affected by multiple<br />

vulnerabilities. iOS 5.0 contains security fixes for the following products : \n\n -<br />

CalDAV\n\n - Calendar\n\n - CF<strong>Network</strong>\n\n - CoreFoundation\n\n - CoreGraphics\n\n -<br />

CoreMedia\n\n - Data Access\n\n - Data <strong>Security</strong>\n\n - Home security\n\n - ImageIO\n\n -<br />

Kernel\n\n - Keyboards\n\n - libxml\n\n - OfficeImport\n\n - Safari\n\n - Settings\n\n -<br />

UIKit Alerts\n\n - WebKit\n\n - WiFi\nIAVB Reference : 2012-B-0006\nSTIG Finding<br />

Severity : Category I<br />

Solution: Upgrade to iOS 5.0 or later.<br />

NetFlix User Detection<br />

CVE-2011-3434<br />

<strong>PVS</strong> ID: 6042 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a NetFlix client. NetFlix is an online service which allows users<br />

to stream videos to their computer or network equipment.<br />

realtime<br />

Solution: Ensure that this application is authorized for your network.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Asterisk Remote Crash Vulnerability in SIP Channel Driver (AST-2011-012)<br />

<strong>PVS</strong> ID: 6043 FAMILY: Generic NESSUS ID:56922<br />

Family Internet Services 1650


RISK:<br />

MEDIUM<br />

Description: Synopsis :\n\nThe remote VoIP server is vulnerable to a denial of service attack.\n\nFor<br />

your information, the observed version of Asterisk is : \n %L \n\nVersions of Asterisk 1.8.x<br />

earlier than 1.8.7.1 are potentially affected by a denial of service attack in the SIP channel<br />

driver. A remote authenticated attacker can cause a crash with a malformed request due to<br />

an uninitialized variable.<br />

Solution: Upgrade to Asterisk 1.8.7.1<br />

CVE-2011-4063<br />

ClamAV < 0.97.3 Unspecified Denial of Service<br />

<strong>PVS</strong> ID: 6044 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an anti-virus application that is vulnerable to a<br />

denial of service attack.\n\nThe reported version of ClamAV on the remote host is : \n %L<br />

\n\nVersions of ClamAV earlier than 0.97.3 are potentially affected by an unspecified<br />

denial of service vulnerability that can be exploited to cause the clamd daemon to crash.<br />

Solution: Upgrade to ClamAV 0.97.3 or later.<br />

CVE-2011-3627<br />

Joomla! 1.5 < 1.5.24 Information Disclosure Vulnerability<br />

<strong>PVS</strong> ID: 6045 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server has an application that is affected by an information<br />

disclosure vulnerability.\n\nThe remote web server is hosting Joomla!, a content<br />

management system written in PHP. For your information, the observed version of Joomla!<br />

is : \n %L .\n\nVersions of Joomla! 1.5.x earlier than 1.5.24 are potentially affected by an<br />

information disclosure vulnerability due to the use of weak encryption.<br />

Solution: Upgrade to Joomla! 1.5.24 or later.<br />

CVE Not available<br />

Joomla! 1.7 < 1.7.2 Multiple Information Disclosure Vulnerabilities<br />

<strong>PVS</strong> ID: 6046 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server has an application that is vulnerable to multiple<br />

attack vectors.\n\nThe remote web server is hosting Joomla!, a content management system<br />

written in PHP. For your information, the observed version of Joomla! is : \n %L<br />

.\n\nVersions of Joomla 1.7 earlier than 1.7.2 are potentially affected by multiple<br />

Family Internet Services 1651


information disclosure vulnerabilities : \n\n - A weak encryption mechanism could lead to<br />

information disclosure.\n\n - Inadequate error checking could lead to information<br />

disclosure.<br />

Solution: Upgrade to Joomla! 1.7.2 or later.<br />

CVE Not available<br />

Tumblr Blog Edit Detection<br />

<strong>PVS</strong> ID: 6047 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a Tumblr client. Tumblr is a network service which allows for<br />

sharing of blog posts, images, and videos. The <strong>PVS</strong> has just observed the client updating<br />

their blog.<br />

realtimeonly<br />

Solution: Ensure that this application is authorized for your network<br />

CVE Not available<br />

Tumblr Photo Upload Detection<br />

<strong>PVS</strong> ID: 6048 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a Tumblr client. Tumblr is a network service which allows for<br />

sharing of blog posts, images, and videos. The <strong>PVS</strong> has just observed the client uploading a<br />

photo.<br />

realtimeonly<br />

Solution: Ensure that this application is authorized for your network.<br />

CVE Not available<br />

iHeartRadio Stream Detection<br />

<strong>PVS</strong> ID: 6049 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host was observed accessing an iHeartRadio stream.<br />

realtimeonly<br />

Solution: Ensure that this application is authorized for your network.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Google Chrome < 15.0.874.102 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6050 FAMILY: Web Clients RISK: HIGH NESSUS ID:56650<br />

Family Internet Services 1652


Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Google Chrome is : \n %L<br />

.\n\nVersions of Google Chrome earlier than 15.0.874.102 are affected by multiple<br />

vulnerabilities : \n\n - Several URL bar spoofing errors exist related to history handling and<br />

drag-and-drop of URLs. (CVE-2011-28245, CVE-2011-3875)\n\n - Whitespace is stripped<br />

from the end of download filenames. (CVE-2011-3876)\n\n - A cross-site scripting issue<br />

exists related to the appcache internals page. (CVE-2011-3877)\n\n - A race condition<br />

exists related to working process initialization. (CVE-2011-3878)\n\n - An error exists<br />

related to redirection to chrome scheme URIs. (CVE-2011-3879)\n\n - Unspecified special<br />

characters may be used as delimiters in HTTP headers. (CVE-2011-3880)\n\n - Several<br />

cross-origin policy violation issues exist. (CVE-2011-3881)\n\n - Several use-after-free<br />

errors exist related to media buffer handling, counter handling, stale styles, plugins and<br />

editing, and video source handling. (CVE-2011-3882, CVE-2011-3883, CVE-2011-3885,<br />

CVE-2011-3888, CVE-2011-3890)\n\n - Timing issues exist related to DOM traversal.<br />

(CVE-2011-3884)\n\n - An out-of-bounds write error exists in the V8 JavaScript engine.<br />

(CVE-2011-3886)\n\n - Cookie theft is possible via JavaScript URIs. (CVE-2011-3887)\n\n<br />

- A heap overflow issue exists related to Web Audio. (CVE-2011-3889)\n\n - Functions<br />

internal to the V8 JavaScript engine are exposed. (CVE-2011-3891)<br />

Solution: Upgrade to Google Chrome 15.0.874.102 or later.<br />

CVE-2011-3891<br />

Apple iTunes Client Detection<br />

<strong>PVS</strong> ID: 6051 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is an iTunes client.<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

QuickTime < 7.7.1 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6052 FAMILY: Web Clients RISK: HIGH NESSUS ID:56667<br />

Description: Synopsis :\n\nThe remote host contains an application that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of QuickTime is %L.\n\nVersions<br />

of QuickTime earlier than 7.7.1 are potentially affected by multiple vulnerabilities :\n\n - A<br />

buffer overflow exists in the handling of H.264 encoded movie files. (CVE-2011-3219)\n\n<br />

- An uninitialized memory access issue exists in the handling of URL data handlers within<br />

movie file. (CVE-2011-3220)\n\n - An implementation issue exists in the handling of the<br />

atom hierarchy within a movie files. (CVE-2011-3221)\n\n - A cross-site scripting issue<br />

exists int he Save for Web export. (CVE-2011-3218)\n\n - A buffer overflow exists in the<br />

handling of FlashPix files. (CVE-2011-3222)\n\n - A buffer overflow exists in the handling<br />

of FLIC files. (CVE-2011-3223)\n\n - Multiple memory corruption issues exist in the<br />

handling of movie files. (CVE-2011-3228)\n\n - An integer overflow issue exists in the<br />

Family Internet Services 1653


handling of PICT files. (CVE-2011-3247)\n\n - A signedness issue exists in the handling of<br />

font tables embedded n QuickTime movie files.\n\n - A buffer overflow issue exists in the<br />

handling of FLC encoded movie files. (CVE-2011-3249)\n\n - An integer overflow issue<br />

exists in the handling of JPEG2000 encoded movie files. (CVE-2011-3250)\n\n - A<br />

memory corruption issue exists in the handling of TKHD atoms in QuickTime movie files.<br />

(CVE-2011-3251)<br />

Solution: Upgrade to QuickTime 7.7.1 or later.<br />

CVE-2011-3251<br />

Opera < 11.52 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6053 FAMILY: Web Clients RISK: HIGH NESSUS ID:56585<br />

Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running the Opera web browser. For your<br />

information, the observed version of Opera is : \n %L \n\nVersions of Opera earlier than<br />

11.52 are potentially affected by multiple vulnerabilities : \n\n - An error exists in the<br />

handling of certain font manipulations inside dynamically added or specifically embedded<br />

SVG images or SVG content in nested frames. This error can cause the application to crash<br />

and can possibly allow arbitrary code execution. (Issue 1002)\n\n - Several unspecified<br />

error exist that can allow stack overflows leading to browser crashes.<br />

Solution: Upgrade to Opera 11.52 or later.<br />

CVE Not available<br />

Novell iPrint Client < 5.72 Code Execution Vulnerability<br />

<strong>PVS</strong> ID: 6054 FAMILY: Web Clients RISK: HIGH NESSUS ID:56682<br />

Description: Synopsis :\n\nThe remote host contains an application that is affected by a code execution<br />

vulnerability.\n\nThe remote host has the Novell iPrint client installed. For your<br />

information, the observed version of Novell iPrint Client is : \n %L .\n\nVersions of Novell<br />

iPrint Client earlier than 5.72 are potentially affected by a buffer overflow vulnerability in<br />

the GetDriverSettings method of the nipplib.dll component. A remote, unauthenticated<br />

attacker, exploiting this flaw, could execute arbitrary code on the remote host subject to the<br />

privileges of the user running the affected application.<br />

Solution: Upgrade to Novell iPrint Client 5.72 or later.<br />

GoToMyPC Detection<br />

CVE-2011-3173<br />

<strong>PVS</strong> ID: 6055 FAMILY: Policy<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 1654


Description: The remote host is running GoToMyPC, a remote administration tool that allows access to<br />

a PC. This software uses a backchannel (viewed as an outgoing connection by your<br />

firewall) to communicate with the vendor's computers that then broker a connection back to<br />

the remote client accessing this computer.<br />

realtimeonly<br />

Solution: Verify that this conforms to your security policy.<br />

CVE Not available<br />

Winamp < 5.622 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6056 FAMILY: Generic RISK: HIGH NESSUS ID:56681<br />

Description: Synopsis : \n\nThe remote host has a media player installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running Winamp, a media player for Windows. For<br />

your information, the observed version of Winamp is : \n %L \n\nVersions of Winamp<br />

earlier than 5.622 are potentially affected by the following overflow vulnerabilities : \n\n -<br />

A heap-based buffer overflow exists in the plugin in_midi.dll when processing the<br />

iOffsetMusic value in the Creative Music Format (CMF) header.\n\n - A heap-based buffer<br />

overflow exists in the plugin in_mod.dll when processing the channels value in the<br />

Advanced Module Format (AMF) header.\n\n - A heap-based buffer overflow exists in the<br />

plugin in_nsv.dll when processing the toc_alloc value in the Nullsoft Streaming Video<br />

(NSF) header.\n\n - Integer overflow errors exist in the TSCC RGB and YUV decoders.<br />

Solution: Upgrade to Winamp 5.622 or later.<br />

CVE Not available<br />

Novell Messenger Server < 2.2.1 Memory Information Disclosure<br />

<strong>PVS</strong> ID: 6057 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:56691<br />

Description: Synopsis : \n\nThe remote host has an instant messaging server product installed that is<br />

affected by an information disclosure vulnerability.\n\nThe remote host is running Novell<br />

Messenger Server, formerly Groupwise Messenger, an instant messaging server<br />

application. For your information, the observed version of Novell Messenger Server is : \n<br />

%L \n\nVersions of Novell Messenger Server earlier than 2.2.1 are potentially affected by<br />

an information disclosure vulnerability whereby a remote, unauthenticated attacker could<br />

send commands that would force the Messenger server process to return the contents of<br />

arbitrary memory locations. This data could potentially include strings containing the<br />

credentials used by Messenger to authenticate to directory services.<br />

Solution: Upgrade to Novell Messenger 2.2.1 or later.<br />

CVE-2011-3179<br />

TimThumb Application Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1655


<strong>PVS</strong> ID: 6058 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running TimThumb, a PHP application which allows for image sizing<br />

on demand.<br />

Solution: Ensure that you are running the latest version of this product.<br />

CVE Not available<br />

TimThumb Arbitrary Code Injection<br />

<strong>PVS</strong> ID: 6059 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software which allows arbitrary code<br />

injection\n\nThe remote host is running TimThumb, a PHP application which allows for<br />

image sizing on demand. This version of TimThumb is vulnerable to a flaw in the way that<br />

it parses valid 'allowed sites'. By default, TimThumb ships with a predefined list of trusted<br />

domains. However, when parsing client-issued URLs, it does not ensure that the domain is<br />

valid. So, for instance, an attacker can use a domain like flickr.com.myhost.com and<br />

TimThumb will download from that site because it contains the string 'flickr.com'. The<br />

domain which <strong>PVS</strong> observed being passed to TimThumb was %P<br />

Solution: Ensure that you are running the latest version of this product.<br />

CVE Not available<br />

TimThumb Version Detection<br />

<strong>PVS</strong> ID: 6060 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running TimThumb version : %L<br />

Solution: Ensure that you are running the latest version of this product.<br />

CVE Not available<br />

World of Warcraft/Battle.net Detection<br />

<strong>PVS</strong> ID: 6061 FAMILY: Internet Services<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is running World of Warcraft or another Battle.net-compatible game.<br />

realtimeonly<br />

Solution: Verify that this conforms to your security policy.<br />

CVE Not available<br />

Apache 2.2 < 2.2.21 mod_proxy_ajp DoS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1656


<strong>PVS</strong> ID: 6062 FAMILY: Web Servers RISK: HIGH NESSUS ID:56216<br />

Description: Synopsis : \n\nThe remote web server is vulnerable to a denial of service attack.\n\nFor<br />

your information, the observed version of Apache HTTP server is : \n %L \n\nVersions of<br />

Apache 2.2 earlier than 2.2.21 are potentially affected by a denial of service vulnerability.<br />

An error exists in the mod_proxy_ajp module that can allow specially crafted HTTP<br />

requests to cause a backend server to temporarily enter an error state. This vulnerability<br />

only occurs when mod_proxy_ajp is used along with mod_proxy_balancer.<br />

Solution: Upgrade to Apache version 2.2.21 or later.<br />

PS3 Login Detection<br />

CVE-2011-3348<br />

<strong>PVS</strong> ID: 6063 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host has logged into the PS3 network.<br />

realtimeonly<br />

Solution: Ensure that this product is authorized with respect to Corporate policy.<br />

PS3 Version Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 6064 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a PS3 gaming console version : %L<br />

Solution: Ensure that this product is authorized with respect to Corporate policy.<br />

CVE Not available<br />

VNC Client Session Started<br />

<strong>PVS</strong> ID: 6065 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client has just initiated a VNC connection.<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Android Market Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6066 FAMILY: Mobile Devices RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1657


Description: The remote device just accessed the Android Market.<br />

realtimeonly<br />

Solution: Ensure that this product is authorized with respect to corporate policy.<br />

CVE Not available<br />

Android version Detection<br />

<strong>PVS</strong> ID: 6067 FAMILY: Mobile Devices RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is an Android mobile device version: %L<br />

Solution: Ensure that this product is authorized with respect to corporate policy.<br />

CVE Not available<br />

BlackBerry Version Detection<br />

<strong>PVS</strong> ID: 6068 FAMILY: Mobile Devices RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the BlackBerry operating system version: %L<br />

Solution: N/A<br />

CVE Not available<br />

DELL Mobile Device Version Detection<br />

<strong>PVS</strong> ID: 6069 FAMILY: Mobile Devices RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a DELL mobile device version: %L<br />

Solution: N/A<br />

CVE Not available<br />

HP Tablet Mobile Device Version Detection<br />

<strong>PVS</strong> ID: 6070 FAMILY: Mobile Devices RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running an HP Tablet mobile device version: %L<br />

Solution: N/A<br />

CVE Not available<br />

HP Tablet Mobile Device Version Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6071 FAMILY: Mobile Devices RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1658


Description: The remote host is running an HP Tablet mobile device version: %L<br />

Solution: N/A<br />

CVE Not available<br />

HTC Mobile Device Version Detection<br />

<strong>PVS</strong> ID: 6072 FAMILY: Mobile Devices RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running an HTC mobile device version: %L<br />

Solution: N/A<br />

CVE Not available<br />

HTC Mobile Device Version Detection<br />

<strong>PVS</strong> ID: 6073 FAMILY: Mobile Devices RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running an HTC mobile device version: %L<br />

Solution: N/A<br />

CVE Not available<br />

HTC Mobile Device Version Detection<br />

<strong>PVS</strong> ID: 6074 FAMILY: Mobile Devices RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running an HTC mobile device version: %L<br />

Solution: N/A<br />

CVE Not available<br />

Kindle Mobile Device Version Detection<br />

<strong>PVS</strong> ID: 6075 FAMILY: Mobile Devices RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a Kindle mobile device version: %L<br />

Solution: N/A<br />

CVE Not available<br />

LG Mobile Device Version Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6076 FAMILY: Mobile Devices RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1659


Description: The remote host is running an LG mobile device version: %L<br />

Solution: N/A<br />

CVE Not available<br />

Nokia Mobile Device Version Detection<br />

<strong>PVS</strong> ID: 6077 FAMILY: Mobile Devices RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a Nokia mobile device version: %L<br />

Solution: N/A<br />

CVE Not available<br />

Nook Mobile Device Version Detection<br />

<strong>PVS</strong> ID: 6078 FAMILY: Mobile Devices RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a Nook mobile device version: %L<br />

Solution: N/A<br />

CVE Not available<br />

Samsung Mobile Device Version Detection<br />

<strong>PVS</strong> ID: 6079 FAMILY: Mobile Devices RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a Samsung mobile device version: %L<br />

Solution: N/A<br />

CVE Not available<br />

Samsung Mobile Device Version Detection<br />

<strong>PVS</strong> ID: 6080 FAMILY: Mobile Devices RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a Samsung mobile device version: %L<br />

Solution: N/A<br />

CVE Not available<br />

Samsung Mobile Device Version Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6081 FAMILY: Mobile Devices RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1660


Description: The remote host is running a Samsung mobile device version: %L<br />

Solution: N/A<br />

CVE Not available<br />

Samsung Mobile Device Version Detection<br />

<strong>PVS</strong> ID: 6082 FAMILY: Mobile Devices RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a Samsung mobile device version: %L<br />

Solution: N/A<br />

CVE Not available<br />

Samsung Mobile Device Version Detection<br />

<strong>PVS</strong> ID: 6083 FAMILY: Mobile Devices RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a Samsung mobile device version: %L<br />

Solution: N/A<br />

CVE Not available<br />

PalmOS Mobile Device Version Detection<br />

<strong>PVS</strong> ID: 6084 FAMILY: Mobile Devices RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a PalmOS mobile device version: %L<br />

Solution: N/A<br />

CVE Not available<br />

Symbian Mobile Device Version Detection<br />

<strong>PVS</strong> ID: 6085 FAMILY: Mobile Devices RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a Symbian series 60 mobile device<br />

Solution: N/A<br />

CVE Not available<br />

Motorola Mobile Device Version Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6086 FAMILY: Mobile Devices RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1661


Description: The remote host is running a Motorola mobile device version: %L<br />

Solution: N/A<br />

CVE Not available<br />

Symantec pcAnywhere Detection<br />

<strong>PVS</strong> ID: 6087 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running pcAnywhere, an application that allows remote users to connect<br />

to a Windows desktop and work remotely.<br />

realtimeonly<br />

Solution: Ensure that you are running the latest version of pcAnywhere.<br />

CVE Not available<br />

SSH Server Detection (realtime)<br />

<strong>PVS</strong> ID: 6088 FAMILY: SSH RISK: NONE NESSUS ID:Not Available<br />

Description: The remote host is running a SSH server and was just logged into by a client.<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

SSH Client login detected (realtime)<br />

<strong>PVS</strong> ID: 6089 FAMILY: SSH RISK: NONE NESSUS ID:Not Available<br />

Description: The remote SSH client has just logged into a server<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Google Music Client Detection<br />

<strong>PVS</strong> ID: 6090 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is running the Google Music application version : %L<br />

Solution: N/A<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1662


CVE Not available<br />

Google Music Client Upload Detection<br />

<strong>PVS</strong> ID: 6091 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is uploading the following music file to Google Music : %L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Google Music Client Session Initiated<br />

<strong>PVS</strong> ID: 6092 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote user has just logged into Google Music, a site which allows remote streaming<br />

of a user's music files<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

ISC BIND 9 Query.c Logging Resolver Denial of Service<br />

<strong>PVS</strong> ID: 6093 FAMILY: DNS Servers RISK: HIGH NESSUS ID:56862<br />

Description: Synopsis :\n\nThe remote DNS server is vulnerable to a denial of service attack.\n\nThe<br />

remote host is running Bind, a popular name server. For your information, the observed<br />

version of Bind is :\n %L \n\nVersions of BIND 9.4-ESV earlier than 9.4-ESV-R5-P1,<br />

9.6-ESV earlier than 9.6-ESV-R5-P1, 9.7.x earlier than 9.7.4-P1, and 9.8.x earlier than<br />

9.8.1-P1 are potentially affected by a denial of service vulnerability. An unidentified<br />

network event causes BIND9 resolvers to cache an invalid record, subsequent queries for<br />

which could crash the resolvers with an assertion failure.<br />

Solution: Upgrade to BIND 9.4-ESV-R5-P1 / 9.6-ESV-R5-P1, 9.7.4-P1, 9.8.1-P1, or later.<br />

CVE-2011-4313<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Google Chrome < 15.0.874.120 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6094 FAMILY: Web Clients RISK: HIGH NESSUS ID:56779<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Google Chrome is<br />

:\n%L.\n\nVersions of Google Chrome earlier than 15.0.874.120 are affected by multiple<br />

Family Internet Services 1663


vulnerabilities :\n\n - A double-free error exists in the Theora decoder.<br />

(CVE-2011-3892)\n\n - Out-of-bounds read errors exist in the MVK and Vorbis media<br />

handlers. (CVE-2011-3892)\n\n - A memory corruption error exists in the VP8 decoding.<br />

(CVE-2011-3894)\n\n - A heap overflow error exists in the Vorbis decoder.<br />

(CVE-2011-3895)\n\n - A buffer overflow error exists in the shader variable mapping<br />

functionality. (CVE-2011-3896)\n\n - A use-after-free error exists related to unspecified<br />

editing. (CVE-2011-3897)\n\n - In JRE7, applets are allowed to run without the proper<br />

permissions. (CVE-2011-3898)<br />

Solution: Upgrade to Google Chrome 15.0.874.120 or later.<br />

CVE-2011-3898<br />

Google Chrome < 15.0.874.121 Code Execution Vulnerability<br />

<strong>PVS</strong> ID: 6095 FAMILY: Web Clients RISK: HIGH NESSUS ID:56920<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by a code execution<br />

vulnerability.\n\nFor your information, the observed version of Google Chrome is<br />

:\n%L.\n\nVersions of Google Chrome earlier than 15.0.874.121 are affected by a code<br />

execution vulnerability due to an out-of-bounds write in v8. A remote, unauthenticated<br />

attacker, exploiting this flaw, could execute arbitrary code on the remote host subject to the<br />

privileges of the user running the affected application.<br />

Solution: Upgrade to Google Chrome 15.0.874.121 or later.<br />

CVE-2011-3900<br />

Apple iOS 3.0 through 5.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6096 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is an iPhone, iPod Touch, or iPad running iOS. For your information, the observed version<br />

of iOS is : \n %L \n\nVersions of iOS 3.0 through 5.0 are potentially affected by multiple<br />

vulnerabilities. iOS 5.0 contains security fixes for the following products :\n\n -<br />

CF<strong>Network</strong>\n\n - CoreGraphics\n\n - Data <strong>Security</strong>\n\n - Kernel\n\n - libinfo\n\n - Passcode<br />

Lock<br />

Solution: Upgrade to iOS 5.0.1 or later.<br />

CVE-2011-3442<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Flash Player < 10.3.183.11 / 11.1.102.55 Multiple Vulnerabilities (APSB11-26)<br />

<strong>PVS</strong> ID: 6097 FAMILY: Web Clients RISK: HIGH NESSUS ID:56875<br />

Description: Synopsis :\n\nThe remote host contains a browser plug-in that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host has Adobe Flash Player installed. For your information,<br />

the observed version of Adobe Flash Player is : \n %L \n\nVersions of Flash Player earlier<br />

than 10.3.183.11 / 11.1.102.55 are potentially affected by multiple vulnerabilities :\n\n -<br />

Family Internet Services 1664


Several unspecified memory corruption errors exist that could lead to code execution.<br />

(CVE-2011-2445, CVE-2011-2451, CVE-2011-2452, CVE-2011-2453, CVE-2011-2454,<br />

CVE-2011-2455, CVE-2011-2459, CVE-2011-2460)\n\n - An unspecified heap corruption<br />

error exists that could lead to code execution. (CVE-2011-2450)\n\n - An unspecified<br />

buffer overflow error exists that could lead to code execution. (CVE-2011-2456)\n\n - An<br />

unspecified stack overflow error exists that could lead to code execution.<br />

(CVE-2011-2457)\n\n - An unspecified error related to Internet Explorer can allow<br />

cross-domain policy violations. (CVE-2011-2458)<br />

Solution: Upgrade to Flash Player 10.3.183.11, 11.1.102.55 or later.<br />

CVE-2011-2460<br />

iTunes < 10.5.1 Update Authenticity Verification Weakness<br />

<strong>PVS</strong> ID: 6098 FAMILY: Web Clients RISK: HIGH NESSUS ID:56873<br />

Description: Synopsis :\n\nThe remote host contains an application that is susceptible to a<br />

man-in-the-middle attack.\n\nThe remote host has iTunes installed, a popular media player<br />

for Windows and Mac OS. For your information, the observed version of iTunes is<br />

:\n%L.\n\nVersions of iTunes earlier than 10.5.1 use an unsecured HTTP connection when<br />

checking for or retrieving software updates, which could allow a man-in-the-middle<br />

attacker to provide a Trojan horse update that appears to originate from Apple.<br />

Solution: Upgrade to iTunes 10.5.1 or later.<br />

CVE-2008-3434<br />

DB2 9.7 < Fix Pack 5 Local Denial of Service Vulnerability<br />

<strong>PVS</strong> ID: 6099 FAMILY: Database RISK: LOW NESSUS ID:56928<br />

Description: Synopsis :\n\nThe remote database server is vulnerable to a denial of service attack.\n\nFor<br />

your information, the observed version of IBM DB2 is : \n %L \n\nVersions of IBM DB2<br />

9.7 earlier than Fix Pack 5 are potentially affected by a local denial of service vulnerability.<br />

On Unix and Unix-like systems with both the Self Tuning Memory manager (STMM)<br />

feature enabled and the 'DATABASE_MEMORY' option set to 'AUTOMATIC', local users<br />

are able to carry out denial of service attacks via unknown vectors.<br />

Solution: Disable automatic tuning of 'DATABASE_MEMORY' or upgrade to IBM DB2 9.7 Fix<br />

Pack 5 or later.<br />

CVE-2011-1373<br />

Sony Blu-Ray Player Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6100 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1665


Description: The remote host is a Blu-Ray player. These devices can be used to stream content from the<br />

Internet. The User-Agent string may be of use in determining the MAC address and model<br />

information of this device: \n %L<br />

Solution: Ensure that such devices are authorized for your network<br />

CVE Not available<br />

ProFTPD < 1.3.3g / 1.3.4 Response Pool Use-After-Free Code Execution<br />

<strong>PVS</strong> ID: 6101 FAMILY: FTP Servers RISK: HIGH NESSUS ID:56956<br />

Description: Synopsis :\n\nThe remote FTP server is affected by a code execution vulnerability.\n\nThe<br />

remote host is using ProFTPD, a free FTP server for Unix and Linux. For your information,<br />

the observed version of ProFTPD is : \n %L \n\nVersions of ProFTPD earlier than 1.3.3g /<br />

1.3.4 are potentially affected by a code execution vulnerability due to how the server<br />

manages the response pool that is used to send responses from the server to the client. A<br />

remote, authenticated attacker, exploiting this flaw, could execute arbitrary code on the<br />

remote host subject to the privileges of the user running the affected application.<br />

Solution: Upgrade to version 1.3.3g, 1.3.4, or later.<br />

CVE-2011-4130<br />

OpenVAS Server Detection<br />

<strong>PVS</strong> ID: 6102 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote server is running an OTP (OpenVas Transport Protocol)<br />

server. OpenVAS is an open source tool that is used for performing security scans.<br />

Solution: Ensure that this application is authorized according to corporate policies and guidelines.<br />

CVE Not available<br />

FTP File Upload Detection<br />

<strong>PVS</strong> ID: 6103 FAMILY: FTP Clients RISK: LOW NESSUS ID:Not Available<br />

Description: <strong>PVS</strong> observed at least one FTP session originating from this client address. The client just<br />

uploaded the following file. %L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

CA eTrust Directory SNMP Packet Parsing Denial of Service<br />

Family Internet Services 1666


<strong>PVS</strong> ID: 6104 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:57035<br />

Description: Synopsis :\n\nThe remote directory service is vulnerable to a denial of service<br />

attack.\n\nThe remote host is running CA eTrust Directory Server, a directory service<br />

application from CA. For your information, the observed version of CA eTrust Directory<br />

Server is :\n %L \n\nVersions of CA eTrust Directory 8.1, and R12 earlier than service<br />

pack 7 CR1 are potentially affected by a denial of service vulnerability due to the way the<br />

application parses SNMP packets. A remote, unauthenticated attacker, exploiting this flaw,<br />

could crash the affected service.<br />

Solution: Upgrade to CA eTrust Directory R12 SP7 CR1 or later.<br />

CVE-2011-3849<br />

Opera < 11.60 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6105 FAMILY: Web Clients RISK: HIGH NESSUS ID:57039<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running the Opera web browser. For your<br />

information, the observed version of Opera is : \n %L \n\nVersions of Opera earlier than<br />

11.60 are potentially affected by multiple vulnerabilities : \n\n - Top level domain<br />

separation rules are not honored for two-letter top level domains, e.g., .us or .uk and some<br />

three-letter top-level domains. This error can allow sites to set the scripting context to the<br />

top level domain. Further, this can allow sites to set and read cookies from other sites<br />

whose scripting context is set to the same top level domain. (Issue 1003)\n\n - An error<br />

exists in the SSLv3 and TLSv1.3 specification that can allow the BEAST attack. (Issue<br />

1004)\n\n - An error exists in the implementation of the JavaScript 'in' operator that can<br />

allow sites to verify the existence of variables of sites in other domains. (Issue 1005)\n\n -<br />

An unspecified, moderately sever issue exists. Details are to be disclosed by the vendor at a<br />

later date.\nIAVB Reference : 2012-B-0006\nSTIG Finding Severity : Category I<br />

Solution: Upgrade to Opera 11.60 or later.<br />

Mac OS X Detection<br />

CVE-2011-4687<br />

<strong>PVS</strong> ID: 6106 FAMILY: Operating System Detection RISK: NONE NESSUS ID:Not Available<br />

Description: The remote host is running Mac OS X<br />

Solution: Solution Not Available<br />

CVE Not available<br />

Windows Version Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6107 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1667


Description: The remote host is running Windows : %L<br />

Solution: N/A<br />

CVE Not available<br />

Google Chrome < 16.0.912.63 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6108 FAMILY: Web Clients RISK: HIGH NESSUS ID:57288<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Google Chrome is :\n %L<br />

\n\nVersions of Google Chrome earlier than 16.0.912.63 are potentially affected by<br />

multiple vulnerabilities :\n\n - Out-of-bounds read errors exist related to regex matching,<br />

libxml, the PDF parser, the SVG parser, YUV video frame handling, il8n handling in V8<br />

and PDF cross references. (CVE-2011-3903, CVE-2011-3905, CVE-2011-3906,<br />

CVE-2011-3908, CVE-2011-3910, CVE-2011-3911, CVE-2011-3914,<br />

CVE-2011-3916)\n\n - Use-after-free errors exist related to SVG filters, Range handling<br />

and bidi handling. (CVE-2011-3904, CVE-2011-3912, CVE-2011-3913)\n\n - URL bar<br />

spoofing is possible due to an error related to 'view source'. (CVE-2011-3907)\n\n - A<br />

memory corruption error exists related to arrays of CSS properties. (CVE-2011-3909)\n\n -<br />

A buffer overflow exists related to PDF font handling. (CVE-2011-3915)\n\n - A<br />

stack-based buffer overflow exists related to the 'FileWatcher'. (CVE-2011-3917)<br />

Solution: Upgrade to Google Chrome 16.0.912.63 or later.<br />

CVE-2011-3917<br />

Mozilla Firefox 8.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6109 FAMILY: Web Clients RISK: HIGH NESSUS ID:57359<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host has a web browser installed that is vulnerable to<br />

multiple attack vectors.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox 8.0 are potentially affected by the following security issues : \n\n -<br />

An out-of-bounds memory access error exists in the 'SVG' implementation and can be<br />

triggered when 'SVG' elements are removed during a 'DOMAttrModified' event handler.<br />

(CVE-2011-3658)\n\n - Various memory safety errors exist that can lead to memory<br />

corruption and possible code execution. (CVE-2011-3660)\n\n - An error exists in the<br />

'YARR' regular expression library that can cause application crashes when handling certain<br />

JavaScript statements. (CVE-2011-3661)\n\n - It is possible to detect keystrokes using<br />

'SVG' animation 'accesskey' events even when JavaScript is disabled.<br />

(CVE-2011-3663)\n\n - AN error exists related to plugins that can allow a null pointer to be<br />

dereferenced when a plugin deletes its containing DOM frame during a call from that<br />

frame. It may be possible for a non-null pointer to be dereferenced thereby opening up the<br />

potential for further exploitation. (CVE-2011-3664)\n\n - It is possible to crash the<br />

application when 'OGG' 'video' elements are scaled to extreme sizes. (CVE-2011-3665)<br />

Solution: Upgrade to Firefox 9.0 or later.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1668


CVE-2011-3665<br />

Mozilla Thunderbird 8 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6110 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:57361<br />

Description: Synopsis :\n\nThe remote host has a email client installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host has a email client installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Thunderbird is : \n %L<br />

\n\nVersions of Thunderbird 8.0 are potentially affected by the following security issues :<br />

\n\n - An out-of-bounds memory access error exists in the 'SVG' implementation and can be<br />

triggered when 'SVG' elements are removed during a 'DOMAttrModified' event handler.<br />

(CVE-2011-3658)\n\n - Various memory safety errors exist that can lead to memory<br />

corruption and possible code execution. (CVE-2011-3660)\n\n - An error exists in the<br />

'YARR' regular expression library that can cause application crashes when handling certain<br />

JavaScript statements. (CVE-2011-3661)\n\n - It is possible to detect keystrokes using<br />

'SVG' animation 'accesskey' events even when JavaScript is disabled.<br />

(CVE-2011-3663)\n\n - AN error exists related to plugins that can allow a null pointer to be<br />

dereferenced when a plugin deletes its containing DOM frame during a call from that<br />

frame. It may be possible for a non-null pointer to be dereferenced thereby opening up the<br />

potential for further exploitation. (CVE-2011-3664)\n\n - It is possible to crash the<br />

application when 'OGG' 'video' elements are scaled to extreme sizes. (CVE-2011-3665)<br />

Solution: Upgrade to Thunderbird 9.0 or later.<br />

Windows OS detection<br />

CVE-2011-3665<br />

<strong>PVS</strong> ID: 6111 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a windows device version: %L<br />

Solution: N/A<br />

CVE Not available<br />

Shavlik Software Management Detection<br />

<strong>PVS</strong> ID: 6112 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Shavlik software management package. This tool is used to<br />

track and monitor software being utilized on the client system.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

HP Managed Printing Administration < 2.6.4 Multiple Vulnerabilities<br />

Family Internet Services 1669


<strong>PVS</strong> ID: 6113 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server is hosting an application that is vulnerable to multiple<br />

attack vectors.\n\nThe remote web server is hosting HP Managed Printing Administration,<br />

a printer management application. For your information, the observed version of HP<br />

Managed Printing Administration is :\n %L \n\nVersions of HP Managed Printing<br />

Administration earlier than 2.6.4 are potentially affected by multiple vulnerabilities :\n\n<br />

Null injection and directory traversal can be used in the form data passed to<br />

MPAUploader.Uploader.1.UploadFiles() to remotely create arbitrary files.<br />

(CVE-2011-4166)\n\n - An extended length string can be passed into scripts within the<br />

management website and ultimately to MPAUploader.dll which could be exploited to<br />

execute arbitrary code. (CVE-2011-4167)\n\n - Null injection and directory traversal can be<br />

used in the form data passed to \Inetpub\wwwroot\hpmpa\jobDelivery\Default.asp to<br />

remote create arbitrary files. (CVE-2011-4168)<br />

Solution: Upgrade to HP Managed Printing Administration 2.6.4 or later.<br />

CVE-2011-4169<br />

Kindle Mobile Device Detection<br />

<strong>PVS</strong> ID: 6114 FAMILY: Mobile Devices RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running an Amazon Kindle reader/tablet.<br />

Solution: N/A<br />

CVE Not available<br />

Windows OS Version Information<br />

<strong>PVS</strong> ID: 6115 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Microsoft Windows version : %L<br />

Solution: N/A<br />

CVE Not available<br />

Windows OS Version Information<br />

<strong>PVS</strong> ID: 6116 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Microsoft Windows version : %L<br />

Solution: N/A<br />

CVE Not available<br />

Windows OS Version Information<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1670


<strong>PVS</strong> ID: 6117 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Microsoft Windows version : %L<br />

Solution: N/A<br />

CVE Not available<br />

Windows OS Version Information<br />

<strong>PVS</strong> ID: 6118 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Microsoft Windows version : %L<br />

Solution: N/A<br />

CVE Not available<br />

Windows OS Version Information<br />

<strong>PVS</strong> ID: 6119 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Microsoft Windows version : %L<br />

Solution: N/A<br />

CVE Not available<br />

Windows OS Version Information<br />

<strong>PVS</strong> ID: 6120 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Microsoft Windows version : %L<br />

Solution: N/A<br />

CVE Not available<br />

Windows OS Version Information<br />

<strong>PVS</strong> ID: 6121 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Microsoft Windows version : %L<br />

Solution: N/A<br />

CVE Not available<br />

Windows OS Version Information<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6122 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1671


Description: The remote host is running Microsoft Windows version : %L<br />

Solution: N/A<br />

CVE Not available<br />

Windows OS Version Information<br />

<strong>PVS</strong> ID: 6123 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Microsoft Windows version : %L<br />

Solution: N/A<br />

BingToolbar Installed<br />

CVE Not available<br />

<strong>PVS</strong> ID: 6124 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host has attempted to installed the Bing Toolbar version: %L<br />

Solution: Ensure that this behavior is in aligment with company policy<br />

CVE Not available<br />

Windows OS Version Information<br />

<strong>PVS</strong> ID: 6125 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Microsoft Windows version : %L<br />

Solution: N/A<br />

CVE Not available<br />

Policy - .xxx Domain Access Attempt<br />

<strong>PVS</strong> ID: 6126 FAMILY: Policy RISK: LOW NESSUS ID:Not Available<br />

Description: The remote client was observed attempting to contact an .xxx domain. This may indicate<br />

inappropriate use of network resources.<br />

Solution: Ensure that such usage is in alignment with corporate policies and guidelines regarding<br />

remote access.<br />

CVE Not available<br />

Windows OS Version Information<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6127 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1672


Description: The remote host is running Microsoft Windows version: %L<br />

Solution: N/A<br />

Spotify Installed<br />

CVE Not available<br />

<strong>PVS</strong> ID: 6128 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host has attempted to installed the Spotify music application.<br />

Solution: N/A<br />

CVE Not available<br />

OpenSSL 0.9.8 < 0.9.8s / 1.x < 1.0.0f Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6129 FAMILY: Web Servers RISK: HIGH NESSUS ID:57460<br />

Description: Synopsis :\n\nThe remote web server is affected by multiple vulnerabilities.\n\nFor your<br />

information, the observed version of OpenSSL is : \n %L \n\nVersions of OpenSSL 0.9.8<br />

earlier than 0.9.8s, and 1.0.0 earlier than 1.0.0f are potentially affected by the following<br />

vulnerabilities :\n\n - An extension of the Vaudenay padding oracle attack exists against<br />

CBC mode encryption which enables an efficient plaintext recovery attack against the<br />

OpenSSL implementation of DTLS. (CVE-2011-4108)\n\n - If<br />

x509_V_FLAG_POLICY_CHECK is set in OpenSSL 0.9.8, then a policy check failure can<br />

lead to a double-free. (CVE-2011-4109)\n\n - OpenSSL fails to clear the bytes used as<br />

block cipher padding in SSL 3.0 records. As a result, in each record, up to 15 bytes of<br />

uninitialized memory may be sent, encrypted, to the SSL peer. (CVE-2011-4576)\n\n -<br />

RFC 3779 data can be included in certificates, and if it is malformed, may trigger an<br />

assertion failure. This could be used in a denial-of-service attack. (CVE-2011-4577)\n\n -<br />

Support for handshake restarts for server gated cryptography (SGC) can be used in a<br />

denial-of-service attack. (CVE-2011-4619)\n\n - A malicious TLS client can send an<br />

invalid set of GOST parameters which will cause the server to crash due to a lack of error<br />

checking. (CVE-2012-0027)<br />

Solution: Upgrade to OpenSSL 0.9.8s, 1.0.0f, or later.<br />

CVE-2012-0027<br />

Successful Shell Attack Detected - Linux Failed 'cd' Command<br />

<strong>PVS</strong> ID: 6130 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: The results of a failed 'cd' command occurred in a TCP session normally used for a<br />

standard service. This may indicate a successful compromise of this service has occurred.<br />

realtimeonly<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1673


Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Linux Failed 'cp' Command<br />

<strong>PVS</strong> ID: 6131 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: The results of a failed 'cp' command occurred in a TCP session normally used for a<br />

standard service. This may indicate a successful compromise of this service has occurred.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Linux Failed 'su' Command<br />

<strong>PVS</strong> ID: 6132 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A failed 'su' command occurred in a TCP session normally used for a standard service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - FreeBSD Failed 'su' Command<br />

<strong>PVS</strong> ID: 6133 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A failed 'su' command occurred in a TCP session normally used for a standard service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Successful Shell Attack Detected - Unix Failed 'wget' Command<br />

<strong>PVS</strong> ID: 6134 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1674


Description: The results of a failed 'wget' command occurred in a TCP session normally used for a<br />

standard service. This may indicate a successful compromise of this service has occurred.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - IRIX 'id' Command<br />

<strong>PVS</strong> ID: 6135 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'id' command occurred in a TCP session normally used for a standard service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Linux 'id' Command<br />

<strong>PVS</strong> ID: 6136 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'id' command occurred in a TCP session normally used for a standard service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Linux 'ifconfig' Command<br />

<strong>PVS</strong> ID: 6137 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: An 'ifconfig' command occurred in a TCP session normally used for a standard service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Successful Shell Attack Detected - FreeBSD 'ifconfig' Command<br />

Family Internet Services 1675


<strong>PVS</strong> ID: 6138 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: An 'ifconfig' command occurred in a TCP session normally used for a standard service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Unix 'ls -a' Command<br />

<strong>PVS</strong> ID: 6139 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'ls -a' command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Unix 'ls -l' Command<br />

<strong>PVS</strong> ID: 6140 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'ls -l' command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Linux Failed 'ls' Command<br />

<strong>PVS</strong> ID: 6141 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: The results of a failed 'ls' command occurred in a TCP session normally used for a standard<br />

service. This may indicate a successful compromise of this service has occurred.<br />

realtimeonly<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

Family Internet Services 1676


CVE Not available<br />

Successful Shell Attack Detected - Linux 'lsof' command<br />

<strong>PVS</strong> ID: 6142 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A 'lsof' command occurred in a TCP session normally used for a standard service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Linux 'passwd' Command Changed Password<br />

<strong>PVS</strong> ID: 6143 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A 'passwd' command occurred in a TCP session normally used for a standard service. This<br />

indicate that successful compromise of this service has occurred.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Linux 'passwd' Command<br />

<strong>PVS</strong> ID: 6144 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A 'passwd' command occurred in a TCP session normally used for a standard service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Linux 'passwd' Command<br />

<strong>PVS</strong> ID: 6145 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A 'passwd' command occurred in a TCP session normally used for a standard service.<br />

realtimeonly<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1677


Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - IRIX 'passwd' Command<br />

<strong>PVS</strong> ID: 6146 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A 'passwd' command occurred in a TCP session normally used for a standard service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Linux 'netstat' Command<br />

<strong>PVS</strong> ID: 6147 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'netstat' command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Linux 'ping' Command<br />

<strong>PVS</strong> ID: 6148 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful ping command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Successful Shell Attack Detected - Linux 'ps' Command<br />

<strong>PVS</strong> ID: 6149 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1678


Description: A successful 'ps -aux' command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - FreeBSD 'ps -aux' Command<br />

<strong>PVS</strong> ID: 6150 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'ps -aux' command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Linux 'rpcinfo' Command<br />

<strong>PVS</strong> ID: 6151 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: An 'rpcinfo' command occurred in a TCP session normally used for a standard service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Linux 'traceroute' Command<br />

<strong>PVS</strong> ID: 6152 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'traceroute' command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1679


Successful Shell Attack Detected - Linux 'w' Command<br />

<strong>PVS</strong> ID: 6153 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'w' command occurred in a TCP session normally used for a standard service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - IRIX 'w' Command<br />

<strong>PVS</strong> ID: 6154 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'w' command occurred in a TCP session normally used for a standard service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - FreeBSD 'w' Command<br />

<strong>PVS</strong> ID: 6155 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'w' command occurred in a TCP session normally used for a standard service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Linux 'rm' Command<br />

<strong>PVS</strong> ID: 6156 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'rm' command occurred in a TCP session normally used for a standard service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1680


Successful Shell Attack Detected - Unix Failed 'tcpdump' Command<br />

<strong>PVS</strong> ID: 6157 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A failed 'tcpdump' command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Unix Failed 'which' Command<br />

<strong>PVS</strong> ID: 6158 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A failed 'which' command occurred in a TCP session normally used for a standard service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Unix Failed 'which' Command<br />

<strong>PVS</strong> ID: 6159 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A failed 'which' command occurred in a TCP session normally used for a standard service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Unix SSH Initial Connetion Detection<br />

<strong>PVS</strong> ID: 6160 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: An SSH session was observed which may be an initial connection which may also be<br />

present in a command line shell of a successful buffer overflow.<br />

realtimeonly<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

Family Internet Services 1681


CVE Not available<br />

Successful Shell Attack Detected - Unix Failed 'lynx' Command<br />

<strong>PVS</strong> ID: 6161 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A failed 'lynx' command occurred in a TCP session normally used for a standard service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Unix 'wget' File Download<br />

<strong>PVS</strong> ID: 6162 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: The results of a 'wget' command used to download a file occurred in a TCP session<br />

normally used for a standard service. This may indicate a successful compromise of this<br />

service has occurred.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - 'nmap' Tool<br />

<strong>PVS</strong> ID: 6163 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: The results of an 'nmap' session were observed in a TCP session normally used for a<br />

standard service. This may indicate a successful compromise of this service has occurred.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Successful Shell Attack Detected - Linux 'netstat -rn' Command<br />

<strong>PVS</strong> ID: 6164 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1682


Description: A successful 'netstat -rn' command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - FreeBSD 'netstat -rn' Command<br />

<strong>PVS</strong> ID: 6165 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'netstat -rn' command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - FreeBSD 'netstat' Command<br />

<strong>PVS</strong> ID: 6166 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'netstat' command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Linux 'nslookup' Command<br />

<strong>PVS</strong> ID: 6167 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'nslookup' command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

Family Internet Services 1683


CVE Not available<br />

Successful Shell Attack Detected - Unix 'hping2' Tool<br />

<strong>PVS</strong> ID: 6168 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'hping2' command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Unix 'hping2' Tool<br />

<strong>PVS</strong> ID: 6169 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'hping2' command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Unix 'hping2' Tool (Listen Mode)<br />

<strong>PVS</strong> ID: 6170 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'hping2' command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Successful Shell Attack Detected - Unix 'date' Command<br />

<strong>PVS</strong> ID: 6171 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'date' command occurred in a TCP session normally used for a standard<br />

service.<br />

Family Internet Services 1684


ealtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Unix 'route' Command<br />

<strong>PVS</strong> ID: 6172 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'route' command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Unix 'snort' Tool<br />

<strong>PVS</strong> ID: 6173 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'snort' command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Unix 'ngrep' Command<br />

<strong>PVS</strong> ID: 6174 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'ngrep' command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Successful Shell Attack Detected - Unix 'tethereal' Tool<br />

Family Internet Services 1685


<strong>PVS</strong> ID: 6175 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'tethereal' command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Unix 'history' Command<br />

<strong>PVS</strong> ID: 6176 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'history' command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Windows 'copy' Command<br />

<strong>PVS</strong> ID: 6177 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: The results of the Windows copy command occurred in a TCP session normally used for a<br />

standard service. This may indicate a successful compromise of this service has occurred.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Windows Failed 'cd' Command<br />

<strong>PVS</strong> ID: 6178 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: The results of an unsuccessful attempt to change drives on a Windows machine occurred in<br />

a TCP session normally used for a standard service. This may indicate a successful<br />

compromise of this service has occurred.<br />

realtimeonly<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1686


Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Windows Unknown Shell Command<br />

<strong>PVS</strong> ID: 6179 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: The results of an attempt to execute an unknown Windows command occurred in a TCP<br />

session normally used for a standard service. This may indicate a successful compromise of<br />

this service has occurred.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Windows 'dir' Command Execution<br />

<strong>PVS</strong> ID: 6180 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: The results of a Windows directory listing command occurred in a TCP session normally<br />

used for a standard service. This may indicate a successful compromise of this service has<br />

occurred.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Windows 'netstat' Command<br />

<strong>PVS</strong> ID: 6181 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'netstat' command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Successful Shell Attack Detected - Windows 'net view' Command<br />

Family Internet Services 1687


<strong>PVS</strong> ID: 6182 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'net view' command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Windows 'net share' Command<br />

<strong>PVS</strong> ID: 6183 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'net view' command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - 'nslookup' Command<br />

<strong>PVS</strong> ID: 6184 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'nslookup' command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Windows 'tftp' Command<br />

<strong>PVS</strong> ID: 6185 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'tftp' command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

Family Internet Services 1688


performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Windows 'nbtstat' Command<br />

<strong>PVS</strong> ID: 6186 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'nbtstat' command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Windows 'net user' Command<br />

<strong>PVS</strong> ID: 6187 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'net user' command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Windows 'date' Command<br />

<strong>PVS</strong> ID: 6188 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'date' command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Successful Shell Attack Detected - Windows 'time' Command<br />

<strong>PVS</strong> ID: 6189 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1689


Description: A successful 'time' command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Windows 'Fport' Command<br />

<strong>PVS</strong> ID: 6190 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'Fport' command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Windows 'PsList' Command<br />

<strong>PVS</strong> ID: 6191 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'PsList' command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Windows 'arp -a' Command<br />

<strong>PVS</strong> ID: 6192 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'arp -a' command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

Family Internet Services 1690


CVE Not available<br />

Successful Shell Attack Detected - 'ftp' Command<br />

<strong>PVS</strong> ID: 6193 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'ftp' command occurred in a TCP session normally used for a standard service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Windows 'ipconfi' Command<br />

<strong>PVS</strong> ID: 6194 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'ipconfig' command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Windows 'route print' Command<br />

<strong>PVS</strong> ID: 6195 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'route print' command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Windows 'route print' Command<br />

<strong>PVS</strong> ID: 6196 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'route print' command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1691


Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Windows 'ping' Command<br />

<strong>PVS</strong> ID: 6197 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'ping' command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Windows 'net user' Command<br />

<strong>PVS</strong> ID: 6198 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'net user' command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Windows 'tsgrinder.exe' Tool<br />

<strong>PVS</strong> ID: 6199 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'tsgrinder.exe' command occurred in a TCP session normally used for a<br />

standard service. This tool is used to crack hashed passwords.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Successful Shell Attack Detected - Windows 'fscan' Tool<br />

<strong>PVS</strong> ID: 6200 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1692


Description: The results of an 'fscan' (now called Scanline) session were observed in a TCP session<br />

normally used for a standard service. This may indicate a successful compromise of this<br />

service has occurred.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Windows 'net use' Command<br />

<strong>PVS</strong> ID: 6201 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'net use' command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Cisco 'show privilege' Command<br />

<strong>PVS</strong> ID: 6202 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: The results of a Cisco IOS command occurred in a TCP session normally used for a<br />

standard service. This may indicate that a successful compromise of the router or switch<br />

has occurred.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Cisco 'show version' Command<br />

<strong>PVS</strong> ID: 6203 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: The results of a Cisco IOS command occurred in a TCP session normally used for a<br />

standard service. This may indicate that a successful compromise of the router or switch<br />

has occurred.<br />

realtimeonly<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1693


Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Cisco 'show ip bgp' Command<br />

<strong>PVS</strong> ID: 6204 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: The results of Cisco IOS command occurred in a TCP session normally used for a standard<br />

service. This may indicate a successful compromise of this service has occurred.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Cisco 'show version' Command<br />

<strong>PVS</strong> ID: 6205 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: The results of a Cisco IOS command occurred in a TCP session normally used for a<br />

standard service. This may indicate that a successful compromise of the router or switch<br />

has occurred.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Cisco 'show proc' Command<br />

<strong>PVS</strong> ID: 6206 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: The results of a Cisco IOS command occurred in a TCP session normally used for a<br />

standard service. This may indicate that a successful compromise of the router or switch<br />

has occurred.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Successful Shell Attack Detected - Cisco 'show access-list' Command<br />

Family Internet Services 1694


<strong>PVS</strong> ID: 6207 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: The results of a Cisco IOS command occurred in a TCP session normally used for a<br />

standard service. This may indicate that a successful compromise of the router or switch<br />

has occurred.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Cisco 'show mac-address-table' Command<br />

<strong>PVS</strong> ID: 6208 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: The results of a Cisco IOS command occurred in a TCP session normally used for a<br />

standard service. This may indicate that a successful compromise of the router or switch<br />

has occurred.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Cisco 'show running-config' Command<br />

<strong>PVS</strong> ID: 6209 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: The results of a Cisco IOS command occurred in a TCP session normally used for a<br />

standard service. This may indicate that a successful compromise of the router or switch<br />

has occurred.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Successful Shell Attack Detected - Cisco 'show ip interface' Command<br />

<strong>PVS</strong> ID: 6210 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: The results of a Cisco IOS command occurred in a TCP session normally used for a<br />

standard service. This may indicate that a successful compromise of the router or switch<br />

has occurred.<br />

Family Internet Services 1695


ealtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Finger Attack - Successful Finger Query to Multiple Users<br />

<strong>PVS</strong> ID: 6211 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A response from a known finger daemon was observed which indicated that the attacker<br />

was able to retrieve a list of three or more valid user names.<br />

realtimeonly<br />

Solution: Disable the finger service, or restrict access to this service.<br />

CVE Not available<br />

TFTP Attack - /etc/passwd File Obtained via TFTP<br />

<strong>PVS</strong> ID: 6212 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A file which looks like an /etc/passwd file was downloaded from a TFTP server.<br />

realtimeonly<br />

Solution: Disable the TFTP service as it does not provide sufficient authentication.<br />

CVE Not available<br />

TFTP Attack - Cisco Router Config File Obtained via TFTP<br />

<strong>PVS</strong> ID: 6213 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A file which looks like a Cisco router configuration file was downloaded from a TFTP<br />

server.<br />

realtimeonly<br />

Solution: Disable the TFTP service as it does not provide sufficient authentication.<br />

CVE Not available<br />

FTP Attack - Hidden Directory Created<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6214 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1696


Description: An FTP user successfully created a hidden directory. This may potentially be an attempt to<br />

hide unauthorized data on the FTP server.<br />

realtimeonly<br />

Solution: Inspect and repair this vulnerability<br />

CVE Not available<br />

FTP Attack - File Hidden<br />

<strong>PVS</strong> ID: 6215 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: An FTP user successfully renamed a file to a hidden name. This may potentially be an<br />

attempt to hide unauthorized data on the FTP server.<br />

realtimeonly<br />

Solution: Inspect and repair this vulnerability<br />

CVE Not available<br />

FTP Attack - Passive Port Scan<br />

<strong>PVS</strong> ID: 6216 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: An FTP user issued a successful passive port request which enumerated a port less than<br />

1024, and other than 21 or 20. This may indicate that your FTP server is being used for port<br />

scanning by hackers who wish to hide their identity or possibly mail spammers who are<br />

looking for open port 25 devices.<br />

realtimeonly<br />

Solution: Inspect and repair this vulnerability<br />

CVE Not available<br />

FTP Attack - Successful SITE EXEC Command<br />

<strong>PVS</strong> ID: 6217 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: An FTP user issued a successful SITE EXEC command. The SITE EXEC command is<br />

often attempted by remote hackers to run UNIX and Windows commands directly on the<br />

FTP server. This <strong>PVS</strong> rule detects a successful command execution, not an attempt.<br />

realtimeonly<br />

Solution: Disable the FTP service or restrict access to it.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1697


Trojan/Backdoor Detection - BACKDOOR Infector.1.x<br />

<strong>PVS</strong> ID: 6218 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host seems to be running a trojan or 'backdoor' program -- BACKDOOR<br />

Infector.1.x. This is typically an indicator that the machine has been compromised and is<br />

now being remotely controlled<br />

realtimeonly<br />

Solution: As the system appears to be compromised, you should both inspect and manually clean the<br />

remote system.<br />

CVE Not available<br />

Trojan/Backdoor Detection - BACKDOOR SatansBackdoor.2.0.Beta<br />

<strong>PVS</strong> ID: 6219 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host seems to be running a trojan or 'backdoor' program - BACKDOOR<br />

SatansBackdoor.2.0.Beta. This is typically an indicator that the machine has been<br />

compromised and is now being remotely controlled<br />

realtimeonly<br />

Solution: As the system appears to be compromised, you should both inspect and manually clean the<br />

remote system.<br />

CVE Not available<br />

Trojan/Backdoor Detection - GateCrasher<br />

<strong>PVS</strong> ID: 6220 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host seems to be running a trojan or 'backdoor' program - GateCrasher. This is<br />

typically an indicator that the machine has been compromised and is now being remotely<br />

controlled<br />

realtimeonly<br />

Solution: As the system appears to be compromised, you should both inspect and manually clean the<br />

remote system.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Trojan/Backdoor Detection - BACKDOOR Matrix 2.0 Client<br />

<strong>PVS</strong> ID: 6221 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1698


Description: The remote host seems to be running a trojan or 'backdoor' program - BACKDOOR Matrix<br />

2.0 Client connect. This is typically an indicator that the machine has been compromised<br />

and is now being remotely controlled<br />

realtimeonly<br />

Solution: As the system appears to be compromised, you should both inspect and manually clean the<br />

remote system.<br />

CVE Not available<br />

Trojan/Backdoor Detection - win-trin00<br />

<strong>PVS</strong> ID: 6222 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host seems to be running a trojan or 'backdoor' program - win-trin00. This is<br />

typically an indicator that the machine has been compromised and is now being remotely<br />

controlled<br />

realtimeonly<br />

Solution: As the system appears to be compromised, you should both inspect and manually clean the<br />

remote system.<br />

CVE Not available<br />

Trojan/Backdoor Detection - QAZ Worm<br />

<strong>PVS</strong> ID: 6223 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host seems to be running a trojan or 'backdoor' program - QAZ Worm remote<br />

access. This is typically an indicator that the machine has been compromised and is now<br />

being remotely controlled<br />

realtimeonly<br />

Solution: As the system appears to be compromised, you should both inspect and manually clean the<br />

remote system.<br />

CVE Not available<br />

Trojan/Backdoor Detection - Doly 2.0<br />

<strong>PVS</strong> ID: 6224 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host seems to be running a trojan or 'backdoor' program - Doly 2.0. This is<br />

typically an indicator that the machine has been compromised and is now being remotely<br />

controlled<br />

realtimeonly<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1699


Solution: As the system appears to be compromised, you should both inspect and manually clean the<br />

remote system.<br />

CVE Not available<br />

Trojan/Backdoor Detection - netbus<br />

<strong>PVS</strong> ID: 6225 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host seems to be running a trojan or 'backdoor' program - netbus. This is<br />

typically an indicator that the machine has been compromised and is now being remotely<br />

controlled.<br />

realtimeonly<br />

Solution: Manually inspect and repair the infected host<br />

CVE Not available<br />

Trojan/Backdoor Detection - Subseven<br />

<strong>PVS</strong> ID: 6226 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host seems to be running a trojan or 'backdoor' program - BACKDOOR<br />

subseven 22. This is typically an indicator that the machine has been compromised and is<br />

now being remotely controlled.<br />

realtimeonly<br />

Solution: Manually inspect and repair the infected host<br />

CVE Not available<br />

Trojan/Backdoor Detection - RXBOT / RBOT Exploit Report<br />

<strong>PVS</strong> ID: 6227 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote machine is infected with the RXBOT virus/backdoor.<br />

realtime<br />

Solution: Remove the virus using your Corporate standard for anti-virus<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Trojan/Backdoor Detection - RXBOT / RBOT Vulnerability Scan<br />

<strong>PVS</strong> ID: 6228 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1700


Description: The remote machine is infected with the RXBOT virus/backdoor.<br />

realtime<br />

Solution: Remove the virus using your Corporate standard for anti-virus<br />

CVE Not available<br />

Trojan/Backdoor Detection - Windows Command Shell as Service<br />

<strong>PVS</strong> ID: 6229 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: When discovering a Windows command shell running as a service, it almost always<br />

indicates the system has been compromised.<br />

realtime<br />

Solution: Treat this system as compromised<br />

CVE Not available<br />

Windows Command Shell as Service<br />

<strong>PVS</strong> ID: 6230 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: When discovering a Windows command shell running as a service, it almost always<br />

indicates the system has been compromised.<br />

realtime<br />

Solution: Treat this system as compromised<br />

CVE Not available<br />

SMTP Proxy Traffic Detected<br />

<strong>PVS</strong> ID: 6231 FAMILY: Backdoors<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote proxy allows SMTP connections to be tunneled using the HTTP CONNECT<br />

method. If this an open proxy (i.e. it is remotely accessible by those outside the corporate<br />

network), then this feature may be used to send unsolicited bulk email (SPAM).<br />

realtime<br />

Solution: Lock down which port numbers the proxy will tunnel connections to for client CONNECT<br />

requests. Also, ensure that only authorized users are allowed to connect to the proxy.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1701


Trojan/Backdoor Detection - WinEggDrop Infected Host Detection<br />

<strong>PVS</strong> ID: 6232 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote machine is infected with the WinEggDrop virus/backdoor.<br />

realtimeonly<br />

Solution: Remove the virus using your Corporate standard for anti-virus<br />

CVE Not available<br />

TFTP Attack - c:\winnt\repair\sam File Obtained via TFTP<br />

<strong>PVS</strong> ID: 6233 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A file that looks like the Windows SAM file was downloaded from a TFTP server.<br />

realtimeonly<br />

Solution: Disable the TFTP service as it does not provide sufficient authentication.<br />

CVE Not available<br />

Meebo Messenger Detected<br />

<strong>PVS</strong> ID: 6234 FAMILY: Internet Messengers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Meebo Messenger application. This web site allows users<br />

to login with AIM, Yahoo Messenger, or Windows Live instant messenger credentials and<br />

chat via the site instead of the native clients. This site is often used to circumvent corporate<br />

policy that prevents instant messaging software.<br />

Solution: Ensure this web application meets corporate guidelines for employee use.<br />

Evony Game Detected<br />

CVE Not available<br />

<strong>PVS</strong> ID: 6235 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Evony web-based game. Users may create an account via<br />

the site, or authenticate via their Facebook credentials.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Desert Operations Game Detected<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6236 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1702


Description: The remote host is accessing the Desert Operations game by Looki.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Empire Universe 2 Game Detected<br />

<strong>PVS</strong> ID: 6237 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Empire Universe 2 (EU2) game by Looki.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Gilfor's Tale Game Detected<br />

<strong>PVS</strong> ID: 6238 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Gilfor's Tale game by Looki.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

MechRage Game Detected<br />

<strong>PVS</strong> ID: 6239 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the MechRage game by Looki.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Romadoria Game Detected<br />

<strong>PVS</strong> ID: 6240 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Romadoria game by Looki.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Space Pioneers 2 Game Detected<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6241 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1703


Description: The remote host is accessing the Space Pioneers 2 game by Looki.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

eBay Auction Detected<br />

CVE Not available<br />

<strong>PVS</strong> ID: 6242 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing an auction on eBay.<br />

realtime<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Orkut Social Application Detected<br />

<strong>PVS</strong> ID: 6243 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Orkut social application, now owned by Google.<br />

realtime<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

Java version detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 6244 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Java version : %L<br />

Solution: Ensure that you are running the latest version of Java<br />

CVE Not available<br />

Flash Player version detection<br />

<strong>PVS</strong> ID: 6245 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is running Flash Player version : %L<br />

Solution: Ensure that you are running the latest version of Flash Player<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1704


FTP Client Initiated from an SMTP Server<br />

<strong>PVS</strong> ID: 6246 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote SMTP server has just been observed initiating an FTP outbound session and<br />

retrieving a file. This may be an indicator that the system has been compromised and<br />

attackers are now retrieving files to the local server.<br />

realtimeonly<br />

Solution: Disable the SMTP service if it is not required. Additionally, the observed behavior is<br />

indicative of a system compromise.<br />

CVE Not available<br />

Distributed <strong>Network</strong> Protocol v3 'Disable Unsolicited' Alert (SCADA)<br />

<strong>PVS</strong> ID: 6247 FAMILY: SCADA<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: SCADA Alert - Distributed <strong>Network</strong> Protocol v3 'Disable Unsolicited' alert. The remote<br />

host is running the Distributed <strong>Network</strong> Protocol version 3. This protocol is common on<br />

SCADA networks. <strong>PVS</strong> has just detected a client sending the server a code 15 message.<br />

This message instructs the DNPv3 server to stop sending unsolicited messages.<br />

realtimeonly<br />

Solution: Ensure that the disabling of automated alerts was planned by network administrators.<br />

CVE Not available<br />

Distributed <strong>Network</strong> Protocol v3 'Cold Restart' Alert (SCADA)<br />

<strong>PVS</strong> ID: 6248 FAMILY: SCADA<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: SCADA Alert - Distributed <strong>Network</strong> Protocol v3 'Cold Restart' alert. The remote host is<br />

running the Distributed <strong>Network</strong> Protocol version 3. This protocol is common on SCADA<br />

networks. <strong>PVS</strong> has just detected a client sending the server a code '0D' message. This<br />

message instructs the remote server to do a cold restart. That is, the server will be<br />

unavailable for some time as it restarts and runs all power-up tests.<br />

realtimeonly<br />

Solution: If the PLC server supports it, disable 'Cold Restarts' except from trusted systems.<br />

Otherwise, ensure that SCADA network is only accessible by trusted hosts.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Distributed <strong>Network</strong> Protocol v3 'Unauthorized Read Request' Alert (SCADA)<br />

Family Internet Services 1705


<strong>PVS</strong> ID: 6249 FAMILY: SCADA RISK: LOW NESSUS ID:Not Available<br />

Description: SCADA Alert - Distributed <strong>Network</strong> Protocol v3 'Unauthorized Read Request' alert. The<br />

remote host is running the Distributed <strong>Network</strong> Protocol version 3. This protocol is<br />

common on SCADA networks. <strong>PVS</strong> has just detected a client sending the server a code '01'<br />

message. This message instructs the remote server to divulge potentially sensitive<br />

information. An attacker, exploiting this feature, would be able to gain information useful<br />

for future attacks.<br />

realtimeonly<br />

Solution: Ensure that SCADA network is only accessible by trusted hosts.<br />

CVE Not available<br />

Distributed <strong>Network</strong> Protocol v3 'Stop Application' Alert (SCADA)<br />

<strong>PVS</strong> ID: 6250 FAMILY: SCADA<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: SCADA Alert - Distributed <strong>Network</strong> Protocol v3 'Stop Application' alert. The remote host<br />

is running the Distributed <strong>Network</strong> Protocol version 3. This protocol is common on<br />

SCADA networks. <strong>PVS</strong> has just detected a client sending the server a code '12' message.<br />

This message instructs the remote server to stop the application. An attacker, exploiting this<br />

flaw, would need access to the SCADA network. Successful exploitation would result in<br />

the disabling of a portion (or all) of the SCADA network.<br />

realtimeonly<br />

Solution: Ensure that SCADA network is only accessible by trusted hosts.<br />

CVE Not available<br />

Distributed <strong>Network</strong> Protocol v3 'Warm Restart' Alert (SCADA)<br />

<strong>PVS</strong> ID: 6251 FAMILY: SCADA<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: SCADA Alert - Distributed <strong>Network</strong> Protocol v3 'Warm Restart' alert. The remote host is<br />

running the Distributed <strong>Network</strong> Protocol version 3. This protocol is common on SCADA<br />

networks. <strong>PVS</strong> has just detected a client sending the server a code '0E' message. This<br />

message instructs the remote server to perform a warm reboot. That is, the server will be<br />

unavailable for some time as it restarts.<br />

realtimeonly<br />

Solution: Ensure that SCADA network is only accessible by trusted hosts.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1706


Distributed <strong>Network</strong> Protocol v3 'Broadcast Request' Alert (SCADA)<br />

<strong>PVS</strong> ID: 6252 FAMILY: SCADA<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: SCADA Alert - Distributed <strong>Network</strong> Protocol v3 'Broadcast request'. The remote host is<br />

running the Distributed <strong>Network</strong> Protocol version 3. This protocol is common on SCADA<br />

networks. <strong>PVS</strong> has just detected broadcast traffic on the SCADA network. Broadcast is<br />

enabled, by default, on many DNPv3 devices. Given this, an attacker can attack many<br />

servers simultaneously. This can also be used by an unauthorized attacker to cause a Denial<br />

of Service (DoS) on the remote network.<br />

realtimeonly<br />

Solution: Ensure that SCADA network is only accessible by trusted hosts.<br />

CVE Not available<br />

ICCP Invalid Destination Address (SCADA)<br />

<strong>PVS</strong> ID: 6253 FAMILY: SCADA RISK: LOW NESSUS ID:Not Available<br />

Description: The remote ICCP server has just been connected to by an ICCP client with an invalid<br />

destination TSAP address.<br />

realtimeonly<br />

Solution: Solution Not Available<br />

CVE Not available<br />

ICCP Invalid Client Disconnect (SCADA)<br />

<strong>PVS</strong> ID: 6254 FAMILY: SCADA RISK: LOW NESSUS ID:Not Available<br />

Description: The remote ICCP server has just disconnected an ICCP client due to a protocol<br />

error. Receiving a number of these alerts might be an indicator of an ongoing<br />

attack, a saturated SCADA network, or a misconfigured client/server architecture.<br />

realtimeonly<br />

Solution: Solution Not Available<br />

CVE Not available<br />

ICCP Invalid OSI-SSEL (SCADA)<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6255 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1707


Description: The remote ICCP server has just sent a 'Session Refuse PDU' message in response to an<br />

invalid OSI Layer Selector (SSEL) value. As SSEL values are typically only 2 to 4 bytes<br />

long, this could indicate that a client is 'brute-forcing' a valid SSEL value. This sort of<br />

attack can also impact Availability to the server.<br />

realtimeonly<br />

Solution: Solution Not Available<br />

CVE Not available<br />

ICCP Invalid OSI-PSEL (SCADA)<br />

<strong>PVS</strong> ID: 6256 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote ICCP server has just sent an ACSE Abort Message in response to an invalid<br />

Presentation Layer Selector (PSEL) value. As PSEL values are typically only 2 to 4 bytes<br />

long, this could indicate that a client is 'brute-forcing' a valid PSEL value. This sort of<br />

attack can also impact Availability to the server.<br />

realtimeonly<br />

Solution: Solution Not Available<br />

CVE Not available<br />

MODBUS Client 'Force Listen Only Mode' Request (SCADA)<br />

<strong>PVS</strong> ID: 6257 FAMILY: SCADA RISK: LOW NESSUS ID:Not Available<br />

Description: The remote client is running the MODBUS protocol. This protocol is common on SCADA<br />

or process control networks. <strong>PVS</strong> has just observed a Modbus TCP 'force listen only mode'<br />

request. An attacker can use this functionality to repeatedly disable the remote server from<br />

responding.<br />

realtimeonly<br />

Solution: You should ensure that this sort of network traffic is restricted to protected networks only.<br />

Further, you should ensure that only valid clients are allowed to send commands to the<br />

server.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

MODBUS Client 'Restart Communications' Request (SCADA)<br />

<strong>PVS</strong> ID: 6258 FAMILY: SCADA RISK: LOW NESSUS ID:Not Available<br />

Description: The remote client is running the MODBUS protocol. This protocol is common on SCADA<br />

or process control networks. <strong>PVS</strong> has just observed a Modbus 'Restart Communications'<br />

request. This sort of request can be used by a malicious client to force the PLC server to<br />

continuously power cycle. This can deny services to valid devices.<br />

Family Internet Services 1708


ealtimeonly<br />

Solution: Solution Not Available<br />

CVE Not available<br />

MODBUS Client 'Clear Counters and Diagnostic Registers' Request (SCADA)<br />

<strong>PVS</strong> ID: 6259 FAMILY: SCADA RISK: LOW NESSUS ID:Not Available<br />

Description: The remote client is running the MODBUS protocol. This protocol is common on SCADA<br />

or process control networks. <strong>PVS</strong> has just observed a Modbus 'Clear Counters and<br />

Diagnostic Registers' request. This sort of request, if fulfilled, allows remote attacks to<br />

clear audit data which the server may use to track unauthorized traffic.<br />

realtimeonly<br />

Solution: Solution Not Available<br />

CVE Not available<br />

MODBUS Client 'Read Device Identification' Request (SCADA)<br />

<strong>PVS</strong> ID: 6260 FAMILY: SCADA RISK: LOW NESSUS ID:Not Available<br />

Description: The remote client is running the MODBUS protocol. This protocol is common on SCADA<br />

or process control networks. <strong>PVS</strong> has just observed a Modbus 'Read Device Identification'<br />

request. This request can be used to query a server for vendor information, product version<br />

number, and other informational items which would enable an attacker to perform future<br />

attacks.<br />

realtimeonly<br />

Solution: Solution Not Available<br />

CVE Not available<br />

MODBUS Client 'Report Server Information' Request (SCADA)<br />

<strong>PVS</strong> ID: 6261 FAMILY: SCADA RISK: LOW NESSUS ID:Not Available<br />

Description: The remote client is running the MODBUS protocol. This protocol is common on SCADA<br />

or process control networks. <strong>PVS</strong> has just observed a Modbus 'Report Server Information'<br />

request. This request can be used to query a server for configuration information. This sort<br />

of information would enable an attacker to perform future attacks.<br />

realtimeonly<br />

Solution: Solution Not Available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1709


CVE Not available<br />

Google Chrome < 16.0.912.75 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6262 FAMILY: Web Clients RISK: HIGH NESSUS ID:57468<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Google Chrome is :\n %L<br />

\n\nVersions of Google Chrome earlier than 16.0.912.75 are potentially affected by<br />

multiple vulnerabilities :\n\n - A heap-based buffer overflow exists in libxml.<br />

(CVE-2011-3919)\n\n - A use-after-free error exists related to animation frames.<br />

(CVE-2011-3921)\n\n - A stack-based-buffer overflow exists related to glyph processing.<br />

(CVE-2011-3922)<br />

Solution: Upgrade to Google Chrome 16.0.912.75 or later.<br />

CVE-2011-3922<br />

PHP < 5.3.9 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6263 FAMILY: Web Servers RISK: HIGH NESSUS ID:57537<br />

Description: Synopsis :\n\nThe remote web server uses a version of PHP that is affected by multiple<br />

vulnerabilities.\n\nFor your information, the version of PHP installed on the remote host is<br />

:\n\n %L \nVersions of PHP earlier than 5.3.9 are potentially affected by multiple<br />

vulnerabilities :\n\n - It is possible to create a denial of service condition by sending<br />

multiple, specially crafted requests containing parameter values that cause hash collisions<br />

when computing the hash values for storage in a hash table. (CVE-2011-4885)\n\n - An<br />

integer overflow exists in the exif_process_IFD_TAG function in exif.c that can allow a<br />

remote attacker to read arbitrary memory locations or cause a denial of service condition.<br />

This vulnerability only affects PHP 5.4.0beta2 on 32-bit platforms. (CVE-2011-4566)\n\n -<br />

Calls to libxslt are not restricted via xsltSet<strong>Security</strong>Prefs(), which could allow an attacker<br />

to create or overwrite files, resulting in arbitrary code execution. (CVE-2012-0057)\n\n -<br />

An error exists in the function 'tidy_diagnose' that can allow an attacker to cause the<br />

application to dereference a null pointer. This causes the application to crash.<br />

(CVE-2012-0781)\n\n - The 'PDORow' implementation contains an error that can cause<br />

application crashes when interacting with the session feature. C(VE-2012-0788)\n\n - An<br />

error exists in the timezone handling such that repeated calls to the function 'strtotime' can<br />

allow a denial of service attack via memory consuption. (CVE-2012-0789)<br />

Solution: Upgrade to PHP version 5.3.9 or later.<br />

CVE-2012-0789<br />

MySQL Server 5.1 < 5.1.61 / 5.5 < 5.5.20 Multiple Unspecified Vulnerabilities<br />

<strong>PVS</strong> ID: 6264 FAMILY: Database<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:57606<br />

Family Internet Services 1710


Description: Synopsis :\n\nThe remote database server is vulnerable to multiple attack vectors.\n\nFor<br />

your information, the observed version of MySQL Community Server is : \n %L<br />

\n\nVersions of MySQL Community Server 5.1 earlier than 5.1.61 and 5.5 earlier than<br />

5.5.20 are potentially affected by multiple unspecified vulnerabilities.<br />

Solution: Upgrade to MySQL Community Server 5.5.20 or later.<br />

CVE-2012-0496<br />

Schweitzer Engineering Laboratories (SEL) Telnet Account Detection (SCADA)<br />

<strong>PVS</strong> ID: 6265 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is connecting to a SCHWEITZER ENGINEERING LABORATORIES<br />

(SEL) management server on the telnet port for level 1 access with the following<br />

credentials : %L<br />

realtimeonly<br />

Solution: Ensure that use of the telnet protocol is acceptable within company policy.<br />

CVE Not available<br />

Schweitzer Engineering Laboratories (SEL) Management Server Detection (SCADA)<br />

<strong>PVS</strong> ID: 6266 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is a SCHWEITZER ENGINEERING LABORATORIES (SEL)<br />

management server.<br />

Solution: N/A<br />

CVE Not available<br />

Schweitzer Engineering Laboratories (SEL) Default telnet Account Detection (SCADA)<br />

<strong>PVS</strong> ID: 6267 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote system is a SCHWEITZER ENGINEERING LABORATORIES (SEL) client.<br />

realtime<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Schweitzer Engineering Laboratories (SEL) Default telnet Account/Password Detection (SCADA)<br />

<strong>PVS</strong> ID: 6268 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1711


Description: The remote client just logged into a SCHWEITZER ENGINEERING LABORATORIES<br />

(SEL) server (level 2 access) using the default password of TAIL.<br />

Solution: Change all default passwords upon software/server installation.<br />

CVE Not available<br />

Schweitzer Engineering Laboratories (SEL) Default telnet Account Detection (SCADA)<br />

<strong>PVS</strong> ID: 6269 FAMILY: SCADA RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote server is a SCHWEITZER ENGINEERING LABORATORIES (SEL)<br />

management server and is configured with the default level 2 Password of TAIL<br />

Solution: Change default credentials on this machine<br />

CVE Not available<br />

GE D20 TFTP Client Access Detection (SCADA)<br />

<strong>PVS</strong> ID: 6270 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote system is a GE D20 tftp client.<br />

Solution: N/A<br />

CVE Not available<br />

GE D20 TFTP Client Access Detection (SCADA)<br />

<strong>PVS</strong> ID: 6271 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote system is a GE D20 tftp client. The client has requested the file : %L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

GE D20 Server TFTP File Transfer Detection (SCADA)<br />

<strong>PVS</strong> ID: 6272 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is a GE D20 SCADA device. This device allows TFTP access.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1712


GE D20 Server TFTP File Transfer Detection (SCADA)<br />

<strong>PVS</strong> ID: 6273 FAMILY: SCADA<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote server is a GE D20 SCADA device. This device allows TFTP access. Files<br />

available on the TFTP server may contain confidential data such as configuration or userID<br />

information.<br />

Solution: Block access to the tftp service except from trusted machines or networks.<br />

CVE Not available<br />

Modicon FTP Client Detection (SCADA)<br />

<strong>PVS</strong> ID: 6274 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is connecting to a Modicon SCADA device with the default user account<br />

of qbf77101.<br />

Solution: N/A<br />

CVE Not available<br />

Modicon FTP Server Detection (SCADA)<br />

<strong>PVS</strong> ID: 6275 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Modicon SCADA device offering FTP service.<br />

Solution: N/A<br />

CVE Not available<br />

Modicon FTP Default Account/Password Usage (SCADA)<br />

<strong>PVS</strong> ID: 6276 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is connecting to a Modicon SCADA device with the default user account<br />

of qbf77101 and the default password of hexakisoctahedron.<br />

Solution: Change all default passwords upon server/software installation.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Modicon FTP Default Account/Password Usage (SCADA)<br />

<strong>PVS</strong> ID: 6277 FAMILY: SCADA RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1713


Description: The remote Modicon SCADA device is configured with the default user account of<br />

qbf77101 and the default password of hexakisoctahedron. These credentials were observed<br />

on the FTP port.<br />

Solution: Change all default passwords upon server/software installation.<br />

CVE Not available<br />

Modicon telnet Default Account Detection (SCADA)<br />

<strong>PVS</strong> ID: 6278 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is connecting to a Modicon SCADA server with the default account<br />

name of ntpupdate.<br />

Solution: N/A<br />

CVE Not available<br />

Modicon telnet Default Account/Password Detection (SCADA)<br />

<strong>PVS</strong> ID: 6279 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is connecting to a Modicon SCADA server with the default userID of<br />

ntpupdate and password of fZ*imnw}l<br />

Solution: N/A<br />

CVE Not available<br />

Modicon telnet Default Account/Password Detection (SCADA)<br />

<strong>PVS</strong> ID: 6280 FAMILY: SCADA RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote Modicon SCADA server is configured with the default userID of ntpupdate and<br />

password of fZ*imnw}l<br />

Solution: Change default credentials on this device.<br />

CVE Not available<br />

GE PLC telnet Server Detection (SCADA)<br />

<strong>PVS</strong> ID: 6281 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a GE PLC telnet server used to control and monitor substations.<br />

Solution: Restrict access to the server to authorized personnel only.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1714


GE PLC telnet Server Default Account/Password (SCADA)<br />

<strong>PVS</strong> ID: 6282 FAMILY: SCADA RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host is a GE PLC server which is used to monitor and control substations. The<br />

server is configured with the default or easily-guessed credentials.<br />

Solution: N/A<br />

CVE Not available<br />

GE PLC telnet Server Default Account/Password (SCADA)<br />

<strong>PVS</strong> ID: 6283 FAMILY: SCADA RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host is a GE PLC server that is used to monitor and control substations. The<br />

server is configured with the default or easily-guessed credentials.<br />

Solution: Disable any unnecessary accounts and/or change the default credentials.<br />

CVE Not available<br />

Rockwell Automation PLC HTTP Server Detection (SCADA)<br />

<strong>PVS</strong> ID: 6284 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Rockwell Automation PLC HTTP server which is used to control and<br />

monitor various applications such as SCADA, printing, packaging or pharmaceutical<br />

systems.<br />

Solution: Restrict access to the server to authorized personnel only.<br />

CVE Not available<br />

Rockwell Automation PLC HTTP Server Administrator Access Detection (SCADA)<br />

<strong>PVS</strong> ID: 6285 FAMILY: SCADA<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host has attempted and succeeded in logging into a Rockwell Automation PLC<br />

HTTP server as an administrator with the following ID : %P<br />

Solution: Ensure that the host is a valid host and has the correct authorization to log into the system<br />

as an administrator.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Rockwell Automation PLC - Micrologix Controller Version Detection (SCADA)<br />

<strong>PVS</strong> ID: 6286 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1715


Description: The remote host has been identified as a Micrologix PLC controller as the following<br />

version: %L<br />

Solution: N/A<br />

CVE Not available<br />

Modicon PLC HTTP Default Account/Password Detection (SCADA)<br />

<strong>PVS</strong> ID: 6287 FAMILY: SCADA RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote Modicon PLC HTTP SCADA server is configured with the default account of<br />

USER and password of USER.<br />

Solution: Change the default credentials on this remote server.<br />

CVE Not available<br />

OpenSSL 0.9.8s / 1.0.0f DTLS Denial of Service<br />

<strong>PVS</strong> ID: 6288 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:57712<br />

Description: Synopsis :\n\nThe remote web server is affected by multiple vulnerabilities.\n\nFor your<br />

information, the observed version of OpenSSL is : \n %L \n\nOpenSSL version 0.9.8s and<br />

1.0.0f are potentially affected by a flaw in the implementation of the fix for<br />

CVE-2011-4108. The Datagram Transport Layer <strong>Security</strong> (DTLS) implementation is<br />

vulnerable to a denial of service attack.<br />

Solution: Upgrade to OpenSSL 0.9.8t, 1.0.0g, or later.<br />

CVE-2012-0050<br />

Polycom Audio/Video Server Detection<br />

<strong>PVS</strong> ID: 6289 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis:\n\nThe remote server is used as an audio/video device.\n\nThe remote host is a<br />

Polycom Audio/Video server. The exact product name is : %L<br />

Solution: Ensure that this service is authorized for your network.<br />

CVE Not available<br />

DCS Video Server Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6290 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1716


Description: Synopsis:\n\nThe remote server is used as an audio/video device.\n\nThe remote host is a<br />

DCS video server. The exact product name is : %L<br />

Solution: Ensure that this service is authorized for your network<br />

SIP Server Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 6291 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis:\n\nThe remote server is used as an audio/video device.\n\nThe remote host is<br />

using the Session Initiation Protocol (SIP) which is a communication protocol for video and<br />

voice calls over the Internet.<br />

Solution: Ensure that this service is authorized for your network<br />

CVE Not available<br />

Netwave Video Server Detection<br />

<strong>PVS</strong> ID: 6292 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis:\n\nThe remote server is used as an audio/video device.\n\nThe remote host is a<br />

Netwave video server. The exact product name is : %L<br />

Solution: Ensure that this service is authorized for your network<br />

CVE Not available<br />

Schweitzer Engineering Laboratories (SEL) Management Server Detection Default Level 1<br />

Credentials (SCADA)<br />

<strong>PVS</strong> ID: 6293 FAMILY: SCADA<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote SCADA device is configured with default credentials\n\nThe<br />

remote server is a SCHWEITZER ENGINEERING LABORATORIES (SEL) management<br />

server. The server is configured with the default password of 'OTTER' for level 1 access.<br />

Solution: Change default passwords<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Google Chrome < 16.0.912.77 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6294 FAMILY: Web Clients RISK: HIGH NESSUS ID:57666<br />

Family Internet Services 1717


Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Google Chrome is :\n %L<br />

\n\nVersions of Google Chrome earlier than 16.0.912.77 are potentially affected by<br />

multiple vulnerabilities :\n\n - Use-after-free errors exist related to DOM selections, DOM<br />

handling, and Safe Browsing functionality. (CVE-2011-3924, CVE-2011-3925,<br />

CVE-2011-3928)\n\n - A heap-based buffer overflow exists in the 'tree builder'.<br />

(CVE-2011-3926)\n\n - An error exists related to an uninitialized value in 'Skia'.<br />

(CVE-2011-3927)<br />

Solution: Upgrade to Google Chrome 16.0.912.77 or later.<br />

CVE-2011-3928<br />

Opera < 11.61 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6295 FAMILY: Web Clients RISK: HIGH NESSUS ID:57751<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running the Opera web browser. For your<br />

information, the observed version of Opera is : \n %L \n\nVersions of Opera earlier than<br />

11.61 are potentially affected by multiple vulnerabilities :\n\n - It is possible to manipulate<br />

framed content in a way that allows cross-site scripting. (Issue 1007)\n\n - Script events can<br />

be used to reveal the presence of local files. (Issue 1008)<br />

Solution: Upgrade to Opera 11.61 or later.<br />

CVE Not available<br />

CentOS Version Detection<br />

<strong>PVS</strong> ID: 6296 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running CentOS version: %L.<br />

Solution: Ensure that host is up to date on security updates and in accordance to company policy.<br />

CVE Not available<br />

Android 2.3 < 2.3.6 Information Disclosure<br />

<strong>PVS</strong> ID: 6297 FAMILY: Mobile Devices<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is affected by an information disclosure<br />

vulnerability.\n\nFor your information, the observed version of Android OS installed on the<br />

remote device is : \n %L \n\nVersions of Android OS earlier than 2.3.6 are potentially<br />

affected by an information disclosure vulnerability. The bluetooth stack used by Android<br />

2.3 allows a physically proximate attacker to obtain contact information from a target<br />

device via AT phonebook transfer.<br />

Family Internet Services 1718


Solution: Upgrade to Android 2.3.6 or later.<br />

CVE-2011-4276<br />

PCAnywhere Detection<br />

<strong>PVS</strong> ID: 6298 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running PCAnywhere, an application that allows remote users to<br />

connect to a Windows desktop and work remotely.<br />

Solution: Ensure that you are running the latest version of PCAnywhere.<br />

CVE Not available<br />

Samba 3.6.x < 3.6.3 Denial of Service<br />

<strong>PVS</strong> ID: 6299 FAMILY: Samba<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:57752<br />

Description: Synopsis :\n\nThe remote Samba server is affected by a denial of service<br />

vulnerability.\n\nFor your information, the observed version of Samba is :\n %L<br />

\n\nAccording to its banner, the version of Samba 3.6.x running on the remote host is<br />

earlier than 3.6.3. Errors exist in the files 'source3/lib/substitute.c' and<br />

'source3/smbd/server.c' that leak small amounts of memory when processing every<br />

connection attempt.\n\nAn attacker can continually make connections to the server and<br />

cause a denial of service attack against the affected smbd service.<br />

Solution: Either apply one of the patches referenced in the project's advisory or upgrade to 3.6.3 or<br />

later.<br />

CVE-2012-0817<br />

OpenSSH < 5.7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6300 FAMILY: SSH<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:44081<br />

Description: Synopsis :\n\nThe remote SSH service may be affected by multiple vulnerabilities.\n\nFor<br />

your information, the observed version of OpenSSH installed on the remote host is : \n %L<br />

\n\nVersions of OpenSSH server before 5.7 may be affected by the following<br />

vulnerabilities :\n\n - A security bypass vulnerability because OpenSSH does not properly<br />

validate the public parameters in the J-PAKE protocol. This could allow an attacker to<br />

authenticate without the shared secret. Note that this issue is only exploitable when<br />

OpenSSH is built with J-PAKE support, which is currently experimental and disabled by<br />

default. (CVE-2010-4478)\n\n - The auth_parse options function in auth-options.c in sshd<br />

provides debug messages containing authorized_keys command options, which allows<br />

remote authenticated users to obtain potentially sensitive information by reading these<br />

messages. (CVE-2012-0841)<br />

Solution: Upgrade to OpenSSH version 5.7 or later.<br />

Family Internet Services 1719


CVE-2012-0814<br />

RealWin Management Server Detection (SCADA)<br />

<strong>PVS</strong> ID: 6301 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is running the RealWin Management Server. This software server is<br />

used to manage a wide range of SCADA devices.<br />

Solution: N/A<br />

CVE Not available<br />

Apache 2.2 < 2.2.22 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6302 FAMILY: Web Servers RISK: HIGH NESSUS ID:57791<br />

Description: Synopsis :\n\nThe remote web server is vulnerable to multiple attack vectors.\n\nFor your<br />

information, the observed version of Apache HTTP server is : \n %L \n\nVersions of<br />

Apache 2.2 earlier than 2.2.22 are potentially affected by the following vulnerabilities :\n\n<br />

- When configured as a reverse proxy, improper use of the RewriteRule and<br />

ProxyPasssMatch directives could cause the web server to proxy requests to arbitrary hosts.<br />

This could allow a remote attacker to indirectly send request to intranet servers.<br />

(CVE-2011-3368, CVE-2011-4317)\n\n - A heap-based buffer overflow exists when<br />

mod_setenvif module is enabled and both a maliciously crafted 'SetEnvIf' directive and a<br />

maliciously crafted HTTP request header are used. (CVE-2011-3607)\n\n - A format string<br />

handling error can allow the server to be crashed via maliciously crafted cookies.<br />

(CVE-2012-0021)\n\n - An error exists in 'scoreboard.c' that can allow local attackers to<br />

crash the server during shutdown. (CVE-2012-0031)\n\n - An error exists in 'protocol.c'<br />

that can allow 'HTTPOnly' cookies to be exposed to attackers through the malicious use of<br />

either long or malformed HTTP headers. (CVE-2012-0053)\n\n - An error in the<br />

mod_proxy_ajp module when used to connect to a backend server that takes an overly long<br />

time to respond could lead to a temporary denial of service. (CVE-2012-4557)\nIAVA<br />

Reference : 2012-A-0017\nSTIG Finding Severity : Category I<br />

Solution: Upgrade to Apache version 2.2.22 or later.<br />

CVE-2012-4557<br />

Mac OS X 10.7 < 10.7.3 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6303 FAMILY: Generic RISK: HIGH NESSUS ID:57797<br />

Description: Synopsis :\n\nThe remote host is missing a Mac OS X update that fixes a security<br />

issue.\n\nFor your information, the observed version of Mac OS X is : \n %L \n\nThe<br />

remote host is running a version of Mac OS X 10.7 that is older than version 10.7.3. The<br />

newer version contains numerous security-related fixes for the following components :\n\n<br />

- Address Book\n - Apache\n - ATS\n - CF<strong>Network</strong>\n - CoreMedia\n - CoreText\n -<br />

CoreUI\n - curl\n - Data <strong>Security</strong>\n - dovecot\n - filecmds\n - ImageIO\n - Internet<br />

Sharing\n - Libinfo\n - libresolv\n - libsecurity\n - OpenGL\n - PHP\n - QuickTime\n -<br />

Family Internet Services 1720


Subversion\n - Time Machine\n - WebDAV Sharing\n - Webmail\n - X11\nIAVA<br />

Reference : 2012-A-0020\nIAVA Reference : 2012-A-0085\nIAVB Reference :<br />

2012-B-0006\nSTIG Finding Severity : Category I<br />

Solution: Upgrade to Mac OS X 10.7.3 or later.<br />

CVE-2011-3463<br />

PHP 5.3.9 php_register_variable_ex() Code Execution<br />

<strong>PVS</strong> ID: 6304 FAMILY: Web Servers RISK: HIGH NESSUS ID:58039<br />

Description: Synopsis :\n\nThe remote web server uses a version of PHP that is affected by a code<br />

execution vulnerability.\n\nFor your information, the version of PHP installed on the<br />

remote host is :\n %L \n\nPHP version 5.3.9 is reportedly affected by a code execution<br />

vulnerability. Specifically, the fix for the hash collision denial of service vulnerability<br />

(CVE-2011-4885) itself has introduced a remote code execution vulnerability in the<br />

php_register_variable_ex() in the file php_variables.c. A new configuration variable,<br />

max_input_vars, was added as part of the fix. If the number of input variables exceeds this<br />

value and the variable being processed is an array, code execution can occur.<br />

Solution: Upgrade to PHP version 5.3.10 or later.<br />

CVE-2012-0830<br />

RealWin Management Server HMI Service Detection (SCADA)<br />

<strong>PVS</strong> ID: 6305 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is running the RealWin Management Server. This software server is<br />

used to manage a wide range of SCADA devices. The Server has an HMI service listening<br />

on port 912/tcp. The <strong>PVS</strong> has just observed the following user logging into the Server : %P<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Mozilla Firefox 9.0 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6306 FAMILY: Web Clients RISK: HIGH NESSUS ID:57773<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host has a web browser installed that is vulnerable to<br />

multiple attack vectors.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox 9.0 are potentially affected by the following security issues : \n\n -<br />

A use-after-free error exists related to removed nsDOMAttribute child nodes.<br />

(CVE-2011-3659)\n\n - Various memory safety issues exist. (CVE-2012-0442,<br />

CVE-2012-0443)\n\n - Memory corruption errors exist related to the decoding of Ogg<br />

Vorbis files and processing of malformed XSLT stylesheets. (CVE-2012-0444,<br />

Family Internet Services 1721


CVE-2012-0449)\n\n - The HTML5 frame navigation policy can be violated by allowing<br />

an attacker to replace a sub-frame in another domain's document. (CVE-2012-0445)\n\n -<br />

Scripts in frames are able to bypass security restrictions in XPConnect. This bypass can<br />

allow malicious web sites to carry out cross-site scripting attacks. (CVE-2012-0446)\n\n -<br />

An information disclosure issue exists when uninitialized memory is used as padding when<br />

encoding icon images. (CVE-2012-0447)\n\n - If a user chooses to export their Firefox<br />

Sync key the 'Firefox Recover Key.html' file is saved with incorrect permissions, making<br />

the file contents potentially readable by other users. Note that this issue only affects Firefox<br />

on Linux and Mac OS X systems. (CVE-2012-0450)<br />

Solution: Upgrade to Firefox 10.0 or later.<br />

CVE-2012-0450<br />

Mozilla Firefox 3.6.x < 3.6.26 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6307 FAMILY: Web Clients RISK: HIGH NESSUS ID:57774<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host has a web browser installed that is vulnerable to<br />

multiple attack vectors.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox 3.6.x earlier than 3.6.26 are potentially affected by the following<br />

security issues : \n\n - A use-after-free error exists related to removed nsDOMAttribute<br />

child nodes. (CVE-2011-3659)\n\n - The IPv6 literal syntax in web addresses is not being<br />

properly enforced. (CVE-2011-3670)\n\n - Various memory safety issues exist.<br />

(CVE-2012-0442)\n\n - Memory corruption errors exist related to the decoding of Ogg<br />

Vorbis files and processing of malformed XSLT stylesheets. (CVE-2012-0444,<br />

CVE-2012-0449)<br />

Solution: Upgrade to Firefox 3.6.26 or later.<br />

CVE-2012-0449<br />

Mozilla Thunderbird 9.0 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6308 FAMILY: Web Clients RISK: HIGH NESSUS ID:57775<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host has a web browser installed that is vulnerable to<br />

multiple attack vectors.\n\nFor your information, the observed version of Thunderbird is :<br />

\n %L \n\nVersions of Thunderbird 9.0 are potentially affected by the following security<br />

issues : \n\n - A use-after-free error exists related to removed nsDOMAttribute child nodes.<br />

(CVE-2011-3659)\n\n - Various memory safety issues exist. (CVE-2012-0442,<br />

CVE-2012-0443)\n\n - Memory corruption errors exist related to the decoding of Ogg<br />

Vorbis files and processing of malformed XSLT stylesheets. (CVE-2012-0444,<br />

CVE-2012-0449)\n\n - The HTML5 frame navigation policy can be violated by allowing<br />

an attacker to replace a sub-frame in another domain's document. (CVE-2012-0445)\n\n -<br />

Scripts in frames are able to bypass security restrictions in XPConnect. This bypass can<br />

allow malicious web sites to carry out cross-site scripting attacks. (CVE-2012-0446)\n\n -<br />

An information disclosure issue exists when uninitialized memory is used as padding when<br />

Family Internet Services 1722


encoding icon images. (CVE-2012-0447)\n\n - If a user chooses to export their Thunderbird<br />

Sync key the 'Thunderbird Recover Key.html' file is saved with incorrect permissions,<br />

making the file contents potentially readable by other users. Note that this issue only affects<br />

Thunderbird on Linux and Mac OS X systems. (CVE-2012-0450)<br />

Solution: Upgrade to Thunderbird 10.0 or later.<br />

CVE-2012-0450<br />

Mozilla Thunderbird 3.1.x Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6309 FAMILY: Web Clients RISK: HIGH NESSUS ID:57776<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host has a web browser installed that is vulnerable to<br />

multiple attack vectors.\n\nFor your information, the observed version of Thunderbird is :<br />

\n %L \n\nVersions of Thunderbird 3.1.x earlier than 3.1.18 are potentially affected by the<br />

following security issues : \n\n - A use-after-free error exists related to removed<br />

nsDOMAttribute child nodes. (CVE-2011-3659)\n\n - The IPv6 literal syntax in web<br />

addresses is not being properly enforced. (CVE-2011-3670)\n\n - Various memory safety<br />

issues exist. (CVE-2012-0442)\n\n - Memory corruption errors exist related to the decoding<br />

of Ogg Vorbis files and processing of malformed XSLT stylesheets. (CVE-2012-0444,<br />

CVE-2012-0449)<br />

Solution: Upgrade to Thunderbird 3.1.18 or later.<br />

CVE-2012-0449<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla SeaMonkey 2.x < 2.7.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6310 FAMILY: Web Clients RISK: HIGH NESSUS ID:57772<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host has a web browser installed that is vulnerable to<br />

multiple attack vectors.\n\nFor your information, the observed version of SeaMonkey is : \n<br />

%L \n\nVersions of SeaMonkey 2.x earlier than 2.7.0 are potentially affected by the<br />

following security issues : \n\n - A use-after-free error exists related to removed<br />

nsDOMAttribute child nodes. (CVE-2011-3659)\n\n - Various memory safety issues exist.<br />

(CVE-2012-0442, CVE-2012-0443)\n\n - Memory corruption errors exist related to the<br />

decoding of Ogg Vorbis files and processing of malformed XSLT stylesheets.<br />

(CVE-2012-0444, CVE-2012-0449)\n\n - The HTML5 frame navigation policy can be<br />

violated by allowing an attacker to replace a sub-frame in another domain's document.<br />

(CVE-2012-0445)\n\n - Scripts in frames are able to bypass security restrictions in<br />

XPConnect. This bypass can allow malicious web sites to carry out cross-site scripting<br />

attacks. (CVE-2012-0446)\n\n - An information disclosure issue exists when uninitialized<br />

memory is used as padding when encoding icon images. (CVE-2012-0447)\n\n - If a user<br />

chooses to export their SeaMonkey Sync key the 'SeaMonkey Recover Key.html' file is<br />

saved with incorrect permissions, making the file contents potentially readable by other<br />

users. Note that this issue only affects SeaMonkey on Linux and Mac OS X systems.<br />

(CVE-2012-0450)<br />

Family Internet Services 1723


Solution: Upgrade to SeaMonkey 2.7.0 or later.<br />

CVE-2012-0450<br />

Real <strong>Network</strong>s RealPlayer < 15.0.2.72 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6311 FAMILY: Web Clients RISK: HIGH NESSUS ID:57863<br />

Description: Synopsis :\n\nThe remote host is running an application that is vulnerable to multiple attack<br />

vectors.\n\nThe remote host is running RealPlayer, a multi-media application. For your<br />

information, the observed build of RealPlayer is :\n %L \n\nRealPlayer versions earlier than<br />

15.0.2.72 are potentially affected by the following issues :\n\n - A remote code execution<br />

vulnerability exists related to rvrender RMFF Flags. (CVE-2012-0922)\n\n - A remote code<br />

execution vulnerability exists related to the RV20 Frame Size Array. (CVE-2012-0923)\n\n<br />

- A remote code execution vulnerability exists relating to VIDOBJ_START_CODE.<br />

(CVE-2012-0924)\n\n - A remote code execution vulnerability exists relating to RV40.<br />

(CVE-2012-0925)\n\n - A remote code execution vulnerability exists relating to RV10<br />

Encoded Height/Width. (CVE-2012-0926)\n\n - A remote code execution vulnerability<br />

exists relating to RealAudio coded_frame_size. (CVE-2012-0927)\n\n - A remote code<br />

execution vulnerability exists relating to Attrac Sample Decoding. (CVE-2012-0928)<br />

Solution: Upgrade to RealPlayer 15.0.2.72 or later.<br />

CVE-2012-0928<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Google Chrome < 17.0.963.46 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6312 FAMILY: Web Clients RISK: HIGH NESSUS ID:57876<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Google Chrome is :\n %L<br />

\n\nVersions of Google Chrome earlier than 17.0.963.46 are potentially affected by the<br />

following vulnerabilities :\n\n - Clipboard monitoring after a paste action is possible.<br />

(CVE-2011-3953)\n\n - Application crashes are possible with excessive database usage,<br />

killing an 'IndexDB' transaction, signature checks and processing unusual certificates.<br />

(CVE-2011-3954, CVE-2011-3955, CVE-2011-3965, CVE-2011-3967)\n\n - Sandboxed<br />

origins are not handled properly inside extensions. (CVE-2011-3956)\n\n - Use-after-free<br />

errors exist related to PDF garbage collection, stylesheet error handling, CSS handling,<br />

SVG layout and 'mousemove' event handling. (CVE-2011-3957, CVE-2011-3966,<br />

CVE-2011-3968, CVE-2011-3969, CVE-2011-3971)\n\n - An error exists related to bad<br />

casting and column spans. (CVE-2011-3958)\n\n - A buffer overflow exists related to<br />

locale handling. (CVE-2011-3959)\n\n - Out-of-bounds read errors exist related to audio<br />

decoding, path clipping, PDF fax imaging, 'libxslt', and the shader translator.<br />

(CVE-2011-3960, CVE-2011-3962, CVE-2011-3963, CVE-2011-3970,<br />

CVE-2011-3972)\n\n - A race condition exists after a utility process crashes.<br />

(CVE-2011-3961)\n\n - An unspecified error exists related to the URL bar after drag and<br />

drop operations. (CVE-2011-3964)<br />

Solution: Upgrade to Google Chrome 17.0.963.46 or later.<br />

Family Internet Services 1724


CVE-2011-3972<br />

ClearSCADA Management Server Detection (SCADA)<br />

<strong>PVS</strong> ID: 6313 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is running the ClearSCADA Management Server. This software server is<br />

used to manage a wide range of SCADA devices. The reported version of ClearSCADA is :<br />

%L<br />

Solution: N/A<br />

CVE Not available<br />

ClearSCADA Management Server Detection (SCADA)<br />

<strong>PVS</strong> ID: 6314 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is running the ClearSCADA Management Server. This software server is<br />

used to manage a wide range of SCADA devices.<br />

Solution: N/A<br />

CVE Not available<br />

Novell iPrint Client < 5.78 Multiple Code Execution Vulnerabilities<br />

<strong>PVS</strong> ID: 6315 FAMILY: Web Clients RISK: HIGH NESSUS ID:57890<br />

Description: Synopsis :\n\nThe remote host contains an application that is affected by multiple code<br />

execution vulnerabilities.\n\nThe remote host has the Novell iPrint client installed. For your<br />

information, the observed version of Novell iPrint Client is : \n %L \n\nVersions of Novell<br />

iPrint Client earlier than 5.78 are potentially affected one or more of the following<br />

vulnerabilities that can allow for arbitrary code execution :\n\n - An unspecified issue exists<br />

in the GetDriverSettings realm in nipplib.dll. (CVE-2011-4187)\n\n - An unspecified issue<br />

exists in GetPrinterURLList2 in the ActiveX control. (CVE-2011-4185)\n\n - An<br />

unspecified issue exists in client-file-name parsing in nipplib.dll. (CVE-2011-4186)<br />

Solution: Upgrade to Novell iPrint Client 5.78 or later.<br />

CVE-2011-4187<br />

InduSoft WebStudio Server detection (SCADA)<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6316 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a InduSoft WebStudio server use as a human-machine interface(HMI)<br />

that is linked to SCADA systems to provide trending, diagnostic data and management<br />

information. The following version was detected: %L<br />

Family Internet Services 1725


Solution: Restrict access to the server to authorized personnel only, as well ensure that the software is<br />

patched.<br />

CVE Not available<br />

InduSoft WebStudio Server detection Version 6 (SCADA)<br />

<strong>PVS</strong> ID: 6317 FAMILY: SCADA<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is a InduSoft WebStudio server use as a human-machine interface(HMI)<br />

that is linked to SCADA systems to provide trending, diagnostic data and management<br />

information. The following version was detected: %L. This version is vulnerable a<br />

stack-based buffer overflow and a component in the Remote Agent module.<br />

Solution: Apply all the necassary patches, please reference the seealso section. Also restrict access to<br />

the server to authorized personnel only.<br />

CVE-2011-4052<br />

InduSoft WebStudio Server detection Version (SCADA)<br />

<strong>PVS</strong> ID: 6318 FAMILY: SCADA<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is a InduSoft WebStudio server use as a human-machine interface(HMI)<br />

that is linked to SCADA systems to provide trending, diagnostic data and management<br />

information. The following version was detected: %L. This version is vulnerable a<br />

stack-based buffer overflow and a component in the Remote Agent module.<br />

Solution: Apply all the necassary patches, please reference the seealso section. Also restrict access to<br />

the server to authorized personnel only.<br />

CVE-2011-4052<br />

Facebook/Twitter Pinterest Activity<br />

<strong>PVS</strong> ID: 6319 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Pinterest client. Pinterest is a 'pin board' application which is used in<br />

conjunction with Facebook or Twitter to post images, notes, and other media formats into a<br />

feed. The remote client has just signed up with the following email address : %L<br />

Solution: Ensure that such activity is authorized for your network<br />

CVE Not available<br />

Facebook/Twitter Pinterest Activity<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6320 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1726


Description: The remote host is a Pinterest client. Pinterest is a 'pin board' application which is used in<br />

conjunction with Facebook or Twitter to post images, notes, and other media formats into a<br />

feed. The remote client has just uploaded the following image : %L<br />

realtimeonly<br />

Solution: Ensure that such activity is authorized for your network<br />

CVE Not available<br />

Facebook/Twitter Pinterest Activity<br />

<strong>PVS</strong> ID: 6321 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Pinterest client. Pinterest is a 'pin board' application which is used in<br />

conjunction with Facebook or Twitter to post images, notes, and other media formats into a<br />

feed. The remote client has just 'pinned' the following image to their profile : %L<br />

realtimeonly<br />

Solution: Ensure that such activity is authorized for your network<br />

CVE Not available<br />

Google Chrome < 17.0.963.56 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6322 FAMILY: Web Clients RISK: HIGH NESSUS ID:57974<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Google Chrome is :\n %L<br />

\n\nVersions of Google Chrome earlier than 17.0.963.56 are potentially affected by the<br />

following vulnerabilities :\n\n - Integer overflow errors exist related to PDF codecs and<br />

libpng. (CVE-2011-3015, CVE-2011-3026)\n\n - A read-after-free error exists related to<br />

'counter nodes'. (CVE-2011-3016)\n\n - Use-after-free errors exist related to database<br />

handling, subframe loading, and ddrag-and-drop functionality. (CVE-2011-3017,<br />

CVE-2011-3021, CVE-2011-3023)\n\n - Heap-overflow errors exist related to path<br />

rendering and 'MKV' handling. (CVE-2011-3018, CVE-2011-3019)\n\n - Unspecified<br />

errors exist related to the native client validator and HTTP use with translation scripts.<br />

(CVE-2011-3020, CVE-2011-3022)\n\n - Empty x509 certificates can cause browser<br />

crashes. (CVE-2011-3024)\n\n - An out-of-bounds read error exists related to h.264<br />

parsing. (CVE-2011-3025)\n\n - A bad variable cast exists related to column handling.<br />

(CVE-2011-3027)<br />

Solution: Upgrade to Google Chrome 17.0.963.56 or later.<br />

CVE-2011-3027<br />

7T-IGSS Server Login Attempt Detected (SCADA)<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6323 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1727


Description: The remote host is a 7T Interactive Graphical SCADA System(IGSS) used to control and<br />

monitor programmable logic controllers(PLC) in industrial processes. There was an attempt<br />

to connect to the server listening on IP address: %L.<br />

Solution: Restrict access to the server to authorized personnel only. As well ensure that the product is<br />

up to date on all of its security patches.<br />

CVE Not available<br />

Mozilla Firefox 10.x < 10.0.1 Memory Corruption<br />

<strong>PVS</strong> ID: 6324 FAMILY: Web Clients RISK: HIGH NESSUS ID:57919<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is affected by a memory<br />

corruption vulnerability.\n\nFor your information, the observed version of Firefox is : \n<br />

%L \n\nVersions of Firefox 10.x earlier than 10.0.1 are potentially affected by a memory<br />

corruption vulnerability. A use-after-free error exists in the method<br />

'nxXBLDocumentInfo::ReadPrototypeBindings' and XBL bindings are not properly<br />

removed from a hash table in the event of failure. Clean up processes may then attempt to<br />

use this data and cause application crashes. These application crashes are potentially<br />

exploitable.<br />

Solution: Upgrade to Firefox 10.0.1 or later.<br />

CVE-2012-0452<br />

Mozilla Firefox 10.x < 10.0.2 'png_decompress_chunk' Integer Overflow<br />

<strong>PVS</strong> ID: 6325 FAMILY: Web Clients RISK: HIGH NESSUS ID:58005<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is affected by an integer<br />

overflow vulnerability.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox 10.x earlier than 10.0.2 are potentially affected by an integer<br />

overflow vulnerability. An integer overflow error exists in 'libpng', a library used by this<br />

application. When decompressing certain PNG image files, this error can allow a<br />

heap-based buffer overflow which can crash the application or potentially allow code<br />

execution.<br />

Solution: Upgrade to Firefox 10.0.2 or later.<br />

CVE-2011-3026<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Thunderbird 10.x < 10.0.1 Memory Corruption<br />

<strong>PVS</strong> ID: 6326 FAMILY: Web Clients RISK: HIGH NESSUS ID:57920<br />

Description: Synopsis :\n\nThe remote host has a mail client installed that is affected by a memory<br />

corruption vulnerability.\n\nFor your information, the observed version of Thunderbird is :<br />

\n %L \n\nVersions of Thunderbird 10.x earlier than 10.0.1 are potentially affected by a<br />

use-after-free error in the method 'nsXBLDocumentInfo::ReadPrototypeBindings' and XBL<br />

bindings are not properly removed from a hash table in the event of failure. Clean up<br />

Family Internet Services 1728


processes may then attempt to use this data and cause application crashes. These<br />

application crashes are potentially exploitable.<br />

Solution: Upgrade to Thunderbird 10.0.1 or later.<br />

CVE-2012-0452<br />

Mozilla Thunderbird 10.x < 10.0.2 'png_decompress_chunk' Integer Overflow<br />

<strong>PVS</strong> ID: 6327 FAMILY: Web Clients RISK: HIGH NESSUS ID:58075<br />

Description: Synopsis :\n\nThe remote host has a mail client installed that is potentially affected by an<br />

integer overflow vulnerability.\n\nFor your information, the observed version of<br />

Thunderbird is : \n %L \n\nVersions of Thunderbird 10.x earlier than 10.0.2 are potentially<br />

affected by an integer overflow error in 'libpng', a library used by this application. When<br />

decompressing certain PNG image files, this error can allow a heap-based buffer overflow<br />

which can crash the application or potentially allow code execution.<br />

Solution: Upgrade to Thunderbird 10.0.2 or later.<br />

CVE-2011-3026<br />

Mozilla SeaMonkey 2.x < 2.7.1 Memory Corruption<br />

<strong>PVS</strong> ID: 6328 FAMILY: Web Clients RISK: HIGH NESSUS ID:57921<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is affected by a memory<br />

corruption vulnerability.\n\nFor your information, the observed version of SeaMonkey is :<br />

\n %L \n\nVersions of SeaMonkey 2.x earlier than 2.7.1 are potentially affected by a<br />

memory corruption vulnerability. A use-after-free error exists in the method<br />

'nsXBLDocumentInfo::ReadPrototypeBindings' and XBL bindings are not properly<br />

removed from a hash table in the event of failure. Clean up processes may then attempt to<br />

use this data and cause application crashes. These application crashes are potentially<br />

exploitable.<br />

Solution: Upgrade to SeaMonkey 2.7.1 or later.<br />

CVE-2012-0452<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla SeaMonkey 2.x < 2.7.2 'png_decompress_chunk' Integer Overflow<br />

<strong>PVS</strong> ID: 6329 FAMILY: Web Clients RISK: HIGH NESSUS ID:58009<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is affected by an integer<br />

overflow vulnerability.\n\nFor your information, the observed version of SeaMonkey is : \n<br />

%L \n\nVersions of SeaMonkey 2.x earlier than 2.7.2 are potentially affected by an integer<br />

overflow vulnerability in 'libpng', a library used by this application. When decompressing<br />

certain PNG image files, this error can allow a heap-based buffer overflow which can crash<br />

the application or potentially allow code execution.<br />

Family Internet Services 1729


Solution: Upgrade to SeaMonkey 2.7.2 or later.<br />

CVE-2011-3026<br />

7T-IGSS Server Detected (SCADA)<br />

<strong>PVS</strong> ID: 6330 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a 7T Interactive Graphical SCADA System(IGSS) used to control and<br />

monitor programmable logic controllers(PLC) in industrial processes. The following<br />

version was detected: %L.<br />

Solution: Restrict access to the server to authorized personnel only. As well ensure that the product is<br />

up to date on all of its security patches.<br />

CVE Not available<br />

Apache Tomcat 5.5.x < 5.5.35 Hash Collision Denial of Service<br />

<strong>PVS</strong> ID: 6331 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:57540<br />

Description: Synopsis :\n\nThe remote web server is affected by a denial of service vulnerability.\n\nFor<br />

your information, the observed version of Apache Tomcat installed on the remote host is :<br />

\n %L \n\nVersions of Tomcat 5.x earlier than 5.5.35 are potentially affected by a denial of<br />

service vulnerability. Large numbers of crafted form parameters can cause excessive CPU<br />

consumption due to hash collisions.<br />

Solution: Upgrade to Apache Tomcat 5.5.35 or later.<br />

CVE-2012-0022<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Apache Tomcat 6.0.x < 6.0.35 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6332 FAMILY: Web Servers RISK: HIGH NESSUS ID:57080<br />

Description: Synopsis :\n\nThe remote web server is affected by a denial of service vulnerability.\n\nFor<br />

your information, the observed version of Apache Tomcat installed on the remote host is :<br />

\n %L \n\nVersions of Apache Tomcat 6.0.35 are potentially affected by multiple<br />

vulnerabilities :\n\n - Specially crafted requests are incorrectly processed by Tomcat and<br />

can cause the server to allow injection of arbitrary AJP messages. This can lead to<br />

authentication bypass and disclosure of sensitive information. Note this vulnerability only<br />

occurs when the following are true (CVE-2011-3190):\n\n - the<br />

org.apache.jk.server.JkCoyoteHandler AJP connector is not used.\n - POST requests are<br />

accepted.\n - Large numbers of crafted form parameters can cause excessive CPU<br />

consumption due to hash collisions. (CVE-2011-4858, CVE-2012-0022)\nIAVB Reference<br />

: 2012-B-0035\nSTIG Finding Severity : Category I<br />

Solution: Upgrade to Apache Tomcat 6.0.35 or later.<br />

Family Internet Services 1730


CVE-2012-0022<br />

Apache Tomcat 7.0.x < 7.0.22 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6333 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:57082<br />

Description: Synopsis :\n\nThe remote web server is affected by multiple vulnerabilities.\n\nFor your<br />

information, the observed version of Apache Tomcat installed on the remote host is : \n %L<br />

\n\nVersions of Tomcat 7.0.x earlier than 7.0.22 are potentially affected by multiple<br />

vulnerabilities:\n\n - An information disclosure vulnerability exists. Request information is<br />

cached in two objects and these objects are not recycled at the same time. Further requests<br />

can obtain sensitive information if certain error conditions occur. (CVE-2011-3375)\n\n -<br />

The web server is not properly restricting access to the servlets that provide the<br />

functionality of the Manager application. This can allow untrusted web applications to<br />

access privileged internal functionality such as gathering information on running web<br />

applications and deploying additional web applications. (CVE-2011-3376)\nIAVB<br />

Reference : 2012-B-0035\nSTIG Finding Severity : Category I<br />

Solution: Upgrade to Apache Tomcat 7.0.22 or later.<br />

CVE-2011-3376<br />

Apache Tomcat 7.0.x < 7.0.23 Hash Collision Denial of Service<br />

<strong>PVS</strong> ID: 6334 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:57541<br />

Description: Synopsis :\n\nThe remote web server is affected by a denial of service vulnerability.\n\nFor<br />

your information, the observed version of Apache Tomcat installed on the remote host is :<br />

\n %L \n\nVersions of Tomcat 7.0.x earlier than 7.0.23 are potentially affected by a denial<br />

of service vulnerability. Large numbers of crafted form parameters can cause excessive<br />

CPU consumption due to hash collisions.<br />

Solution: Upgrade to Apache Tomcat 7.0.23 or later.<br />

CVE-2012-0022<br />

IBM iSeries FTP Service Detection<br />

<strong>PVS</strong> ID: 6335 FAMILY: FTP Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the IBM iSeries OS. The FTP service is running on this host.<br />

Solution: Solution Not Available<br />

CVE Not available<br />

PostgreSQL 8.3.x < 8.3.18 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6336 FAMILY: Database NESSUS ID:Not Available<br />

Family Internet Services 1731


RISK:<br />

MEDIUM<br />

Description: Synopsis :\n\nThe remote database server is vulnerable to multiple attack vectors.\n\nFor<br />

your information, the version of PostgreSQL installed on the remote host is:\n %L<br />

\n\nVersions of PostgreSQL 8.3.x earlier than 8.3.18 are potentially affected by the<br />

following vulnerabilities :\n\n - Permissions on a function called by a trigger are not<br />

properly checked. (CVE-2012-0866)\n\n - SSL certificate name checks are truncated to 32<br />

characters, allowing connection spoofing under some circumstances when using third party<br />

certificates. (CVE-2012-0867)\n\n - Line breaks in object names can be exploited to<br />

execute arbitrary SQL when reloading a pg_dump file. (CVE-2012-0868)<br />

Solution: Upgrade to PostgreSQL 8.3.18 or later.<br />

CVE-2012-0868<br />

PostgreSQL < 9.1.3 / 9.0.7 / 8.4.11 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6337 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote database server is vulnerable to multiple attack vectors.\n\nFor<br />

your information, the version of PostgreSQL installed on the remote host is:\n %L<br />

\n\nVersions of PostgreSQL earlier than 9.1.3, 9.0.7, 8.4.11 and are potentially affected by<br />

the following vulnerabilities :\n\n - Permissions on a function called by a trigger are not<br />

properly checked. (CVE-2012-0866)\n\n - SSL certificate name checks are truncated to 32<br />

characters, allowing connection spoofing under some circumstances when using third party<br />

certificates. (CVE-2012-0867)\n\n - Line breaks in object names can be exploited to<br />

execute arbitrary SQL when reloading a pg_dump file. (CVE-2012-0868)<br />

Solution: Upgrade to PostgreSQL 8.4.11, 9.0.7, 9.1.3, or later.<br />

CVE-2012-0868<br />

Dropbear SSH Server Channel Concurrency Use-after-free Remote Code Execution<br />

<strong>PVS</strong> ID: 6338 FAMILY: SSH RISK: HIGH NESSUS ID:58183<br />

Description: Synopsis :\n\nThe remote ssh service is affected by a remote code execution<br />

vulnerability.\n\nDropbear, an SSH server, is installed on the remote host. For your<br />

information, the observed version of Dropbear is:\n %L \n\nVersions of Dropbear SSH<br />

before 2012.55 contain a flaw that might allow an attacker to run arbitrary code on the<br />

remote host with root privileges if they are authenticated using a public key and command<br />

restriction is enforced.<br />

Solution: Upgrade to Dropbear SSH 2012.55 or later.<br />

CVE-2012-0920<br />

Evernote Client Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1732


<strong>PVS</strong> ID: 6339 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Evernote client. Evernote is an application which allows<br />

users to sync files across multiple devices, interact with social media sites, and do a host of<br />

other things.<br />

Solution: Ensure that such usage is in alignment with Corporate policy<br />

CVE Not available<br />

IBM Solid Database 6.5 < 6.5.0.8 Multiple Denial of Service Vulnerabilities<br />

<strong>PVS</strong> ID: 6340 FAMILY: Database RISK: HIGH NESSUS ID:58105<br />

Description: Synopsis :\n\nThe remote database server is vulnerable to a denial of service attack.\n\nThe<br />

remote host is running IBM solidDB. For your information, the observed version of<br />

solidDB is:\n %L \n\nVersions of solidDB 6.5 earlier than 6.5.0.8 are potentially affected<br />

by multiple denial of service vulnerabilities :\n\n - Sending packets with many integer<br />

fields can trigger several recursive calls of a certain function causing an excessive amount<br />

of stack memory consumption. (CVE-2010-4055, IC80074)\n\n - Upon receiving a packet<br />

containing only a single integer field, a NULL pointer dereference can occur causing a<br />

daemon crash. (CVE-2010-4056, IC80075)\n\n - When receiving a packet with many<br />

different integer fields containing two different values, an invalid memory access and<br />

daemon crash can occur. (CVE-2010-4057, IC80076)<br />

Solution: Upgrade to solidDB 6.5.0.8 or later.<br />

CVE-2010-4057<br />

Google Chrome < 17.0.963.65 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6341 FAMILY: Web Clients RISK: HIGH NESSUS ID:58206<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Google Chrome is :\n %L<br />

\n\nVersions of Google Chrome earlier than 17.0.963.65 are potentially affected by the<br />

following vulnerabilities :\n\n - Use-after-free errors exist related to 'v8 element wrapper',<br />

SVG value handling, SVG document handling, SVG use handling, multi-column handling,<br />

quote handling, class attribute handling, table section handling, flexbox with floats and<br />

SVG animation elements. (CVE-2011-3031, CVE-2011-3032, CVE-2011-3034,<br />

CVE-2011-3035, CVE-2011-3038, CVE-2011-3039, CVE-2011-3041, CVE-2011-3042,<br />

CVE-2011-3043, CVE-2011-3044)\n\n - An error exists in the 'Skia' drawing library that<br />

can allow buffer overflows. (CVE-2011-3033)\n\n - Casting errors exist related to line box<br />

handling and anonymous block splitting. (CVE-2011-3036, CVE-2011-3037)\n\n - An<br />

out-of-bounds read error exists related to text handling. (CVE-2011-3040)<br />

Solution: Upgrade to Google Chrome 17.0.963.65 or later.<br />

CVE-2011-3044<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1733


iHeartRadio Stream Detection<br />

<strong>PVS</strong> ID: 6342 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host was observed accessing an iHeartRadio stream.<br />

realtimeonly<br />

Solution: Ensure that this application is authorized for your network<br />

CVE Not available<br />

Apple's iCloud Service Access Detection<br />

<strong>PVS</strong> ID: 6343 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host has potentially accessed Apple's iCloud service. Ensure that this activity is<br />

in accordance to company policy.<br />

Solution: Ensure that this application is authorized within your network.<br />

CVE Not available<br />

Apple iOS 3.0 through 5.0.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6344 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is an iPhone, iPod Touch, or iPad running iOS. For your information, the observed version<br />

of iOS is : \n %L \n\nVersions of iOS 3.0 through 5.1 are potentially affected by multiple<br />

vulnerabilities. iOS 5.1 contains security fixes for the following products :\n\n -<br />

CF<strong>Network</strong>\n\n - HFS\n\n - Kernel\n\n - libresolv\n\n - Passcode Lock\n\n - Safari\n\n -<br />

Siri\n\n - VPN\n\n - WebKit<br />

Solution: Upgrade to iOS 5.1 or later.<br />

CVE-2012-0646<br />

iTunes < 10.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6345 FAMILY: Web Clients RISK: HIGH NESSUS ID:58320<br />

Description: Synopsis :\n\nThe remote host contains an application that is susceptible to a<br />

man-in-the-middle attack.\n\nThe remote host has iTunes installed, a popular media player<br />

for Windows and Mac OS. For your information, the observed version of iTunes is:\n %L<br />

\n\nVersions of iTunes earlier than 10.6 are reportedly affected by numerous memory<br />

corruption vulnerabilities in its WebKit component. Note that these issues only affect<br />

iTunes on Windows.<br />

Solution: Upgrade to iTunes 10.6 or later.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1734


CVE-2012-0648<br />

Safari < 5.1.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6346 FAMILY: Web Clients RISK: HIGH NESSUS ID:58323<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nThe remote host has Safari installed. For your information, the observed version<br />

of Safari is: \n %L \n\nVersions of Safari earlier than 5.1.4 are reportedly affected by<br />

several issues :\n\n - Look-alike characters in a URL could be used to masquerade a<br />

website. (CVE-2012-0584)\n\n - Web page visits may be recorded in browser history even<br />

when private browsing is active. (CVE-2012-0585)\n\n - Multiple cross-site scripting issues<br />

existed in WebKit. (CVE-2011-3881, CVE-2012-0586, CVE-2012-0587, CVE-2012-0588,<br />

CVE-2012-0589)\n\n - A cross-origin issue existed in WebKit, which may allow cookies to<br />

be disclosed across origins. (CVE-2011-3887)\n\n - Visiting a maliciously crafted website<br />

and dragging content with the mouse may lead to a cross-site scripting attack.<br />

(CVE-2012-0590)\n\n - Multiple memory corruption issues existed in WebKit.<br />

(CVE-2011-2825, CVE-2011-2833, CVE-2011-2846, CVE-2011-2847, CVE-2011-2854,<br />

CVE-2011-2855, CVE-2011-2857, CVE-2011-2860, CVE-2011-2866, CVE-2011-2867,<br />

CVE-2011-2868, CVE-2011-2869, CVE-2011-2870, CVE-2011-2871, CVE-2011-2872,<br />

CVE-2011-2873, CVE-2011-2877, CVE-2011-3885, CVE-2011-3888, CVE-2011-3897,<br />

CVE-2011-3908, CVE-2011-3909, CVE-2011-3928, CVE-2012-0591, CVE-2012-0592,<br />

CVE-2012-0593, CVE-2012-0594, CVE-2012-0595, CVE-2012-0596, CVE-2012-0597,<br />

CVE-2012-0598, CVE-2012-0599, CVE-2012-0600, CVE-2012-0601, CVE-2012-0602,<br />

CVE-2012-0603, CVE-2012-0604, CVE-2012-0605, CVE-2012-0606, CVE-2012-0607,<br />

CVE-2012-0608, CVE-2012-0609, CVE-2012-0610, CVE-2012-0611, CVE-2012-0612,<br />

CVE-2012-0613, CVE-2012-0614, CVE-2012-0615, CVE-2012-0616, CVE-2012-0617,<br />

CVE-2012-0618, CVE-2012-0619, CVE-2012-0620, CVE-2012-0621, CVE-2012-0622,<br />

CVE-2012-0623, CVE-2012-0624, CVE-2120-0625, CVE-2012-0626, CVE-2012-0627,<br />

CVE-2012-0628, CVE-2012-0629, CVE-2012-0630, CVE-2012-0631, CVE-2012-0632,<br />

CVE-2012-0633, CVE-2012-0635, CVE-2012-0636, CVE-2012-0637, CVE-2012-0638,<br />

CVE-2012-0639, CVE-2012-0648(\n\n - Cookies may be set by third-parties, even when<br />

Safari is configured to block them. (CVE-2012-0640)\n\n - If a site uses HTTP<br />

authentication and redirects to another site, the authentication credentials may be sent to the<br />

other site. (CVE-2012-0647)<br />

Solution: Upgrade to Safari 5.1.4 or later.<br />

CVE-2012-0648<br />

DB2 9.5 < Fix Pack 9 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6347 FAMILY: Database RISK: HIGH NESSUS ID:58293<br />

Description: Synopsis :\n\nThe remote database server is vulnerable to multiple attack vectors.\n\nFor<br />

your information, the observed version of IBM DB2 is %L\n\nVersions of IBM DB2 9.5<br />

earlier than Fix Pack 9 are potentially affected by multiple issues : - Incorrect,<br />

world-writable file permissions are in place for the file 'NODES.REG'. (IC79518)\n\n - An<br />

unspecified error can allow attacks to cause a denial of service via unspecified vectors.<br />

(IC76899)\n\n - A local user can exploit a vulnerability in the bundled IBM Tivoli<br />

Monitoring Agent (ITMA) to escalate their privileges. (IC79970)\n\n - An unspecified error<br />

Family Internet Services 1735


in the DB2 Administration Server (DAS) can allow remote privilege escalation or denial of<br />

service via unspecified vectors. Note that this issue does not affect Windows hosts.<br />

(IC80728)\n\n - An authorized user with 'CONNECT' privileges from 'PUBLIC' can cause<br />

a denial of service via unspecified methods related to DB2's XML feature. (IC81379)\n\n -<br />

An authorized user with 'CONNECT' and 'CREATEIN' privileges on a database can<br />

perform unauthorized reads on tables. (IC81387)\nIAVB Reference : 2012-B-0030\nSTIG<br />

Finding Severity : Category I<br />

Solution: Upgrade to IBM DB2 9.5 Fix Pack 9 or later.<br />

CVE Not available<br />

Google Chrome < 17.0.963.78 Code Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6348 FAMILY: Web Clients RISK: HIGH NESSUS ID:58328<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Google Chrome is :\n %L<br />

\n\nVersions of Google Chrome earlier than 17.0.963.78 are potentially affected by the<br />

following vulnerabilities :\n\n - The application does not properly handle history<br />

navigation.\n\n - An unspecified universal cross-site scripting issue exists.\n\nBy exploiting<br />

these vulnerabilities in combination, an attacker could bypass Chrome's sandbox and<br />

execute arbitrary code on the target machine as demonstrated in March 2012 at Google's<br />

Pwnium competition.<br />

Solution: Upgrade to Google Chrome 17.0.963.78 or later.<br />

CVE-2011-3046<br />

Google Chrome < 17.0.963.79 Memory Corruption Vulnerabilities<br />

<strong>PVS</strong> ID: 6349 FAMILY: Web Clients RISK: HIGH NESSUS ID:58342<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by multiple memory<br />

corruption vulnerabilities.\n\nFor your information, the observed version of Google<br />

Chrome is :\n %L \n\nVersions of Google Chrome earlier than 17.0.963.79 are potentially<br />

affected by memory corruption vulnerabilities related to plugin loading and GPU<br />

processing.<br />

Solution: Upgrade to Google Chrome 17.0.963.79 or later.<br />

CVE-2011-3047<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Firefox 10.x < 10.0.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6350 FAMILY: Web Clients RISK: HIGH NESSUS ID:58353<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox 10.x earlier than 10.0.3 are potentially affected by the following<br />

security issues :\n\n - Multiple memory corruption issues. By tricking a user into visiting a<br />

Family Internet Services 1736


specially crafted page, these issues may allow an attacker to execute arbitrary code in the<br />

context of the affected application. (CVE-2012-0454, CVE-2012-0457, CVE-2012-0459,<br />

CVE-2012-0461, CVE-2012-0462, CVE-2012-0463, CVE-2012-0464)\n\n - Ah HTTP<br />

Header security bypass vulnerability that can be leveraged by attackers to bypass certain<br />

security restrictions and conduct cross-site scripting attacks. (CVE-2012-0451)\n\n - A<br />

security bypass vulnerability that can be exploited by an attacker if the victim can be<br />

tricked into setting a new home page by dragging a specially crafted link to the 'home'<br />

button URL, which will set the user's home page to a 'javascript:' URL.<br />

(CVE-2012-0458)\n\n - An information disclosure vulnerability due to an out of bounds<br />

read in SVG filters. (CVE-2012-0456)\n\n - A cross-site scripting vulnerability that can be<br />

triggered by dragging and dropping 'javascript:' links onto a frame. (CVE-2012-0455)\n\n -<br />

'window.fullScreen' is writeable by untrusted content, allowing attackers to perform UI<br />

spoofing attacks. (CVE-2012-0460)<br />

Solution: Upgrade to Firefox 10.0.3 ESR or later.<br />

CVE-2012-0464<br />

Mozilla Firefox 3.6.x < 3.6.28 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6351 FAMILY: Web Clients RISK: HIGH NESSUS ID:58354<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox 3.6.x earlier than 3.6.28 are potentially affected by the following<br />

security issues :\n\n - Multiple memory corruption issues. By tricking a user into visiting a<br />

specially crafted page, these issues may allow an attacker to execute arbitrary code in the<br />

context of the affected application. (CVE-2012-0457, CVE-2012-0461, CVE-2012-0463,<br />

CVE-2012-0464)\n\n - A security bypass vulnerability that can be exploited by an attacker<br />

if the victim can be tricked into setting a new home page by dragging a specially crafted<br />

link to the 'home' button URL, which will set the user's home page to a 'javascript:' URL.<br />

(CVE-2012-0458)\n\n - An information disclosure vulnerability due to an out of bounds<br />

read in SVG filters. (CVE-2012-0456)\n\n - A cross-site scripting vulnerability that can be<br />

triggered by dragging and dropping 'javascript:' links onto a frame. (CVE-2012-0455)<br />

Solution: Upgrade to Firefox 3.6.28 or later.<br />

CVE-2012-0464<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Thunderbird 10.x < 10.0.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6352 FAMILY: Web Clients RISK: HIGH NESSUS ID:58355<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox 10.x earlier than 10.0.3 are potentially affected by the following<br />

security issues :\n\n - Multiple memory corruption issues. By tricking a user into visiting a<br />

specially crafted page, these issues may allow an attacker to execute arbitrary code in the<br />

context of the affected application. (CVE-2012-0454, CVE-2012-0457, CVE-2012-0459,<br />

CVE-2012-0461, CVE-2012-0462, CVE-2012-0463, CVE-2012-0464)\n\n - Ah HTTP<br />

Family Internet Services 1737


Header security bypass vulnerability that can be leveraged by attackers to bypass certain<br />

security restrictions and conduct cross-site scripting attacks. (CVE-2012-0451)\n\n - A<br />

security bypass vulnerability that can be exploited by an attacker if the victim can be<br />

tricked into setting a new home page by dragging a specially crafted link to the 'home'<br />

button URL, which will set the user's home page to a 'javascript:' URL.<br />

(CVE-2012-0458)\n\n - An information disclosure vulnerability due to an out of bounds<br />

read in SVG filters. (CVE-2012-0456)\n\n - A cross-site scripting vulnerability that can be<br />

triggered by dragging and dropping 'javascript:' links onto a frame. (CVE-2012-0455)\n\n -<br />

'window.fullScreen' is writeable by untrusted content, allowing attackers to perform UI<br />

spoofing attacks. (CVE-2012-0460)<br />

Solution: Upgrade to Thunderbird 10.0.3 or later.<br />

CVE-2012-0464<br />

Mozilla Thunderbird 3.1.x < 3.1.20 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6353 FAMILY: Web Clients RISK: HIGH NESSUS ID:58356<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Thunderbird is : \n %L<br />

\n\nVersions of Thunderbird 3.1.x earlier than 3.1.20 are potentially affected by the<br />

following security issues :\n\n - Multiple memory corruption issues. By tricking a user into<br />

visiting a specially crafted page, these issues may allow an attacker to execute arbitrary<br />

code in the context of the affected application. (CVE-2012-0457, CVE-2012-0461,<br />

CVE-2012-0462, CVE-2012-0463, CVE-2012-0464)\n\n - A security bypass vulnerability<br />

that can be exploited by an attacker if the victim can be tricked into setting a new home<br />

page by dragging a specially crafted link to the 'home' button URL, which will set the user's<br />

home page to a 'javascript:' URL. (CVE-2012-0458)\n\n - An information disclosure<br />

vulnerability due to an out of bounds read in SVG filters. (CVE-2012-0456)\n\n - A<br />

cross-site scripting vulnerability that can be triggered by dragging and dropping 'javascript:'<br />

links onto a frame. (CVE-2012-0455)<br />

Solution: Upgrade to Thunderbird 3.1.20 or later.<br />

CVE-2012-0464<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla SeaMonkey 2.x < 2.8 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6354 FAMILY: Web Clients RISK: HIGH NESSUS ID:58352<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of SeaMonkey is : \n %L<br />

\n\nVersions of SeaMonkey 2.x earlier than 2.8 are potentially affected by the following<br />

security issues :\n\n - Multiple memory corruption issues. By tricking a user into visiting a<br />

specially crafted page, these issues may allow an attacker to execute arbitrary code in the<br />

context of the affected application. (CVE-2012-0454, CVE-2012-0457, CVE-2012-0459,<br />

CVE-2012-0461, CVE-2012-0462, CVE-2012-0463, CVE-2012-0464)\n\n - Ah HTTP<br />

Header security bypass vulnerability that can be leveraged by attackers to bypass certain<br />

security restrictions and conduct cross-site scripting attacks. (CVE-2012-0451)\n\n - A<br />

Family Internet Services 1738


security bypass vulnerability that can be exploited by an attacker if the victim can be<br />

tricked into setting a new home page by dragging a specially crafted link to the 'home'<br />

button URL, which will set the user's home page to a 'javascript:' URL.<br />

(CVE-2012-0458)\n\n - An information disclosure vulnerability due to an out of bounds<br />

read in SVG filters. (CVE-2012-0456)\n\n - A cross-site scripting vulnerability that can be<br />

triggered by dragging and dropping 'javascript:' links onto a frame. (CVE-2012-0455)\n\n -<br />

'window.fullScreen' is writeable by untrusted content, allowing attackers to perform UI<br />

spoofing attacks. (CVE-2012-0460)<br />

Solution: Upgrade to SeaMonkey 2.8 or later.<br />

CVE-2012-0464<br />

VLC Media Player < 2.0.1 Multiple Code Execution Vulnerabilities<br />

<strong>PVS</strong> ID: 6355 FAMILY: Web Clients RISK: HIGH NESSUS ID:58416<br />

Description: Synopsis :\n\nThe remote host contains an application that is vulnerable to multiple attack<br />

vectors\n\nThe remote host contains VLC player, a multi-media application. For your<br />

information, the observed version of VLC is : \n %L .\n\nVersions of VLC media player<br />

earlier than 2.0.1 are potentially affected by multiple vulnerabilities :\n\n - A stack<br />

overflow exists in MMS support. (CVE-2012-1775)\n\n - Multiple heap overflows exist in<br />

Real RTSP support. (CVE-2012-1776)<br />

Solution: Upgrade to VLC Media Player version 2.0.1 or later.<br />

CVE-2012-1776<br />

Google Chrome < 17.0.963.83 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6356 FAMILY: Web Clients RISK: HIGH NESSUS ID:58434<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Google Chrome is :\n %L<br />

\n\nVersions of Google Chrome earlier than 17.0.963.83 are potentially affected by the<br />

following vulnerabilities :\n\n - An unspecified integer issue exists in libpng.<br />

(CVE-2011-3045)\n\n - Use-after-free errors exist related to 'first-letter' handling, CSS<br />

cross-fade handling and block splitting. (CVE-2011-3050, CVE_2011-3051,<br />

CVE-2011-3053)\n\n - A memory corruption error exists related to WebGL canvas<br />

handling. (CVE-2011-3052)\n\n - An error exists related to webui privilege isolation.<br />

(CVE-2011-3054)\n\n - Installation of unpacked extensions does not use the application's<br />

native user interface for prompts. (CVE-2011-3055)\n\n - A cross-origin violation is<br />

possible with 'magic iframe'. (CVE-2011-3056)\n\n - The v8 JavaScript engine can allow<br />

invalid reads to take place. (CVE-2011-3057)<br />

Solution: Upgrade to Google Chrome 17.0.963.83 or later.<br />

CVE-2011-3056<br />

E-mail Client Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1739


<strong>PVS</strong> ID: 6357 FAMILY: SMTP Clients RISK: NONE NESSUS ID:Not Available<br />

Description: The remote host is running the following e-mail client: %L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Facebook Game - Zynga's Cafe World Detected<br />

<strong>PVS</strong> ID: 6358 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Zynga game Cafe World via Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Zynga's Castleville Detected<br />

<strong>PVS</strong> ID: 6359 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Zynga game CastleVille via Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Zynga's CityVille Detected<br />

<strong>PVS</strong> ID: 6360 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Zynga game CityVille via Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Zynga's Empires & Allies Detected<br />

<strong>PVS</strong> ID: 6361 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Zynga game Empires & Allies via Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Zynga's FarmVille Detected<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1740


<strong>PVS</strong> ID: 6362 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Zynga game FarmVille via Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Zynga's FishVille Detected<br />

<strong>PVS</strong> ID: 6363 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Zynga game FishVille via Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Zynga's Hidden Chronicles Detected<br />

<strong>PVS</strong> ID: 6364 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Zynga game Hidden Chronicles via Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Zynga's Indiana Jones Adventure World Detected<br />

<strong>PVS</strong> ID: 6365 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Zynga game Indiana Jones Adventure World via<br />

Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Zynga's Mafia Wars 2 Detected<br />

<strong>PVS</strong> ID: 6366 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Zynga game Mafia Wars 2 via Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Zynga's Mafia Wars Detected<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1741


<strong>PVS</strong> ID: 6367 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Zynga game Mafia Wars via Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Zynga's PetVille Detected<br />

<strong>PVS</strong> ID: 6368 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Zynga game PetVille via Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Zynga's Pioneer Trail Detected<br />

<strong>PVS</strong> ID: 6369 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Zynga game Pioneer Trail (formerly FrontierVille) via<br />

Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Zynga's Poker Detected<br />

<strong>PVS</strong> ID: 6370 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Zynga Poker game via Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Application - Zynga's RewardVille Detected<br />

<strong>PVS</strong> ID: 6371 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Zynga RewardVille application via Facebook /<br />

zynga.com. This central application is used to reward players in a wide variety of Zynga<br />

games.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1742


Facebook Game - Zynga's Treasure Isle Detected<br />

<strong>PVS</strong> ID: 6372 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Zynga game Treasure Isle via Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Zynga's Vampire Wars Detected<br />

<strong>PVS</strong> ID: 6373 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Zynga game Vampire Wars via Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Zynga's Words With Friends Detected<br />

<strong>PVS</strong> ID: 6374 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Zynga game Words With Friends via Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Zynga's YoVille Detected<br />

<strong>PVS</strong> ID: 6375 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Zynga game YoVille via Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Wooga Bubble Island Detected<br />

<strong>PVS</strong> ID: 6376 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Wooga Bubble Island game on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Wooga Diamond Dash Detected<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1743


<strong>PVS</strong> ID: 6377 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Wooga Diamond Dash game on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Wooga Happy Hospital Detected<br />

<strong>PVS</strong> ID: 6378 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Wooga Happy Hospital game on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Wooga Magic Land Detected<br />

<strong>PVS</strong> ID: 6379 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Wooga Magic Land game on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Wooga Monster World Detected<br />

<strong>PVS</strong> ID: 6380 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Wooga Monster World game on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Angry Birds Detected<br />

<strong>PVS</strong> ID: 6381 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Angry Birds game via Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Backyard Monsters Detected<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6382 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1744


Description: The remote host is accessing the Backyard Monsters application on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Bejeweled Blitz Detected<br />

<strong>PVS</strong> ID: 6383 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Bejeweled Blitz game on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - BINGO Blitz Detected<br />

<strong>PVS</strong> ID: 6384 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the BINGO Blitz application on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Coco Girl Detected<br />

<strong>PVS</strong> ID: 6385 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Coco Girl application on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - CSI Crime City Detected<br />

<strong>PVS</strong> ID: 6386 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the CSI Crime City game on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Shadow Fight Detected<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6387 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1745


Description: The remote host is accessing the Shadow Fight application on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Social Empires, Land of Dragons & Castles Detected<br />

<strong>PVS</strong> ID: 6388 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Social Empires - Land of Dragons & Castles application<br />

on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Tetris Battle Detected<br />

<strong>PVS</strong> ID: 6389 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Tetris Battle game on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - The Sims Social Detected<br />

<strong>PVS</strong> ID: 6390 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing The Sims Social application on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Top Eleven, Be a Football Manager Detected<br />

<strong>PVS</strong> ID: 6391 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Top Eleven - Be a Football Manager application on<br />

Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

BitTorrent .torrent File Download Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6392 FAMILY: Peer-To-Peer File Sharing RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1746


Description: The remote host has downloaded a .torrent file. Ensure that this activity is in accordance to<br />

company policy. Many torrent files are loaded with malware, as well as violate copyright<br />

infringement. The following file was detected: %L.<br />

realtimeonly<br />

Solution: Ensure that this activity does not violate company policy.<br />

CVE Not available<br />

BitTorrent .torrent File Download Detection<br />

<strong>PVS</strong> ID: 6393 FAMILY: Peer-To-Peer File Sharing RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host has downloaded a .torrent file. Ensure that this activity is in accordance to<br />

company policy. Many torrent files are loaded with malware, as well as violate copyright<br />

infringement. The following file was detected: %L.<br />

realtimeonly<br />

Solution: Ensure that this activity does not violate company policy.<br />

CVE Not available<br />

BitTorrent .torrent File Download Detection<br />

<strong>PVS</strong> ID: 6394 FAMILY: Peer-To-Peer File Sharing RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host has downloaded a .torrent file. Ensure that this activity is in accordance to<br />

company policy. Many torrent files are loaded with malware, as well as violate copyright<br />

infringement. The following file was detected: %L.<br />

realtimeonly<br />

Solution: Ensure that this activity does not violate company policy.<br />

CVE Not available<br />

Apple Jailbroken Device Detected<br />

<strong>PVS</strong> ID: 6395 FAMILY: Mobile Devices RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running an Apple device which has been jailbroken. The host is running<br />

IOS version : %L<br />

Solution: Solution Not Available<br />

CVE Not available<br />

Facebook Link Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1747


<strong>PVS</strong> ID: 6396 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The following link to your web server was posted to Facebook : %P<br />

realtimeonly<br />

Solution: Solution Not Available<br />

CVE Not available<br />

Facebook Application Access<br />

<strong>PVS</strong> ID: 6397 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the following Facebook application: %L<br />

realtimeonly<br />

Solution: Solution Not Available<br />

CVE Not available<br />

Tivoli Provisioning Manager Express for Software Distribution Multiple SQL Injection<br />

Vulnerabilities<br />

<strong>PVS</strong> ID: 6398 FAMILY: CGI RISK: HIGH NESSUS ID:58529<br />

Description: Synopsis :\n\nThe remote web application is affected by multiple SQL injection<br />

vulnerabilities.\n\nThe remote web server hosts Tivoli Provisioning Manager Express for<br />

Software Distribution, a web-based application for distributing software. For your<br />

information, the observed version of Tivoli Provisioning Manager Express for Software<br />

Distribution is:\n %L\n\nTivoli Provisioning Manager Express for Software Distribution<br />

fails to properly sanitize user supplied input to the following servlets :\n\n -<br />

Printer.getPrinterAgentKey() in the SoapServlet servlet\n\n - User.updateUserValue() in<br />

the register.do servlet\n\n - User.isExistingUser() in the logon.do servlet\n\n -<br />

Asset.getHWKey() in the CallHomeExec servlet\n\n - Asset.getMimeType() in the<br />

getAttachment servlet\n\nAn unauthenticated, remote attacker, can leverage these issues to<br />

manipulate database queries, leading to disclosure of sensitive information, attacks against<br />

the underlying database, and the like.<br />

Solution: There is no replacement for Tivoli Provisioning Manager Express for Software<br />

Distribution. IBM recommends installing Tivoli Endpoint Manager for Lifecycle<br />

Management v8.1.<br />

CVE-2012-0199<br />

Opera < 11.62 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6399 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1748


Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running the Opera web browser. For your<br />

information, the observed version of Opera is : \n %L \n\nVersions of Opera earlier than<br />

11.62 are potentially affected by multiple vulnerabilities :\n\n - Small windows can be used<br />

to trick users in to executing downloads. (Issue 1010)\n\n - Overlapping content can trick<br />

users into executing downloads. (Issue 1011)\n\n - History.state can leak the state data from<br />

cross domain pages. (Issue 1012)\n\n - Web page dialogs can be used to display the wrong<br />

address in the address field. (Issue 1013)\n\n - Carefully timed reloads and redirects can<br />

spoof the address field. (Issue 1014)<br />

Solution: Upgrade to Opera 11.62 or later.<br />

CVE Not available<br />

OpenSSL 0.9.8 < 0.9.8u / 1.0.0 < 1.0.0h Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6400 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:58565<br />

Description: Synopsis :\n\nThe remote web server is affected by multiple vulnerabilities.\n\nFor your<br />

information, the observed version of OpenSSL is : \n %L \n\nOpenSSL versions earlier<br />

than 0.9.8u and 1.0.0h are potentially affected by multiple vulnerabilities :\n\n - A NULL<br />

pointer dereference flaw exists in mime_param_cmp. A specially crafted S/MIME input<br />

header could cause an application to crash during S/MIME message verification or<br />

decryption. (CVE-2012-1165)\n\n - A weakness in the OpenSSL CMS and PKCS 7 code<br />

can be exploited using Bleichenbacher's attack on PKCS 1 v1.5 RSA padding. Note that<br />

only users of CMS, PKCS 7, or S/MIME decryption operations are affected.<br />

Solution: Upgrade to OpenSSL 0.9.8u, 1.0.0h, or later.<br />

CVE-2012-1165<br />

Apache Traffic Server < 3.0.4 / 3.1.3 Buffer Overflow Vulnerability<br />

<strong>PVS</strong> ID: 6401 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote caching server is affected by a heap-based buffer overflow<br />

vulnerability.\n\nApache Traffic Server, an open source caching server, is installed on the<br />

remote host. For your information, the observed version of Apache Traffic Server installed<br />

on the remote host is :\n %L \n\n Versions of Apache Traffic Server earlier than 3.0.4 or<br />

3.1.x earlier than 3.1.3 are potentially affected by a heap-based buffer overflow<br />

vulnerability when handling malicious HTTP host headers. By exploiting this flaw, a<br />

remote, unauthenticated attacker could execute arbitrary code on the remote host subject to<br />

the privileges of the user running the affected service.<br />

Solution: Upgrade to Apache Traffic Server 3.0.4, 3.1.3, or later.<br />

CVE-2012-0256<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Google Chrome < 18.0.1025.142 Multiple Vulnerabilities<br />

Family Internet Services 1749


<strong>PVS</strong> ID: 6402 FAMILY: Web Clients RISK: HIGH NESSUS ID:58536<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Google Chrome is :\n %L<br />

\n\nVersions of Google Chrome earlier than 18.0.1025.142 are potentially affected by the<br />

following vulnerabilities :\n\n - An error exists in the v8 JavaScript engine that can allow<br />

invalid reads. (CVE-2011-3057)\n\n - An unspecified error exists related to bad interaction<br />

and 'EUC-JP'. This can lead to cross-site scripting attacks. (CVE-2011-3058)\n\n -<br />

Out-of-bounds read errors exist related to SVG text handling and text fragment handling.<br />

(CVE-2011-3059, CVE-2011-3060)\n\n - A certificate checking error exists related to the<br />

SPDY protocol. (CVE-2011-3061)\n\n - An off-by-one error exists in the 'OpenType<br />

Sanitizer'. (CVE-2011-3062)\n\n - Navigation requests from the renderer are not validated<br />

carefully enough. (CVE-2011-3063)\n\n - A use-after-free error exists related to SVG<br />

clipping. (CVE-2011-3064)\n\n - An unspecified memory corruption error exists related to<br />

'Skia'. (CVE-2011-3065)\n\n - The bundled version of Adobe Flash Player contains errors<br />

related to ActiveX and the NetStream class. These errors can allow memory corruption,<br />

denial of service via application crashes and possibly code execution. (CVE-2012-0772,<br />

CVE-2012-0773)<br />

Solution: Upgrade to Google Chrome 18.0.1025.142 or later.<br />

CVE-2012-0773<br />

Google Chrome < 18.0.1025.151 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6403 FAMILY: Web Clients RISK: HIGH NESSUS ID:58644<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Google Chrome is :\n %L<br />

\n\nVersions of Google Chrome earlier than 18.0.1025.151 are potentially affected by the<br />

following vulnerabilities :\n\n - An out-of-bounds read issue exists related to 'Skia'<br />

clipping. (CVE-2011-3066)\n\n - An error exists related to cross-origin iframe replacement.<br />

(CVE-2011-3067)\n\n - Use-after-free errors exist related to 'run-in' handling, line box<br />

editing, v8 JavaScript engine bindings, 'HTMLMediaElemet', SVG resource handling,<br />

media handling, style command application, and focus handling. (CVE-2011-3068,<br />

CVE-2011-3069, CVE-2011-3070, CVE-2011-3071, CVE-2011-3073, CVE-2011-3074,<br />

CVE-2011-3075, CVE-2011-3076)\n\n - A cross-origin violation error exists related to<br />

pop-up windows. (CVE-2011-3072)\n\n - A read-after-free error exists related to script<br />

binding. (CVE-2011-3077)\\n - The bundled Adobe Flash Player is vulnerable to several<br />

memory corruption issues that can lead to arbitrary code execution. (CVE-2012-0724,<br />

CVE-2012-0725)<br />

Solution: Upgrade to Google Chrome 18.0.1025.151 or later.<br />

CVE-2012-0725<br />

ashleymadison.com Access Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6404 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1750


Description: The remote host has registered to an online dating site ashleymadison.com. Ensure this<br />

activity does not violate company policy.<br />

Solution: Ensure that this activity does not violate company policy.<br />

CVE Not available<br />

ashleymadison.com Access Detection<br />

<strong>PVS</strong> ID: 6405 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host has successfully logged into an online dating site ashleymadison.com.<br />

Ensure this activity does not violate company policy.<br />

Solution: Ensure that this activity does not violate company policy.<br />

CVE Not available<br />

chemistry.com Access Detection<br />

<strong>PVS</strong> ID: 6406 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host has registered to an online the dating site chemistry.com. Ensure this<br />

activity does not violate company policy. The following email address was used: %L.<br />

Solution: Ensure that this activity does not violate company policy.<br />

CVE Not available<br />

chemistry.com Access Detection<br />

<strong>PVS</strong> ID: 6407 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host has logged into an online the dating site chemistry.com. Ensure this<br />

activity does not violate company policy.<br />

Solution: Ensure that this activity does not violate company policy.<br />

CVE Not available<br />

craigslist.org Personals Section Access Detected<br />

<strong>PVS</strong> ID: 6408 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host has access craigslist.org personals section. Ensure this activity does not<br />

violate company policy.<br />

Solution: Ensure that this activity does not violate company policy.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1751


craigslist.org Personals Access Detection<br />

<strong>PVS</strong> ID: 6409 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host has access craigslist.org personals section and performed a search. Ensure<br />

this activity does not violate company policy.<br />

Solution: Ensure that this activity does not violate company policy.<br />

CVE Not available<br />

lavalife.com Access Detection<br />

<strong>PVS</strong> ID: 6410 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host has browsed to an online the dating site lavalife.com. Ensure this activity<br />

does not violate company policy. The following email address was used: %L.<br />

Solution: Ensure that this activity does not violate company policy.<br />

CVE Not available<br />

lavalife.com Access Detection<br />

<strong>PVS</strong> ID: 6411 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host has successfully logged into an online dating site lavalife.com. Ensure this<br />

activity does not violate company policy. The following email address was used: %P.<br />

Solution: Ensure that this activity does not violate company policy.<br />

CVE Not available<br />

eharmony.com Access Detection<br />

<strong>PVS</strong> ID: 6412 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host has attempted to login into the dating site eharmony.com. Ensure this<br />

activity does not violate company policy.<br />

Solution: Ensure that this activity does not violate company policy.<br />

CVE Not available<br />

eharmony.com Access Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6413 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host has successfully login into the dating site eharmony.com. Ensure this<br />

activity does not violate company policy.<br />

Family Internet Services 1752


Solution: Ensure that this activity does not violate company policy.<br />

CVE Not available<br />

eharmony.com Access Detection<br />

<strong>PVS</strong> ID: 6414 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host has successfully login into the dating site eharmony.com. Ensure this<br />

activity does not violate company policy. The following username was detected: %L.<br />

Solution: Ensure that this activity does not violate company policy.<br />

CVE Not available<br />

Facebook Game - 21 Questions Detected<br />

<strong>PVS</strong> ID: 6415 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the 21 questions application on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Barn Buddy Detected<br />

<strong>PVS</strong> ID: 6416 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Barn Buddy game on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Bayou Blast Detected<br />

<strong>PVS</strong> ID: 6417 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Bayou Blast game on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Best Casino Detected<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6418 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1753


Description: The remote host is accessing the Best Casino - Free Slots, Bingo, Poker & Blackjack game<br />

on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Crime City Detected<br />

<strong>PVS</strong> ID: 6419 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Crime City game on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Family Feud Detected<br />

<strong>PVS</strong> ID: 6420 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Family Feud game on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Farkle Detected<br />

<strong>PVS</strong> ID: 6421 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Farkle game on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Fruit Ninja Frenzy Detected<br />

<strong>PVS</strong> ID: 6422 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Fruit Ninja Frenzy game on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Happy Aquarium Detected<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6423 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1754


Description: The remote host is accessing the Happy Aquarium game on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Happy Pets Detected<br />

<strong>PVS</strong> ID: 6424 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Happy Pets game on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Icy Tower Detected<br />

<strong>PVS</strong> ID: 6425 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Icy Tower game on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - JackpotJoy Slot Machines Detected<br />

<strong>PVS</strong> ID: 6426 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the JackpotJoy Slot Machines game on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Mesmo Games Detected<br />

<strong>PVS</strong> ID: 6427 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Mesmo Games application on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Mindjolt Detected<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6428 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1755


Description: The remote host is accessing the Mindjolt game on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Monster Galaxy Detected<br />

<strong>PVS</strong> ID: 6429 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Monster Galaxy game on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - My Shops Detected<br />

<strong>PVS</strong> ID: 6430 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the My Shops game on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Okey Detected<br />

<strong>PVS</strong> ID: 6431 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Okey game on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Restaurant City Detected<br />

<strong>PVS</strong> ID: 6432 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Restaurant City game on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Scrabble Detected<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6433 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1756


Description: The remote host is accessing the Scrabble game on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - The Smurfs & Co Detected<br />

<strong>PVS</strong> ID: 6434 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the The Smurfs & Co game on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Stardoll Detected<br />

<strong>PVS</strong> ID: 6435 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Stardoll game on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Sultan Bubble Detected<br />

<strong>PVS</strong> ID: 6436 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Sultan Bubble game on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Turkiye Texas Poker Detected<br />

<strong>PVS</strong> ID: 6437 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Turkiye Texas Poker game on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - TubeHero Detected<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6438 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1757


Description: The remote host is accessing the TubeHero game on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Poker Texas Hold'em Boyaa Viet Nam Detected<br />

<strong>PVS</strong> ID: 6439 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Poker Texas Hold'em Boyaa Viet Nam game on<br />

Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Miscrits of Volcano Island Detected<br />

<strong>PVS</strong> ID: 6440 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Miscrits of Volcano Island game on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - War Commander Detected<br />

<strong>PVS</strong> ID: 6441 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the War Commander game on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Facebook Game - Zynga Slingo Detected<br />

<strong>PVS</strong> ID: 6442 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Zynga Slingo application on Facebook.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Samba 3.x < 3.6.4 / 3.5.14 / 3.4.16 RPC Multiple Buffer Overflows<br />

<strong>PVS</strong> ID: 6443 FAMILY: Samba RISK: HIGH NESSUS ID:58662<br />

Family Internet Services 1758


Description: Synopsis :\n\nThe remote Samba server is affected multiple buffer overflow<br />

vulnerabilities.\n\nFor your information, the observed version of Samba is :\n %L<br />

\n\nAccording to its banner, the version of Samba 3.x running on the remote host is earlier<br />

than 3.6.4 / 3.5.14 / 3.4.16. It is, therefore, affected by multiple heap-based buffer overflow<br />

vulnerabilities.\n\nAn error in the DCE/RPC IDL (PIDL) compiler causes the RPC<br />

handling code it generates to contain multiple heap-based buffer overflow vulnerabilities.<br />

This generated code can allow a remote, unauthenticated attacker to use malicious RPC<br />

calls to crash the application and possibly execute arbitrary code as the root user.<br />

Solution: Either install the appropriate patch referenced in the project's advisory or upgrade to 3.4.16,<br />

3.5.14, 3.6.4, or later.<br />

CVE-2012-1182<br />

RealWin Management Server Detection (SCADA)<br />

<strong>PVS</strong> ID: 6444 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is running the RealWin Management Server. This software server is<br />

used to manage a wide range of SCADA devices. A client has just attempted a<br />

INFOTAG/SET_CONTROL command.<br />

Solution: N/A<br />

CVE Not available<br />

ClearSCADA Management Server Detection (SCADA)<br />

<strong>PVS</strong> ID: 6445 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is running the ClearSCADA Management Server. This software server is<br />

used to manage a wide range of SCADA devices. The <strong>PVS</strong> has just observed a client<br />

connection to this server.<br />

Solution: N/A<br />

CVE Not available<br />

Wonderware Management Server Detection (SCADA)<br />

<strong>PVS</strong> ID: 6446 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is running the Wonderware Management Server. This software server is<br />

used to manage a wide range of SCADA devices. The <strong>PVS</strong> has just observed a client<br />

connection to this server.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1759


RealWin Management Server Detection (SCADA)<br />

<strong>PVS</strong> ID: 6447 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is running the RealWin Management Server. This software server is<br />

used to manage a wide range of SCADA devices. A client has just sent a request which<br />

may cause an overflow in the HMI service.<br />

Solution: N/A<br />

CVE Not available<br />

RealWin Management Server Detection (SCADA)<br />

<strong>PVS</strong> ID: 6448 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is running the RealWin Management Server. This software server is<br />

used to manage a wide range of SCADA devices. A client has just sent a request which<br />

may cause an overflow in the HMI service.<br />

Solution: N/A<br />

CVE Not available<br />

RealWin Management Server Detection (SCADA)<br />

<strong>PVS</strong> ID: 6449 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is running the RealWin Management Server. This software server is<br />

used to manage a wide range of SCADA devices. A client has just sent a request which<br />

may cause an overflow in the HMI service.<br />

Solution: N/A<br />

CVE Not available<br />

7T Interactive Graphical SCADA System (IGSS) Server Detection (SCADA)<br />

<strong>PVS</strong> ID: 6450 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is running the 7T Interactive Graphical SCADA System(IGSS) Server.<br />

This software server is used to manage a wide range of SCADA devices. The <strong>PVS</strong> has just<br />

observed a client connection to this system.<br />

Solution: N/A<br />

TeamViewer Detection<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6451 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1760


Description: The remote host is running TeamViewer, an application for managing machines remotely.<br />

TeamViewer relies on the host computer (usually behind a firewall) initiating an outbound<br />

connection. Given this, TeamViewer can subvert firewall rules by allowing direct access to<br />

an internal machine from untrusted networks.<br />

Solution: Ensure that this application is authorized for your network<br />

TeamViewer Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 6452 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running TeamViewer, an application for managing machines remotely.<br />

TeamViewer relies on the host computer (usually behind a firewall) initiating an outbound<br />

connection. Given this, TeamViewer can subvert firewall rules by allowing direct access to<br />

an internal machine from untrusted networks.<br />

Solution: Ensure that this application is authorized for your network<br />

CVE Not available<br />

7T Interactive Graphical SCADA System (IGSS) Server Detection (SCADA)<br />

<strong>PVS</strong> ID: 6453 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is running the 7T Interactive Graphical SCADA System(IGSS) Server.<br />

This software server is used to manage a wide range of SCADA devices. The <strong>PVS</strong> has just<br />

observed a client connection to this system.<br />

Solution: N/A<br />

CVE Not available<br />

7T Interactive Graphical SCADA System (IGSS) Server Detection (SCADA)<br />

<strong>PVS</strong> ID: 6454 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is running the 7T Interactive Graphical SCADA System(IGSS) Server.<br />

This software server is used to manage a wide range of SCADA devices. The <strong>PVS</strong> has just<br />

observed a client connection to this system.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Real <strong>Network</strong>s RealPlayer < 14.0.6.666 (Build 12.0.1.666) Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6455 FAMILY: Web Clients RISK: HIGH NESSUS ID:55908<br />

Family Internet Services 1761


Description: The remote host is running an application that is vulnerable to multiple attack<br />

vectors.\n\nThe remote host is running RealPlayer, a multi-media application. For your<br />

information, the observed build of RealPlayer is:\n%L.\n\nRealPlayer builds earlier than<br />

12.0.1.666 are potentially affected by multiple code execution vulnerabilities :\n\n - A heap<br />

based buffer overflow vulnerability exits within qcpfformat.dll file, which only creates a<br />

static 256 byte allocation on the heap. This can be abused by a remote attacker to execute<br />

arbitrary code running in the context of the web browser. (CVE-2011-2950)\n\n - A flaw<br />

exists due to RealPlayer allowing users to run local HTML files with scripting enabled<br />

without any warning. Attackers can exploit this issue to execute arbitrary code within the<br />

context of the application(typically Internet Explorer) that uses the ActiveX control.<br />

(CVE-2011-2947)\n\n - A memory-corruption vulnerability exist due to an use-after-free<br />

condition that affects "Embedded AutoUpdate." Successful exploit will allow remote<br />

attackers to execute arbitrary code within the context of the affected application.<br />

(CVE-2011-2954)\n\n - A remote buffer-overflow vulnerability exists due to the software<br />

failing to perform adequate boundary-checks on user-supplied data. Successful exploit<br />

allow attackers to execute arbitrary code in the context of the vulnerable applications.<br />

(CVE-2011-2951)\n\n - A remote code-execution vulnerability exists when handling<br />

'DEFINEFONT' fields in Flash files. Successful exploit will allow remote attackers to<br />

execute arbitrary code within the context of the affected application. (CVE-2011-2948)\n\n<br />

- A remote code-execution vulnerability exist in the way the application uses<br />

'WideCharToMultiByte' call, resulting in a heap-based buffer overflow. Successful exploit<br />

will allow remote attackers to execute arbitrary code within the context of the affected<br />

application. (CVE-2011-2949)\n\n - A memory-corruption vulnerability exists due to an<br />

use-after-free condition, particularly affects the dialogue box. Successful exploit will allow<br />

remote attackers to execute arbitrary code within the context of the affected application.<br />

(CVE-2011-2952)\n\n\ - A memory-corruption vulnerability exists due to an use-after-free<br />

condition, particularly affects the Embedded Modal Dialog. Successful exploit will allow<br />

remote attackers to execute arbitrary code within the context of the affected application.<br />

(CVE-2011-2955)\n\n - A cross-zone scripting vulnerability exists due to the fact that the<br />

RealPlayer ActiveX control allows users to run local HTML files with scripting enabled<br />

without providing any warning. Attackers can exploit this issue to execute arbitrary code<br />

within the context of the application(typically Internet Explorer) that uses the ActiveX<br />

Control. (CVE-2011-121)\n<br />

Solution: Upgrade to RealPlayer 14.0.6 (Build 12.0.1.666) or later.<br />

CVE-2011-1221<br />

nginx < 1.0.10 DNS Resolver Remote Heap Buffer Overflow<br />

<strong>PVS</strong> ID: 6456 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis:\n\nThe remote web server is affected by a buffer-overflow vulnerability.\n\nThe<br />

remote host is running a nginx HTTP server. For your information, the observed version of<br />

nginx is:\n %L \n\nVersions earlier than 1.0.10 are vulnerable to a remote heap-based<br />

buffer-overflow vulnerability due to a failure to properly bounds check user-supplied input<br />

to the DNS resolver. The issue occurs specifically when the DNS resolver processes<br />

messages more than 255 bytes. Successfully exploiting this issue allows attackers to<br />

execute arbitrary code in the context of the application. (CVE-2011-4314)\n<br />

Family Internet Services 1762


Solution: Upgrade to nginx 1.0.10 or later.<br />

CVE-2011-4315<br />

nginx < 1.0.14 / 1.1.x < 1.1.17 Information-Disclosure<br />

<strong>PVS</strong> ID: 6457 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis:\n\nThe remote web server is affected by an information disclosure<br />

vulnerability.\n\nThe remote host is running a nginx HTTP server. For your information,<br />

the observed version of nginx is:\n %L \n\n Versions earlier than 1.0.14(stable version) or<br />

versions earlier than 1.1.17(development version) are vulnerable to an<br />

information-disclosure vulnerability, when handling specially crafted HTTP responses.<br />

Attackers can exploit this issue to disclose the content of the previously freed memory.<br />

(CVE-2012-1180)\n<br />

Solution: Upgrade to nginx 1.0.14(stable version) or 1.1.17(development version) or later.<br />

CVE-2012-1180<br />

nginx < 1.0.15 / 1.1.x < 1.1.19 Buffer-Overflow Vulnerability<br />

<strong>PVS</strong> ID: 6458 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis:\n\nThe remote web server is affected by a buffer-overflow vulnerability.\n\n The<br />

remote host is running a nginx HTTP server. For your information, the observed version of<br />

nginx is:\n %L \n\n Versions earlier than 1.0.15(stable version) or versions earlier than<br />

1.1.19(development version) are vulnerable to a buffer-overflow vulnerability because it<br />

fails to perform adequate checks on user-supplied input. An attacker can exploit this issue<br />

by using a specially-crafted mp4 file, allowing the attacker to execute arbitrary code in the<br />

context of the application. (CVE-2012-2089)\n<br />

Solution: Upgrade to nginx 1.0.15(stable version) or 1.1.19(development version) or later.<br />

TeamViewer Detection<br />

CVE-2012-2089<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6459 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running TeamViewer, an application for managing machines remotely.<br />

TeamViewer relies on the host computer (usually behind a firewall) initiating an outbound<br />

connection. Given this, TeamViewer can subvert firewall rules by allowing direct access to<br />

an internal machine from untrusted networks. The version of TeamViewer is %L<br />

Solution: Ensure that this application is authorized for your network<br />

Family Internet Services 1763


Skype Client Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 6460 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a Skype client.<br />

Solution: Ensure that the use of this application is in alignment with existing policies and guidelines.<br />

CVE Not available<br />

Facebook Game - Wooga Game Detection (Generic)<br />

<strong>PVS</strong> ID: 6461 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the following Wooga game on Facebook. %L<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

Rockwell Automation Service Detection<br />

<strong>PVS</strong> ID: 6462 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host has been identified as a Rockwell automation server. The server is running<br />

an RNA process on this port.<br />

realtime<br />

Solution: N/A<br />

CVE Not available<br />

Rockwell Automation Service Detection<br />

<strong>PVS</strong> ID: 6463 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host has been identified as a Rockwell automation server. The server is running<br />

an RNA process on this port.<br />

realtime<br />

Solution: N/A<br />

CVE Not available<br />

Rockwell Automation Service Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6464 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1764


Description: The remote host has been identified as a Rockwell automation server. The server is running<br />

an RNA process on this port.<br />

realtime<br />

Solution: N/A<br />

CVE Not available<br />

Rockwell Automation Service Detection<br />

<strong>PVS</strong> ID: 6465 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host has been identified as a Rockwell automation server. The server is running<br />

an RNA process on this port.<br />

realtime<br />

Solution: N/A<br />

CVE Not available<br />

Rockwell Automation Service Detection<br />

<strong>PVS</strong> ID: 6466 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host has been identified as a Rockwell automation server. The server is running<br />

an RNA process on this port.<br />

realtime<br />

Solution: N/A<br />

CVE Not available<br />

Rockwell Automation Service Detection<br />

<strong>PVS</strong> ID: 6467 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host has been identified as a Rockwell automation server. The server is running<br />

an RNA process on this port.<br />

realtime<br />

Solution: N/A<br />

CVE Not available<br />

Rockwell Automation Service Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6468 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1765


Description: The remote host has been identified as a Rockwell automation server. The server is running<br />

an RNA process on this port.<br />

realtime<br />

Solution: N/A<br />

CVE Not available<br />

Rockwell Automation Service Detection<br />

<strong>PVS</strong> ID: 6469 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host has been identified as a Rockwell automation server. The server is running<br />

an RNA process on this port.<br />

realtime<br />

Solution: N/A<br />

CVE Not available<br />

Rockwell Automation Service Detection<br />

<strong>PVS</strong> ID: 6470 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host has been identified as a Rockwell automation server. The server is running<br />

an RNA process on this port.<br />

realtime<br />

Solution: N/A<br />

CVE Not available<br />

Rockwell Automation Service Detection<br />

<strong>PVS</strong> ID: 6471 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host has been identified as a Rockwell automation server. The server is running<br />

an RNA process on this port.<br />

realtime<br />

Solution: N/A<br />

CVE Not available<br />

Rockwell Automation Service Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6472 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1766


Description: The remote host has been identified as a Rockwell automation server. The server is running<br />

an RNA process on this port.<br />

realtime<br />

Solution: N/A<br />

CVE Not available<br />

Rockwell Automation Service Detection<br />

<strong>PVS</strong> ID: 6473 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host has been identified as a Rockwell automation server. The server is running<br />

an RNA process on this port.<br />

realtime<br />

Solution: N/A<br />

VoIP Client Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 6474 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client has just connected to a VoIP server.<br />

realtimeonly<br />

Solution: Ensure that this sort of traffic is authorized with respect to existing policies and guidelines<br />

CVE Not available<br />

Polycom VoIP Client Detection<br />

<strong>PVS</strong> ID: 6475 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client has just connected to a VoIP server. The version of the Polycom<br />

client is %L<br />

Solution: Ensure that this sort of traffic is authorized with respect to existing policies and guidelines<br />

CVE Not available<br />

Policy - Usenet .nzb File Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6476 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1767


Description: The remote web server is hosting .nzb files. NZB files are used by USENET clients to<br />

download large files. As an example, consider the following file %P<br />

Solution: Ensure the use or hosting of NZB files are approved under corporate policy.<br />

CVE Not available<br />

Policy - Usenet .nzb Client File Detection<br />

<strong>PVS</strong> ID: 6477 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client has just downloaded the following .nzb file : ' %L '. NZB files are used<br />

for file sharing via Usenet, including pirated content such as movies or TV.<br />

Solution: Ensure the use or hosting of NZB files are approved under corporate policy.<br />

CVE Not available<br />

IBM Tivoli Directory Server Web Admin tool 6.1.0.x < 6.1.0.48 / 6.2.0.x < 6.2.0.22 / 6.3.0.x < 6.3.0.11<br />

Cross-Site Scripting Vulnerability<br />

<strong>PVS</strong> ID: 6478 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis:\n\nThe remote server is prone to a cross-site scripting vulnerability.\n\nThe<br />

remote host is running the IBM Tivoli Directory Server Web Admin tool. For your<br />

information, the observed version of the tool is:\n %L \n\n Versions earlier than 6.1.0.48<br />

(Web Admin Version 4.0027), 6.2.0.22 (Web Admin Version 5.0015) or versions earlier<br />

than 6.3.0.11 (Web Admin Version 6.0006) are vulnerable to a cross-site scripting attack.<br />

The application fails to sanitize user-supplied input submitted to the Web Admin Tool.<br />

Attackers can exploit this issue to execute an arbitrary script in the context of the<br />

browser.\n<br />

Solution: Upgrade to Tivoli Directory Server 6.1.0.48 (Web Admin Version 4.0027), 6.2.0.22 (Web<br />

Admin version 5.0015), 6.3.0.11 (Web Admin version 6.0006) or later.<br />

CVE-2012-0740<br />

HTTP Server Insecure Authentication (Basic)<br />

<strong>PVS</strong> ID: 6479 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server accepts 'Basic' credentials. This means that the userID and password<br />

of users is passed in base64 encoding. Such encoding is not encrypted but merely base64<br />

obfuscated. It is trivial for a passive listener to obtain the credentials.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1768


Epiphany Browser Version Detection<br />

<strong>PVS</strong> ID: 6480 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Epiphany browser version: %L<br />

Solution: N/A<br />

CVE Not available<br />

Apple iOS 3.0 through 5.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6481 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is an iPhone, iPod Touch, or iPad running iOS. For your information, the observed version<br />

of iOS is : \n %L \n\nVersions of iOS 3.0 through 5.1 are potentially affected by multiple<br />

vulnerabilities. iOS 5.1.1 contains security fixes for the following products :\n\n - Safari\n\n<br />

- WebKit<br />

Solution: Upgrade to iOS 5.1.1 or later.<br />

CVE-2012-0672<br />

Mac OS X 10.7 < 10.7.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6482 FAMILY: Generic RISK: HIGH NESSUS ID:59066<br />

Description: Synopsis :\n\nThe remote host is missing a Mac OS X update that fixes a security<br />

issue.\n\nFor your information, the observed version of Mac OS X is : \n %L \n\nThe<br />

remote host is running a version of Mac OS X 10.7 that is older than version 10.7.4. The<br />

newer version contains numerous security-related fixes for the following components :\n\n<br />

- Login Windows\n - Bluetooth\n - curl\n - HFS\n - Kernel\n - libarchive\n - libsecurity\n -<br />

libxml\n - LoginUIFramework\n - PHP\n - Quartz Composer\n - QuickTime\n - Ruby\n -<br />

<strong>Security</strong> Framework\n - Time Machine\n - X11\nIAVB Reference : 2012-B-0006\nSTIG<br />

Finding Severity : Category I<br />

Solution: Upgrade to Mac OS X 10.7.4 or later.<br />

CVE-2012-0830<br />

Safari < 5.1.7 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6483 FAMILY: Web Clients RISK: HIGH NESSUS ID:59069<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nThe remote host has Safari installed. For your information, the observed version<br />

of Safari is: \n %L \n\nVersions of Safari earlier than 5.1.7 are reportedly affected by<br />

several issues :\n\n - Two unspecified errors that can allow malicious sites to perform<br />

cross-site scripting attacks. (CVE-2011-3046, CVE-2011-3056)\n\n - An unspecified<br />

memory corruption error exists that can allows malicious sites to crash the application or<br />

Family Internet Services 1769


potentially execute arbitrary code. (CVE-2012-0672)\n\n - A state-tracking issue exists that<br />

can allow malicious sites to populate HTML form values of other sites with arbitrary data.<br />

(CVE-2012-0676)\n<br />

Solution: Upgrade to Safari 5.1.7 or later.<br />

CVE-2012-0676<br />

Dropbox Software Detection<br />

<strong>PVS</strong> ID: 6484 FAMILY: Internet Services RISK: INFO NESSUS ID:35717<br />

Description: Dropbox is installed on the remote host. Dropbox is an application for storing and<br />

synchronizing files between computers, possibly outside the organization.<br />

Solution: Remove this software if its use does not match your organization's security policy.<br />

CVE Not available<br />

iTunes AppleTV client Detection<br />

<strong>PVS</strong> ID: 6485 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is running the iTunes AppleTV application version : %L<br />

Solution: Remove this software if its use does not match your organization's security policy.<br />

CVE Not available<br />

Apple Hardware Detection<br />

<strong>PVS</strong> ID: 6486 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running an Apple device version: %L.<br />

Solution: Ensure that this hardware is authorized for your network<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Google Chrome < 19.0.1084.46 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6487 FAMILY: Web Clients RISK: HIGH NESSUS ID:59117<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Google Chrome is :\n %L<br />

\n\nVersions of Google Chrome earlier than 19.0.1084.46 are potentially affected by the<br />

following vulnerabilities :\n\n - Video content with FTP can cause crashes.<br />

(CVE-2011-3083)\n\n - Internal links are not loaded in their own process.<br />

(CVE-2011-3084)\n\n - Lenghty auto-filled values can corrupt the user interface.<br />

(CVE-2011-3085)\n\n - User-after free errors exist related to style elements, table handling,<br />

indexed DBs, GTK 'omnibox' handling, and corrupt font enconding names related to PDF<br />

Family Internet Services 1770


handling. (CVE-2011-3086, CVE-2011-3089, CVE-2011-3091, CVE-2011-3096,<br />

CVE-2011-3099)\n\n - An error exists related to windows navigation.<br />

(CVE-2011-3087)\n\n - Out-of-bounds read errors exist to hairline drawing, glyph<br />

handling, Tibetan, OGG containers, PDF sampled functions and drawing dash paths.<br />

(CVE-2011-3088, CVE-2011-3093, CVE-2011-3094, CVE-2011-3095, CVE-2011-3097,<br />

CVE-2011-3100)\n\n - A race condition related to workers exists. (CVE-2011-3090)\n\n -<br />

An invalid write exists in the v8 regex processing. (CVE-2011-3092)\n\n - An error exists<br />

related to Windows Media Player plugin and the search path. (CVE-2011-3098)\n\n - An<br />

off-by-one out-of-bounds write error exists in libxml. (CVE-2011-3098)<br />

Solution: Upgrade to Google Chrome 19.0.1084.46 or later.<br />

CVE-2011-3102<br />

Real <strong>Network</strong>s RealPlayer < 15.0.4.53 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6488 FAMILY: Web Clients RISK: HIGH NESSUS ID:59173<br />

Description: Synopsis :\n\nThe remote host is running an application that is vulnerable to multiple attack<br />

vectors.\n\nThe remote host is running RealPlayer, a multi-media application. For your<br />

information, the observed build of RealPlayer is:\n%L.\n\nRealPlayer builds earlier than<br />

15.0.4.53 are potentially affected by multiple vulnerabilities :\n\n - A memory corruption<br />

error exists related to the handling of 'MP4' files. (CVE-2012-1904)\n\n - An unspecified<br />

error exists related to the parsing of 'RealMedia ASMRuleBook' files that can lead to<br />

remote arbitrary code execution. (CVE-2012-2406)\n\n - A buffer overflow exists related to<br />

the parsing of 'RealJukebox Media' content. (CVE-2012-2411)\n<br />

Solution: Upgrade to RealPlayer 15.0.4.53 or later.<br />

CVE-2012-2411<br />

QuickTime < 7.7.2 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6489 FAMILY: Web Clients RISK: HIGH NESSUS ID:59113<br />

Description: Synopsis :\n\nThe remote host contains an application that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of QuickTime is %L.\n\nVersions<br />

of QuickTime earlier thanolder than 7.7.2 are affected by the following vulnerabilities :\n\n<br />

- An uninitialized memory access issue exists in the handling of MP4 encoded files.<br />

(CVE-2011-3458)\n\n - An off-by-one buffer overflow exists in the handling of rdrf atoms<br />

in QuickTime movie files. (CVE-2011-3459)\n\n - A stack buffer overflow exists in the<br />

QuickTime plugin's handling of PNG files. (CVE-2011-3460)\n\n - A stack buffer overflow<br />

exists in QuickTime's handling of file paths. (CVE-2012-0265)\n\n - A buffer overflow<br />

exists in the handling of audio sample tables. (CVE-2012-0658)\n\n - An integer overflow<br />

exists in the handling of MPEG files. (CVE-2012-0659)\n\n - An integer underflow exists<br />

in QuickTime's handling of audio streams in MPEG files. (CVE-2012-0660)\n\n - A<br />

use-after-free issue exists in the handling of JPEG2000 encoded movie files.<br />

(CVE-2012-0661)\n\n - Multiple stack overflows exist in QuickTime's handling of TeXML<br />

files. (CVE-2012-0663)\n\n - A heap overflow exists in QuickTime's handling of text<br />

tracks. (CVE-2012-0664)\n\n - A heap overflow exists in the handling of H.264 encoded<br />

Family Internet Services 1771


movie files. (CVE-2012-0665)\n\n - A stack buffer overflow exists in the QuickTime<br />

plugin's handling of QTMovie objects. (CVE-2012-0666)\n\n - A signedness issue exists in<br />

the handling of QTVR movie files. (CVE-2012-0667)\n\n - A buffer overflow exists in<br />

QuickTime's handling of Sorenson encoded movie files. (CVE-2012-0669)\n\n - An integer<br />

overflow exists in QuickTime's handling of sean atoms. (CVE-2012-0670)\n\n - A memory<br />

corruption issue exists in the handling of .pict files. (CVE-2012-0671)<br />

Solution: Upgrade to QuickTime 7.7.2 or later.<br />

CVE-2012-0671<br />

Google Chrome < 19.0.1084.52 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6490 FAMILY: Web Clients RISK: HIGH NESSUS ID:59255<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Google Chrome is :\n %L<br />

\n\nVersions of Google Chrome earlier than 19.0.1084.52 are potentially affected by the<br />

following vulnerabilities :\n\n - An error exists in the v8 JavaScript engine that can cause<br />

application crashes during garbage collection. (CVE-2011-3103)\n\n - An out-of-bounds<br />

read error exists related to 'Skia'. (CVE-2011-3104)\n\n - Use-after-free errors exists related<br />

to 'first-letter handling', browser cache, and invalid encrypted PDFs. (CVE-2011-3105,<br />

CVE-2011-3108, CVE-2011-3112)\n\n - A memory corruption error exists related to<br />

websockets and SSL. (CVE-2011-3106)\n\n - An error exists related to plugin-in JavaScript<br />

bindings that can cause the application to crash. (CVE-2011-3107)\n\n - An out-of-bounds<br />

write error exists related to PDF processing. (CVE-2011-3110)\n\n - An invalid read error<br />

exists related to the v8 Java Script engine. (CVE-2011-3111)\n\n - An invalid cast error<br />

exists related to colorspace handling in PDF processing. (CVE-2011-3113)\n\n - A buffer<br />

overflow error exists related to PDF functions. (CVE-2011-3114)\n\n - A type corruption<br />

error exists related to the v8 JavaScript engine. (CVE-2011-3115)\n<br />

Solution: Upgrade to Google Chrome 19.0.1084.52 or later.<br />

CVE-2011-3115<br />

MySQL Server 5.5 < 5.5.22 Multiple Unspecified Vulnerabilities<br />

<strong>PVS</strong> ID: 6491 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:58661<br />

Description: Synopsis :\n\nThe remote database server is vulnerable to multiple attack vectors.\n\nFor<br />

your information, the observed version of MySQL Community Server is : \n %L<br />

\n\nVersions of MySQL Community Server 5.5 earlier than 5.5.22 are potentially affected<br />

by multiple unspecified vulnerabilities.<br />

Solution: Upgrade to MySQL Community Server 5.5.22 or later.<br />

Flame Worm Detection<br />

CVE-2012-1703<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1772


<strong>PVS</strong> ID: 6492 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is infected with a backdoor\n\nThe remote host appears to<br />

be infected with the Flame worm. This worm uses a multitude of exploit modules to gather<br />

information and exploit local machines.<br />

realtime<br />

Solution: The machine must be manually cleaned<br />

CVE Not available<br />

Game - Smurf's Village Detected<br />

<strong>PVS</strong> ID: 6493 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Smurf's Village game.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

PHP 5.3.x < 5.3.13 CGI Query String Code Execution<br />

<strong>PVS</strong> ID: 6494 FAMILY: Web Servers RISK: HIGH NESSUS ID:59088<br />

Description: Synopsis :\n\nThe remote web server uses a version of PHP that is affected by a code<br />

execution vulnerability.\n\nFor your information, the version of PHP installed on the<br />

remote host is :\n %L \n\nPHP versions earlier than 5.3.13 are affected by a code execution<br />

vulnerability.\n\n The fix for CVE-2012-1823 does not completely correct the CGI query<br />

vulnerability. Disclosure of PHP source code and code execution via query paramenters are<br />

still possible.\n\nNote that his vulnerability is exploitable only when PHP is used by<br />

CGI-based configurations. Apache with 'mod-php' is not an exploitable configuration.<br />

Solution: Upgrade to PHP version 5.3.13 or later.<br />

CVE-2012-2336<br />

PHP 5.3.x < 5.4.3 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6495 FAMILY: Web Servers RISK: HIGH NESSUS ID:58988<br />

Description: Synopsis :\n\nThe remote web server uses a version of PHP that is affected by a code<br />

execution vulnerability.\n\nFor your information, the version of PHP installed on the<br />

remote host is :\n %L \n\nPHP versions earlier than 5.4.3 are affected by the following<br />

vulnerabilities.\n\n - The fix for CVE-2012-1823 does not completely correct the CGI<br />

query parameter vulnerability. Disclosure of PHP source code and code execution via query<br />

paramenters are still possible. Note that his vulnerability is exploitable only when PHP is<br />

used by CGI-based configurations. Apache with 'mod-php' is not an exploitable<br />

configuration. (CVE-2012-2311, CVE-2012-2335, CVE-2012-2336)\n\n - An unspecified<br />

buffer overflow exists related to the function 'apache_request_headers'. (CVE-2012-2329)<br />

Family Internet Services 1773


Solution: Upgrade to PHP version 5.4.3 or later.<br />

CVE-2012-2336<br />

Mozilla SeaMonkey 2.x < 2.10 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6496 FAMILY: Web Clients RISK: HIGH NESSUS ID:59411<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

vulnerabilities.\n\nFor your information, the observed version of SeaMonkey is : \n %L<br />

\n\nVersions of SeaMonkey 2.x earlier than 2.10 are potentially affected by the following<br />

security issues :\n\n - An error exists in the ASN.1 decoder when handling zero length<br />

items that can lead to application crashes. (CVE-2012-0441)\n\n - Multiple memory<br />

corruption errors exist. (CVE-2012-1937, CVE-2012-1938)\n\n - Two heap-based buffer<br />

overflows and one heap-based use-after-free error exist and are potentially exploitable.<br />

(CVE-2012-1940, CVE-2012-1941, CVE-2012-1947)\n\n - Two arbitrary DLL load issues<br />

exist related to the application update and update service functionality. (CVE-2012-1942,<br />

CVE-2012-1943)\n\n - The inline-script blocking feature of the 'Content <strong>Security</strong> Policy'<br />

(CSP) does not properly block inline event handlers. This error allows remote attackers to<br />

more easily carry out cross-site scripting attacks. (CVE-2012-1944)\n\n - A use-after-free<br />

error exists related to replacing or inserting a node into a web document.<br />

(CVE-2012-1946)\n<br />

Solution: Upgrade to SeaMonkey 2.10 or later.<br />

CVE-2012-1947<br />

Mozilla Firefox 12.x < 12 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6497 FAMILY: Web Clients RISK: HIGH NESSUS ID:59407<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox 12.x are potentially affected by the following security issues :\n\n -<br />

An error exists in the ASN.1 decoder when handling zero length items that can lead to<br />

application crashes. (CVE-2012-0441)\n\n - Multiple memory corruption errors exist.<br />

(CVE-2012-1937, CVE-2012-1038)\n\n - Two heap-based buffer overflows and one<br />

heap-based use-after-free error exist and are potentially exploitable. (CVE-2012-1940,<br />

CVE-2012-1941, CVE-2012-1947)\n\n - Two arbitrary DLL load issues exist related to the<br />

application update and update service functionality. (CVE-2012-1942,<br />

CVE-2012-1943)\n\n - The inline-script blocking feature of the 'Content <strong>Security</strong> Policy'<br />

(CSP) does not properly block inline event handlers. This error allows remote attackers to<br />

more easily carry out cross-site scripting attacks. (CVE-2012-1944)\n\n - A use-after-free<br />

error exists related to replacing or inserting a node into a web document.<br />

(CVE-2012-1946)\n<br />

Solution: Upgrade to Firefox 13.0 or later.<br />

CVE-2012-1947<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1774


Mozilla Thunderbird 12.x < 12 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6498 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:59409<br />

Description: Synopsis :\n\nThe remote host has a mail client installed that is vulnerable to multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Thunderbird is : \n %L<br />

\n\nVersions of Thunderbird 12.x are potentially affected by the following security issues<br />

:\n\n - An error exists in the ASN.1 decoder when handling zero length items that can lead<br />

to application crashes. (CVE-2012-0441)\n\n - Multiple memory corruption errors exist.<br />

(CVE-2012-1937, CVE-2012-1038)\n\n - Two heap-based buffer overflows and one<br />

heap-based use-after-free error exist and are potentially exploitable. (CVE-2012-1940,<br />

CVE-2012-1941, CVE-2012-1947)\n\n - Two arbitrary DLL load issues exist related to the<br />

application update and update service functionality. (CVE-2012-1942,<br />

CVE-2012-1943)\n\n - The inline-script blocking feature of the 'Content <strong>Security</strong> Policy'<br />

(CSP) does not properly block inline event handlers. This error allows remote attackers to<br />

more easily carry out cross-site scripting attacks. (CVE-2012-1944)\n\n - A use-after-free<br />

error exists related to replacing or inserting a node into a web document.<br />

(CVE-2012-1946)\n<br />

Solution: Upgrade to Thunderbird 13.0 or later.<br />

CVE-2012-1947<br />

Roving Constant Contact E-mail Marketing Client Detection<br />

<strong>PVS</strong> ID: 6499 FAMILY: SMTP Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Roving Constant Contact E-mail client. Roving<br />

Constant Contact is a software which includes the capability to launch e-mail<br />

marketing campaigns.<br />

Solution: Ensure that such software is authorized for your network<br />

CVE Not available<br />

iTunes < 10.6.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6500 FAMILY: Web Clients RISK: HIGH NESSUS ID:59499<br />

Description: Synopsis :\n\nThe remote host contains a multimedia application that has multiple<br />

vulnerabilities.\n\nThe remote host has iTunes installed, a popular media player for<br />

Windows and Mac OS. For your information, the observed version of iTunes is:\n %L<br />

\n\nVersions of iTunes earlier than 10.6.3 are reportedly affected by the following<br />

issues:\n\n - A memory corruption issue exists in WebKit that can allow malicious websites<br />

to crash the application and possibly execute arbitrary code. (CVE-2012-0672)\n\n - A<br />

heap-based buffer overflow exists related to the handling of 'm3u' playlist files. This error<br />

can cause the application to crash or possibly allow arbitrary code execution.<br />

(CVE-2012-0677)\n<br />

Solution: Upgrade to iTunes 10.6.3 or later.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1775


CVE-2012-0677<br />

Facebook SocialCam Application Detection<br />

<strong>PVS</strong> ID: 6501 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Facebook client is utilizing the SocialCam application. SocialCam is an<br />

application that allows users to watch videos from their Facebook timeline.<br />

Solution: Ensure that such usage is in alignment with corporate policies and guidelines<br />

CVE Not available<br />

Real<strong>Network</strong>s Helix Server 14.x < 14.3.x Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6502 FAMILY: Generic RISK: HIGH NESSUS ID:58724<br />

Description: Synopsis :\n\nThe remote media streaming server is affected by multiple<br />

vulnerabilities.\n\nAccording to its banner, the remote host is running the following version<br />

of Real<strong>Network</strong>s Helix Server / Helix Mobile Server: %L\n. Such versions are potentially<br />

affected by multiple vulnerabilities.\n\n - Administrative and user credentials are insecurely<br />

stored in a flat file database. This file may be accessed by local users to disclose passwords<br />

stored in clear text. (CVE-2012-1923)\n\n - A buffer overflow exists in the code that parses<br />

authentication credentials. It may be possible for a remote attacker to exploit this issue and<br />

execute arbitrary code. (CVE-2012-0942)\n\n - Multiple unspecified cross-site scripting<br />

vulnerabilities. (CVE-2012-1984)\n\n - A specially crafted malfored URL can cause the<br />

server process to crash if opened by an administrator. (CVE-2012-1985)\n\n - Establishing<br />

and immediately closing a TCP connection on port 705 can cause the SNMP Master Agent<br />

to crash (CVE-2012-2267)\n\n - A specially crafted Open-PDU request sent to the SNMP<br />

Master Agent can cause it to crash due to an unhandled exception.<br />

(CVE-2012-2268)\nIAVB Reference : 2012-B-0043\nSTIG Finding Severity : Category I<br />

Solution: Upgrade to Real<strong>Network</strong>s Helix Server / Helix Mobile Server 14.3.x or later.<br />

CVE-2012-2268<br />

Facebook Viddy Application Detection<br />

<strong>PVS</strong> ID: 6503 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Facebook client is utilizing the Viddy application. Viddy is an application that<br />

allows users to watch videos from their Facebook timeline.<br />

Solution: Ensure that such usage is in alignment with corporate policies and guidelines<br />

CVE Not available<br />

Facebook Viddy Application Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6504 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1776


Description: The remote Facebook client is utilizing the Viddy application. Viddy is an application that<br />

allows users to watch videos from their facebook timeline. The video viewed was : %L<br />

realtimeonly<br />

Solution: Ensure that such usage is in alignment with corporate policies and guidelines<br />

CVE Not available<br />

Flash player version detection<br />

<strong>PVS</strong> ID: 6505 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Flash player version : %L<br />

Solution: N/A<br />

CVE Not available<br />

Adobe Media player version detection<br />

<strong>PVS</strong> ID: 6506 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Adobe Media player version : %L<br />

Solution: N/A<br />

CVE Not available<br />

Outlook Social Connector version detection<br />

<strong>PVS</strong> ID: 6507 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Outlook Social Connector version : %L . The Outlook Social<br />

Connector allows users to interact with social network feeds from within Outlook.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Google Chrome < 20.0.1132.43 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6508 FAMILY: Web Clients RISK: HIGH NESSUS ID:59735<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Google Chrome is :\n %L<br />

\n\nVersions of Google Chrome earlier than 20.0.1132.43 are potentially affected by the<br />

following vulnerabilities :\n\n - An unspecified error allows access to iFrame fragment ID<br />

information, (CVE-2012-2815)\n\n - An unspecified issue is triggered when sandboxed<br />

processes interfere with one another. (CVE-2012-2816)\n\n - A user-after free issue exists<br />

in handling table sections which may allow for execution of arbitrary code.<br />

Family Internet Services 1777


(CVE-2012-02817)\n\n - An unspecified use-after-free flaw exists in the counter layout<br />

which may allow for execution of arbitrary code. (CVE-2012-2818)\n\n - A flaw exists in<br />

the WebGL subsystem when the texSubImage2d implementation does not properly handle<br />

uploads to floating-point textures, which may allow a remote denial of service.<br />

(CVE-2012-2919)\n\n - An out-of-bounds read error occurs during the handling of SVG<br />

filters, which may allow a remote denial of service. (CVE-2012-2820)\n\n - A flaw exists<br />

in the autofill display. No further details have been provided. (CVE-2012-2821)\n\n - An<br />

out-of-bounds read error occurs during the handling of PDF files, which may allow<br />

multiple unspecified remote denial of service attacks. (CVE-2012-2822)\n\n - An<br />

user-after-free flaw exists during the handling of SVG resources, which may allow for<br />

execution of arbitrary code. (CVE-2012-2823, CVE-2012-2831)\n\n - An user-after-free<br />

flaw exists in SVG painting. No further details have been provided. (CVE-2012-2824)\n\n -<br />

An out-of-bounds read error occurs during texture conversion which may allow a remote<br />

denial of service. (CVE-2012-2826)\n\n - An use-after-free flaw in the Mac GUI. No<br />

further details have been provided. (CVE-2012-2827)\n\n - A flaw exists in improper<br />

sanitizing of user-supplied inputting resulting in multiple unspecified integer overflows<br />

with a specially crafted PDF file. (CVE-2012-2828)\n\n - An user-after-free flaw is<br />

triggered during handling of first letters. No further details have been provided.<br />

(CVE-2012-2829)\n\n - A flaw is triggered when an unspecified NULL pointer dereference<br />

occurs in array setting handling. (CVE-2012-2830)\n\n - A flaw is triggered when a NULL<br />

pointer dereference occurs in a PDF image codec. (CVE-2012-2832)\n\n - An overflow<br />

condition occurs when the PDF JS API fails to properly sanitize user-supplied input<br />

resulting in a buffer overflow. (CVE-2012-2833)\n\n - An overflow condition occurs in the<br />

Matroska container which fails to properly sanitize user-supplied input resulting in an<br />

integer overflow. (CVE-2012-2834)\n\n - A flaw exists in the way it loads<br />

dynamic-link-libraries (DLL). (CVE-2012-2764)\n\n - A flaw is triggered when an<br />

unspecified wild read occurs during the handling of XSL. (CVE-2012-2825)\n\n - This<br />

issue is only present on 64-bit Linux platforms. The libxml is prone to multiple unspecified<br />

overflow conditions. (CVE-2012-2807)<br />

Solution: Upgrade to Google Chrome 20.0.1132.43 or later.<br />

FW/Proxy detection<br />

CVE-2012-2807<br />

<strong>PVS</strong> ID: 6509 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Firewall or Proxy device<br />

Solution: N/A<br />

CVE Not available<br />

Asterisk Remote Crash Vulnerability in Skinny Channel Driver (AST-2012-009)<br />

<strong>PVS</strong> ID: 6510 FAMILY: Generic<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:59714<br />

Family Internet Services 1778


Description: Synopsis :\n\nThe remote VoIP server is affected by a denial of service attack.\n\nFor your<br />

information, the observed version of Asterisk is : \n %L \n\nAccording to the version in its<br />

SIP banner, the version of Asterisk running on the remote host is potentially affected by a<br />

vulnerability that could allow a remote attacker to crash the server. This issue may be<br />

exploited when the attacker has a valid SCCP (Skinny) ID and closes a connection when in<br />

certain call states. A null pointer is left behind and can cause the server to crash when the<br />

pointer is later dereferenced.<br />

Solution: Upgrade to Asterisk 10.5.1 or apply the patches listed in the Asterisk advisory<br />

CVE-2012-3553<br />

Asterisk Remote Crash Vulnerability in voice mail application (AST-2012-011)<br />

<strong>PVS</strong> ID: 6511 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:60065<br />

Description: Synopsis :\n\nThe remote VoIP server is affected by a denial of service attack.\n\nFor your<br />

information, the observed version of Asterisk is : \n %L \n\nAccording to the version in its<br />

SIP banner, the version of Asterisk running on the remote host is potentially affected by a<br />

vulnerability that could allow a remote attacker to crash the server. If a single voicemail<br />

account is manipulated by two parties simultaneously, a condition can occur where memory<br />

is freed twice causing a crash.<br />

Solution: Upgrade to Asterisk 1.8.13.1 / 10.5.2<br />

CVE-2012-3812<br />

Google Chrome < 20.0.1132.57 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6512 FAMILY: Web Clients RISK: HIGH NESSUS ID:59958<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Google Chrome is :\n %L<br />

\n\nVersions of Google Chrome earlier than 20.0.1132.57 are potentially affected by the<br />

following vulnerabilities :\n\n - Use-after-free errors exist related to counter handling and<br />

layout height tracking. (CVE-2012-2842, CVE-2012-2843)\n\n - An error exists related to<br />

JavaScript object accesses in PDF handling. (CVE-2012-2844)\n<br />

Solution: Upgrade to Google Chrome 20.0.1132.57 or later.<br />

CVE-2012-2844<br />

Evernote Client Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6513 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Evernote client. Evernote is an application which allows<br />

users to sync files across multiple devices, interact with social media sites, and do a host of<br />

other things.<br />

Family Internet Services 1779


Solution: Ensure that such usage is in alignment with Corporate policy<br />

Java version detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 6514 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Java version : %L<br />

Solution: Ensure that you are running the latest version of Java<br />

CVE Not available<br />

MySQL Server 5.5 < 5.5.24 Multiple Unspecified Vulnerabilities<br />

<strong>PVS</strong> ID: 6515 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:61393<br />

Description: Synopsis :\n\nThe remote database server is vulnerable to multiple attack vectors.\n\nFor<br />

your information, the observed version of MySQL Community Server is : \n %L \n\nThe<br />

version of MySQL 5.5 installed on the remote host is earlier than 5.5.24 and is, therefore,<br />

affected by the following vulnerabilities :\n\n - Several errors exist related to 'GIS<br />

Extension', 'Server', 'InnoDB' and 'Server Optimizer' components that can allow denial of<br />

service attacks. (CVE-2012-0540, CVE-2012-1734, CVE-2012-1735, CVE-2012-1756,<br />

CVE-2012-1757)\n\n - A security bypass vulnerability exists that occurs due to improper<br />

casting during user login sessions. (Bug #64884 / CVE-2012-2122)\n\n - An error exists<br />

related to key length and sort order index that can lead to application crashes. (Bug #59387<br />

/ CVE-2012-2749)<br />

Solution: Upgrade to MySQL Community Server 5.5.24 later.<br />

CVE-2012-2749<br />

MySQL Server 5.5 < 5.5.23 Multiple Unspecified Vulnerabilities<br />

<strong>PVS</strong> ID: 6516 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:59967<br />

Description: Synopsis :\n\nThe remote database server is vulnerable to multiple attack vectors.\n\nFor<br />

your information, the observed version of MySQL Community Server is : \n %L \n\nThe<br />

version of MySQL 5.5 installed on the remote host is earlier than 5.5.23. As such, it is<br />

reportedly affected by an as yet unspecified vulnerability.<br />

Solution: Upgrade to MySQL Community Server 5.5.23 later.<br />

ActiveSync detection<br />

CVE-2012-2750<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1780


<strong>PVS</strong> ID: 6517 FAMILY: Mobile Devices RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Mobile ActiveSync client<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

VLC Media Player < 2.0.2 Ogg_DecodePacket Function OGG File Handling Overflow<br />

<strong>PVS</strong> ID: 6518 FAMILY: Web Clients RISK: HIGH NESSUS ID:60049<br />

Description: Synopsis :\n\nThe remote host contains an application that is vulnerable to a buffer<br />

overflow vulnerability\n\nThe remote host contains VLC player, a multi-media application.<br />

For your information, the observed version of VLC is : \n %L .\n\nVersions of VLC media<br />

player earlier than 2.0.2 are potentially affected by a heap-based buffer overflow<br />

vulnerability. An error exists in the function 'Ogg_DecodePacket' in the file<br />

'modules/demux/ogg.c' that does not properly validate input and can allow a heap-based<br />

buffer overflow. Opening a specially crafted file can result in the execution of arbitrary<br />

code. (CVE-2012-3377)<br />

Solution: Upgrade to VLC Media Player version 2.0.2 or later.<br />

CVE-2012-3377<br />

Mozilla Firefox 13.x < 13 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6519 FAMILY: Web Clients RISK: HIGH NESSUS ID:60043<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox 13.x are potentially affected by the following security issues :\n\n -<br />

Several memory safety issues exist, some of which could potentially allow arbitrary code<br />

execution. (CVE-2012-1948, CVE-2012-1949)\n\n - An error related to drag and drop can<br />

allow incorrect URLs to be displayed. (CVE-2012-1950)\n\n - Several memory safety<br />

issues exist related to the Gecko layout engine. (CVE-2012-1951, CVE-2012-1952,<br />

CVE-2012-1953, CVE-2012-1954)\n\n - An error related to JavaScript functions<br />

'history.forward' and 'history.back' can allow incorrect URLs to be displayed.<br />

(CVE-2012-1955)\n\n - Cross-site scripting attacks are possible due to an error related to<br />

the '' tag within an RSS '' element. (CVE-2012-1957)\n\n - A<br />

use-after-free error exists related to the method 'nsGlobalWindow::PageHidden'.<br />

(CVE-2012-1958)\n\n - An error exists that can allow 'same-compartment security<br />

wrappers' (SCSW) to be bypassed. (CVE-2012-1959)\n\n - An out-of-bounds read error<br />

exists related to the color management library (QCMS). (CVE-2012-1960)\n\n - The<br />

'X-Frames-Options' header is ignored if it is duplicated. (CVE-2012-1961)\n\n - A memory<br />

corruption error exists related to the method 'JSDependentString::undepend'.<br />

(CVE-2012-1962)\n\n - An error related to the 'Content <strong>Security</strong> Policy' (CSP)<br />

implementation can allow the disclosure of OAuth 2.0 access tokens and OpenID<br />

credentials. (CVE-2012-1963)\n\n - An error exists related to the 'feed:' URL that can allow<br />

Family Internet Services 1781


cross-site scripting attacks. (CVE-2012-1965)\n\n - Cross-site scripting attacks are possible<br />

due to an error related to the 'data:' URL and context menus. (CVE-2012-1966)\n\n - An<br />

error exists related to the 'javascript:' URL that can allow scripts to run at elevated<br />

privileges outside the sandbox. (CVE-2012-1967)<br />

Solution: Upgrade to Firefox 14.0 or later.<br />

CVE-2012-1967<br />

Mozilla Thunderbird 13.x < 13 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6520 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:60045<br />

Description: Synopsis :\n\nThe remote host has a mail client installed that is vulnerable to multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Thunderbird is : \n %L<br />

\n\nVersions of Thunderbird 13.x are potentially affected by the following security issues<br />

:\n\n - Several memory safety issues exist, some of which could potentially allow arbitrary<br />

code execution. (CVE-2012-1948, CVE-2012-1949)\n\n - Several memory safety issues<br />

exist related to the Gecko layout engine. (CVE-2012-1951, CVE-2012-1952,<br />

CVE-2012-1953, CVE-2012-1954)\n\n - An error related to JavaScript functions<br />

'history.forward' and 'history.back' can allow incorrect URLs to be displayed.<br />

(CVE-2012-1955)\n\n - Cross-site scripting attacks are possible due to an error related to<br />

the '' tag within an RSS '' element. (CVE-2012-1957)\n\n - A<br />

use-after-free error exists related to the method 'nsGlobalWindow::PageHidden'.<br />

(CVE-2012-1958)\n\n - An error exists that can allow 'same-compartment security<br />

wrappers' (SCSW) to be bypassed. (CVE-2012-1959)\n\n - An out-of-bounds read error<br />

exists related to the color management library (QCMS). (CVE-2012-1960)\n\n - The<br />

'X-Frames-Options' header is ignored if it is duplicated. (CVE-2012-1961)\n\n - A memory<br />

corruption error exists related to the method 'JSDependentString::undepend'.<br />

(CVE-2012-1962)\n\n - An error related to the 'Content <strong>Security</strong> Policy' (CSP)<br />

implementation can allow the disclosure of OAuth 2.0 access tokens and OpenID<br />

credentials. (CVE-2012-1963)\n\n - An error exists related to the 'javascript:' URL that can<br />

allow scripts to run at elevated privileges outside the sandbox. (CVE-2012-1967)<br />

Solution: Upgrade to Thunderbird 14.0 or later.<br />

CVE-2012-1967<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla SeaMonkey 2.x < 2.11 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6521 FAMILY: Web Clients RISK: HIGH NESSUS ID:60046<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

vulnerabilities.\n\nFor your information, the observed version of SeaMonkey is : \n %L<br />

\n\nVersions of SeaMonkey 2.x earlier than 2.11 are potentially affected by the following<br />

security issues :\n\n - Several memory safety issues exist, some of which could potentially<br />

allow arbitrary code execution. (CVE-2012-1948, CVE-2012-1949)\n\n - Several memory<br />

safety issues exist related to the Gecko layout engine. (CVE-2012-1951, CVE-2012-1952,<br />

CVE-2012-1953, CVE-2012-1954)\n\n - An error related to JavaScript functions<br />

'history.forward' and 'history.back' can allow incorrect URLs to be displayed.<br />

Family Internet Services 1782


(CVE-2012-1955)\n\n - Cross-site scripting attacks are possible due to an error related to<br />

the '' tag within an RSS '' element. (CVE-2012-1957)\n\n - A<br />

use-after-free error exists related to the method 'nsGlobalWindow::PageHidden'.<br />

(CVE-2012-1958)\n\n - An error exists that can allow 'same-compartment security<br />

wrappers' (SCSW) to be bypassed.(CVE-2012-1959)\n\n - An out-of-bounds read error<br />

exists related to the color management library (QCMS). (CVE-2012-1960)\n\n - The<br />

'X-Frames-Options' header is ignored if it is duplicated. (CVE-2012-1961)\n\n - A memory<br />

corruption error exists related to the method 'JSDependentString::undepend'.<br />

(CVE-2012-1962)\n\n - An error related to the 'Content <strong>Security</strong> Policy' (CSP)<br />

implementation can allow the disclosure of OAuth 2.0 access tokens and OpenID<br />

credentials. (CVE-2012-1963)\n\n - An error exists related to the certificate warning page<br />

that can allow 'clickjacking' thereby tricking a user into accepting unintended certificates.<br />

(CVE-2012-1964)\n\n - An error exists related to the 'javascript:' URL that can allow<br />

scripts to run at elevated privileges outside the sandbox. (CVE-2012-1967)<br />

Solution: Upgrade to SeaMonkey 2.11 or later.<br />

CVE-2012-1967<br />

Safari < 6.0 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6522 FAMILY: Web Clients RISK: HIGH NESSUS ID:60127<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nThe remote host has Safari installed. For your information, the observed version<br />

of Safari is: \n %L \n\nVersions of Safari earlier than 6.0 are reportedly affected by several<br />

issues :\n\n - An unspecified cross-site scripting issue exists. (CVE-2012-0678)\n\n - An<br />

error in the handling of 'feed://' URLs can allow local files to be disclosed to remote<br />

servers. (CVE-2012-0679)\n\n - Password input elements are auto completed even when a<br />

webpage specifically forbids it. (CVE-2012-0680)\n\n - A cross-site scripting issue exists<br />

due to improper handling of the HTTP 'Content-Disposition' header value of 'attachment'.<br />

(CVE-2011-3426)\n\n - Numerous issues exist in WebKit. (CVE-2011-2845,<br />

CVE-2011-3016, CVE-2011-3021, CVE-2011-3027, CVE-2011-3032, CVE-2011-3034,<br />

CVE-2011-3035, CVE-2011-3036, CVE-2011-3037, CVE-2011-3038, CVE-2011-3039,<br />

CVE-2011-3040, CVE-2011-3041, CVE-2011-3042, CVE-2011-3043, CVE-2011-3044,<br />

CVE-2011-3050, CVE-2011-3053, CVE-2011-3059, CVE-2011-3060, CVE-2011-3064,<br />

CVE-2011-3067, CVE-2011-3068, CVE-2011-3069, CVE-2011-3071, CVE-2011-3073,<br />

CVE-2011-3074, CVE-2011-3075, CVE-2011-3076, CVE-2011-3078, CVE-2011-3081,<br />

CVE-2011-3086, CVE-2011-3089, CVE-2011-3090, CVE-2011-3913, CVE-2011-3924,<br />

CVE-2011-3926, CVE-2011-3958, CVE-2011-3966, CVE-2011-3968, CVE-2011-3969,<br />

CVE-2011-3971, CVE-2012-0682, CVE-2012-0683, CVE-2012-1520, CVE-2012-1521,<br />

CVE-2012-2815, CVE-2012-3589, CVE-2012-3590, CVE-2012-3591, CVE-2012-3592,<br />

CVE-2012-3593, CVE-2012-3594, CVE-2012-3595, CVE-2012-3596, CVE-2012-3597,<br />

CVE-2012-3599, CVE-2012-3600, CVE-2012-3603, CVE-2012-3604, CVE-2012-3605,<br />

CVE-2012-3608, CVE-2012-3609, CVE-2012-3610, CVE-2012-3611, CVE-2012-3615,<br />

CVE-2012-3618, CVE-2012-3620, CVE-2012-3625, CVE-2012-3626, CVE-2012-3627,<br />

CVE-2012-3628, CVE-2012-3629, CVE-2012-3630, CVE-2012-3631, CVE-2012-3633,<br />

CVE-2012-3634, CVE-2012-3635, CVE-2012-3636, CVE-2012-3637, CVE-2012-3638,<br />

CVE-2012-3639, CVE-2012-3640, CVE-2012-3641, CVE-2012-3642, CVE-2012-3644,<br />

CVE-2012-3645, CVE-2012-3646, CVE-2012-3650, CVE-2012-3653, CVE-2012-3655,<br />

Family Internet Services 1783


CVE-2012-3656, CVE-2012-3661, CVE-2012-3663, CVE-2012-3664, CVE-2012-3665,<br />

CVE-2012-3666, CVE-2012-3667, CVE-2012-3668, CVE-2012-3669, CVE-2012-3670,<br />

CVE-2012-3674, CVE-2012-3678, CVE-2012-3679, CVE-2012-3680, CVE-2012-3681,<br />

CVE-2012-3682, CVE-2012-3683, CVE-2012-3686, CVE-2012-3689, CVE-2012-3690,<br />

CVE-2012-3691, CVE-2012-3693, CVE-2012-3694, CVE-2012-3695, CVE-2012-3696,<br />

CVE-2012-3697)<br />

Solution: Upgrade to Safari 6.0 or later.<br />

CVE-2012-3697<br />

Mac Software Update DNS Query Detection<br />

<strong>PVS</strong> ID: 6523 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote system was just observed making a DNS query for an apple.com update<br />

service. It is highly probable that this machine is running a Mac operating system.<br />

Solution: N/A<br />

CVE Not available<br />

ESPN ScoreCenterXL Detection iOS<br />

<strong>PVS</strong> ID: 6524 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the ESPN ScoreCenterXL application. The ESPN<br />

ScoreCenterXL application is used to get updates, news, and scores on various sports.<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

CVE Not available<br />

ESPN ScoreCenterXL Video Stream Detection iOS<br />

<strong>PVS</strong> ID: 6525 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the ESPN ScoreCenterXL application. The ESPN<br />

ScoreCenterXL application is used to get updates, news, and scores on various sports. The<br />

client has attempted to view a video using this application.<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

NBCOlympics application detection for Apple iPad - (accessed)<br />

<strong>PVS</strong> ID: 6526 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1784


Description: The remote host is running the NBCOlympics application for Apple iPad. The application<br />

is used to get updates and news. It also allows for viewing of videos and streaming of live<br />

events.<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

CVE Not available<br />

NBCOlympics application detection for Apple iPad.<br />

<strong>PVS</strong> ID: 6527 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the NBCOlympics application for Apple iPad. The application<br />

is used to get updates and news. It also allows for viewing of videos and streaming of live<br />

events.<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

CVE Not available<br />

Google Chrome < 21.0.1180.60 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6528 FAMILY: Web Clients RISK: HIGH NESSUS ID:61381<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Google Chrome is :\n %L<br />

\n\nVersions of Google Chrome earlier than 21.0.1180.60 are potentially affected by the<br />

following vulnerabilities :\n\n - Re-prompts are not displayed for excessive downloads.<br />

(CVE-2012-2847)\n\n - Drag and drop file access restrictions are not restrictive enough.<br />

(CVE-2012-2848)\n\n - An off-by-one read error exists related to GIF decoding.<br />

(CVE-2012-2849)\n\n - Various, unspecified errors exist related to PDF processing.<br />

(CVE-2012-2850)\n\n - Various, unspecified integer overflows exist related to PDF<br />

processing. (CVE-2012-2851)\n\n - A use-after-free error exists related to object linkage<br />

and PDF processing. (CVE-2012-2852)\n\n - An error exists related to 'webRequest' and<br />

'Chrome Web Store' interference. (CVE-2012-2853)\n\n - Pointer values can be leaked to<br />

'WebUI' renderers. (CVE-2012-2854)\n\n - An unspecified use-after-free error exists<br />

related to PDF processing. (CVE-2012-2855)\n\n - Unspecified out-of-bounds reads exist<br />

related to the PDF viewer. (CVE-2012-2856) - A use-after-free error exists related to CSS<br />

DOM processing. (CVE-2012-2857) - A buffer overflow exists related to 'WebP' decoding.<br />

(CVE-2012-2858)\n\n - An out-of-bounds access error exists related to the date picker.<br />

(CVE-2012-2860)<br />

Solution: Upgrade to Google Chrome 21.0.1180.60 or later.<br />

CVE-2012-2860<br />

nginx < 1.2.x / 1.3.x < 1.2.1 / 1.3.1 Vulnerabilities with Windows directory aliases<br />

<strong>PVS</strong> ID: 6529 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:61394<br />

Family Internet Services 1785


Description: Synopsis:\n\nThe remote web server is affected by an access restriction bypass<br />

vulnerability.\n\nThe remote host is running a nginx HTTP server. For your information,<br />

the observed version of nginx is:\n %L \n\n Versions earlier than 1.2.1(stable version) or<br />

versions earlier than 1.3.1(development version) are vulnerable to an access restriction<br />

bypass vulnerability.\nBy using a request with a specially crafted directory name, such as<br />

'/directory::$index_allocation' in place of '/directory', an attacker may be able to bypass<br />

access restrictions.\nNote that this vulnerability only affects installs on Windows.<br />

(CVE-2012-4963)<br />

Solution: Upgrade to nginx 1.2.1(stable version) or 1.3.1(development version) or later.<br />

CVE-2011-4963<br />

PHP 5.4.x < 5.4.5 _php_sream_scandir Overflow<br />

<strong>PVS</strong> ID: 6530 FAMILY: Web Servers RISK: HIGH NESSUS ID:60086<br />

Description: Synopsis :\n\nThe remote web server uses a version of PHP that is affected by an overflow<br />

vulnerability.\n\nFor your information, the version of PHP installed on the remote host is<br />

:\n %L \n\nPHP versions earlier than 5.4.5 are affected by the following vulnerabilities.\n\n<br />

- An unspecified overflow vulnerability in the function '_php_stream_scandir' in the file<br />

'main/streams/streams.c'\n<br />

Solution: Upgrade to PHP version 5.4.5 or later.<br />

CVE-2012-2688<br />

Android Mobile Device App Download Detection<br />

<strong>PVS</strong> ID: 6531 FAMILY: Mobile Devices RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is an Android mobile client which has just downloaded the following<br />

software : %L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Detection of uploading a file to scribd.com - (HTML method)<br />

<strong>PVS</strong> ID: 6532 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host has uploaded a file to scribd.com via their HTML uploader. Scridb is the<br />

world's largest online library where one can share, view, and dowload documents across<br />

web and mobile clients.<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

Family Internet Services 1786


CVE Not available<br />

Detection of uploading a file to scribd.com - (Flash Method)<br />

<strong>PVS</strong> ID: 6533 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host has uploaded a file to scribd.com via their flash uploader. Scridb is the<br />

world's largest online library where one can share, view, and dowload documents across<br />

web and mobile clients.<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

CVE Not available<br />

Mozilla Firefox Android client<br />

<strong>PVS</strong> ID: 6534 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host has the Mozilla Firefox Android client. For your information, the observed<br />

version of client is : \n %L<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

CVE Not available<br />

Spotify app music streaming detection<br />

<strong>PVS</strong> ID: 6535 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Spotify music streaming application. Spotify offers millions<br />

of tracks by streaming the music directly to the user's desktop.<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

CVE Not available<br />

Google Chrome < 21.0.1180.60 Multiple PDF Viewer Vulnerabilities<br />

<strong>PVS</strong> ID: 6536 FAMILY: Web Clients RISK: HIGH NESSUS ID:61462<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Google Chrome is :\n %L<br />

\n\nVersions of Google Chrome earlier than 21.0.1180.75 are potentially affected by the<br />

following vulnerabilities :\n\n - An unspecified use-after-free error exists in the PDF<br />

viewer. (CVE-2012-2862)\n\n - An unspecified out-of-bounds write error exists in the PDF<br />

viewer. (CVE-2012-2863)\n\n - Successful exploitation of either issue could lead to an<br />

application crash or even allow arbitrary code execution, subject to the user's privileges.<br />

Solution: Upgrade to Google Chrome 21.0.1180.75 or later.<br />

CVE-2012-2863<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1787


Tridium SCADA Server Detection<br />

<strong>PVS</strong> ID: 6537 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host has been identified as a Tridium SCADA server version : %L<br />

Solution: Ensure that access to this server is restricted to only trusted hosts/networks<br />

CVE Not available<br />

Last.fm application music streaming on an Android mobile device<br />

<strong>PVS</strong> ID: 6538 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Android mobile device is running the Last.fm application to stream music.<br />

Last.fm is an Internet radio service for streaming music across mobile devices.<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

CVE Not available<br />

Last.fm application music streaming on an iOS device<br />

<strong>PVS</strong> ID: 6539 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote iOS mobile device is running the Last.fm application to stream music.<br />

Last.fm is an Internet radio service for streaming music across mobile devices.<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

CVE Not available<br />

Pandora Internet radio streaming on an Android mobile device<br />

<strong>PVS</strong> ID: 6540 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Android mobile device is running the Pandora Internet radio application to<br />

stream music. Pandora is an Internet radio service for streaming music across mobile<br />

devices.<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Pandora Internet radio streaming on an Apple iOS mobile device<br />

<strong>PVS</strong> ID: 6541 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Apple iOS mobile device is running the Pandora Internet radio application to<br />

stream music. Pandora is an Internet radio service for streaming music across mobile<br />

devices.<br />

Family Internet Services 1788


Solution: Ensure that such usage is in aligment with Corporate policy<br />

CVE Not available<br />

enteliTOUCH SCADA Server Detection<br />

<strong>PVS</strong> ID: 6542 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host has been identified as an enteliTOUCH SCADA server.<br />

Solution: Ensure that access to this server is restricted to only trusted hosts/networks<br />

CVE Not available<br />

Electro Industries GaugeTech SCADA Server Detection<br />

<strong>PVS</strong> ID: 6543 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host has been identified as an Electro Industries GaugeTech SCADA server.<br />

Solution: Ensure that access to this server is restricted to only trusted hosts/networks<br />

CVE Not available<br />

Flash Player < 11.3.300.271 Code Execution (APSB12-18)<br />

<strong>PVS</strong> ID: 6544 FAMILY: Web Clients RISK: HIGH NESSUS ID:61551<br />

Description: Synopsis :\n\nThe remote host contains a browser plug-in that is affected by code execution<br />

vulnerability.\n\nThe remote host has Adobe Flash Player installed. For your information,<br />

the observed version of Adobe Flash Player is : \n %L \n\nVersions of Flash Player earlier<br />

than 11.3.300.271 is affected by an unspecified remoted code execution vulnerability :\n\n -<br />

Note that this vulnerability is reportedly being actively exploited in the wild.\n\nAlso note<br />

the vendor states 10.x versions are not affected by this vulnerability and the branch was not<br />

updated.<br />

Solution: Upgrade to Flash Player 11.3.300.271 or later.<br />

CVE-2012-1535<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Flash Player < 10.3.183.20 / 11.3.300.257 Multiple Vulnerabilities (APSB12-14)<br />

<strong>PVS</strong> ID: 6545 FAMILY: Web Clients RISK: HIGH NESSUS ID:59428<br />

Description: Synopsis :\n\nThe remote host contains a browser plug-in that is affected by multiple<br />

vulnerabilities.\n\nThe remote host has Adobe Flash Player installed. For your information,<br />

the observed version of Adobe Flash Player is : \n %L \n\nVersions of Flash Player earlier<br />

than 10.3.183.20 / 11.3.300.257 are potentially affected by multiple vulnerabilities :\n\n -<br />

Multiple memory corruption vulnerabilities exist that could lead to code execution.<br />

(CVE-2012-2034, CVE-2012-2037)\n\n - A stack overflow vulnerability exists that could<br />

Family Internet Services 1789


lead to code execution. (CVE-2012-2035)\n\n - An integer overflow vulnerability exists<br />

that could lead to code execution. (CVE-2012-2036)\n\n - A security bypass vulnerability<br />

exists that could lead to information disclosure. (CVE-2012-2038)\n\n - A null dereference<br />

vulnerability exists that could lead to code execution. (CVE-2012-2039)\n\n - A binary<br />

planting vulnerability exists in the Flash Player installer that could lead to code<br />

execution.(CVE-2012-2040)\n<br />

Solution: Upgrade to Flash Player 10.3.183.20 / 11.3.300.257 or later.<br />

CVE-2012-2040<br />

NetFlix on-demand media streaming to the Apple iPad<br />

<strong>PVS</strong> ID: 6546 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Apple iPad device is streaming media content from NetFlix. NetFlix is provider<br />

of on-demand Internet streaming media available as cross-platform client to both desktops<br />

and mobile devices.<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

CVE Not available<br />

NetFlix on-demand media streaming to a Windows Desktop<br />

<strong>PVS</strong> ID: 6547 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Windows host is streaming media content from NetFlix. NetFlix is provider of<br />

on-demand Internet streaming media available as cross-platform client to both desktops and<br />

mobile devices.<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

CVE Not available<br />

VMWare VI Client Version Detection<br />

<strong>PVS</strong> ID: 6548 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the VMWare VI client version : %L . The VI client is used<br />

to manage virtual machines across a network.<br />

Solution: N/A<br />

CVE Not available<br />

Sophos Anti-virus Version Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6549 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1790


Description: The remote host is running the Sophos AV software version: %L<br />

Solution: N/A<br />

CVE Not available<br />

Apache 2.4 < 2.4.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6550 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:61644<br />

Description: Synopsis:\n\nThe remote web server is affected by multiple vulnerabilities.\n\nThe remote<br />

host is running a Apache HTTP server. For your information, the observed version of<br />

Apache is:\n %L \n\n Versions earlier than 2.4.3 are vulnerable to the following<br />

vulnerabilities :\n\n - An input validation error exists related to 'mod_negotiation',<br />

'Multiviews' and untrusted uploads that can allow cross-site scripting attacks.<br />

(CVE-2012-2687)\n\n - An error exists related to 'mod_proxy_ajp' and 'mod_proxy_http'<br />

that can allow connections to remain open. This condition can allow information disclosure<br />

when combined with specially crafted requests. (CVE-2012-3502)<br />

Solution: Upgrade to Apache version 2.4.3 or later<br />

CVE-2012-3502<br />

Opera < 12.01 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6551 FAMILY: Web Clients RISK: HIGH NESSUS ID:61414<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running the Opera web browser. For your<br />

information, the observed version of Opera is : \n %L \n\nVersions of Opera earlier than<br />

12.01 are potentially affected by multiple vulnerabilities :\n\n - An error exists in the<br />

handling of certain URLs that can lead to memory corruption and possible code execution.<br />

(1016)\n\n - Errors exist in the handling of DOM elements and certain HTML characters<br />

that can lead to cross-site scripting. (1025, 1026)\n\n - Download dialog boxes can be made<br />

small enough that users may not realize they are accepting a download and further,<br />

executing such a download. (1027)\n\n - An attacker could cause an application crash by<br />

tricking a user into connecting to a malicious site, as demonstrated by the Lenovo 'Shop<br />

Now' page. (CVE-2012-4146)<br />

Solution: Upgrade to Opera 12.01 or later.<br />

CVE-2012-4146<br />

Hulu plus search detection on the Apple iPad<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6552 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1791


Description: The remote Apple iPad device has launch the Hulu plus application. The client has<br />

searched for the following shows/movies:\n %L \n Hulu is provider of on-demand Internet<br />

streaming media available as cross-platform client to both desktops and mobile devices.<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

CVE Not available<br />

Hulu on-demand media streaming to the Apple iPad<br />

<strong>PVS</strong> ID: 6553 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Apple iPad device is streaming media content from Hulu. Hulu is provider of<br />

on-demand Internet streaming media available as cross-platform client to both desktops and<br />

mobile devices.<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

Oracle Java SE 7 <<br />

CVE Not available<br />

<strong>PVS</strong> ID: 6554 FAMILY: Web Clients RISK: HIGH NESSUS ID:61681<br />

Description: Synopsis :\n\nThe remote Windows host contains a programming platform that is affected<br />

by a code execution vulnerability.\n\nThe remote host is running Java version : %L. This<br />

version of Oracle (formerly Sun) Java SE or Java for Business installed on the remote host<br />

is 7 Update 6 or earlier and is, therefore, potentially affected by an unspecified code<br />

execution vulnerability. Note that this vulnerability is currently being exploited in the wild.<br />

Solution: Upgrade to JDK / JRE 7 Update 7 or later, and remove, if necessary, any affected versions.<br />

Flash Player <<br />

CVE-2012-4681<br />

<strong>PVS</strong> ID: 6555 FAMILY: Web Clients RISK: HIGH NESSUS ID:61623<br />

Description: Synopsis :\n\nThe remote host contains a browser plug-in that is affected by multiple<br />

vulnerabilities.\n\nThe remote host has Adobe Flash Player installed. For your information,<br />

the observed version of Adobe Flash Player is : \n %L \n\nVersions of Flash Player equal to<br />

or earlier than 11.4.402.264 is affected by multiple vulnerabilities :\n\n - Multiple memory<br />

corruption vulnerabilities could lead to code execution. (CVE-2012-4163, CVE-2012-4164,<br />

CVE-2012-4165, CVE-2012-4166)\n\n - An integer overflow vulnerability exists that could<br />

lead to code execution. (CVE-2012-4167)\n\n - A cross-domain information leak<br />

vulnerability exists. (CVE-2012-4168)<br />

Solution: Upgrade to Flash Player 11.4.402.265 or later.<br />

CVE-2012-4171<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1792


PHP 5.3.x < 5.3.15 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6556 FAMILY: Web Servers RISK: HIGH NESSUS ID:60085<br />

Description: Synopsis :\n\nThe remote web server uses a version of PHP that is affected by an multiple<br />

vulnerabilities.\n\nFor your information, the version of PHP installed on the remote host is<br />

:\n %L \n\nPHP versions 5.3.x earlier than 5.3.15 are affected by the following<br />

vulnerabilities.\n\n - - An unspecified overflow vulnerability exists in the function<br />

'_php_stream_scandir' in the file 'main/streams/streams.c'. (CVE-2012-2688)\n\n - An<br />

unspecified error exists that can allow the 'open_basedir' constraint to be bypassed.<br />

(CVE-2012-3365)<br />

Solution: Upgrade to PHP version 5.3.15 or later.<br />

CVE-2012-3365<br />

Opendrive Login Detection<br />

<strong>PVS</strong> ID: 6557 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client has just logged into the opendrive.com HTTP interface. Opendrive is a<br />

'cloud' application which allows users to store files via an online service. The logged<br />

UserID was : %L<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

CVE Not available<br />

Opendrive File Upload Detection<br />

<strong>PVS</strong> ID: 6558 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client has just logged into the opendrive.com HTTP interface. Opendrive is a<br />

'cloud' application which allows users to store files via an online service. The user has just<br />

uploaded a file to the online service.<br />

realtimeonly<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

Mozilla Firefox 14.x <<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6559 FAMILY: Web Clients RISK: HIGH NESSUS ID:61715<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox 14.x are potentially affected by the following security issues :\n\n -<br />

An error exists related to 'Object.defineProperty' and the location object and can allow<br />

cross-site scripting attacks. (CVE-2012-1956)\n\n - Unspecified memory safety issues<br />

Family Internet Services 1793


exist. (CVE-2012-1970,CVE-2012-1971)\n\n - Multiple use-after-free errors exist.<br />

(CVE-2012-1972, CVE-2012-1973, CVE-2012-1974, CVE-2012-1975, CVE-2012-1976,<br />

CVE-2012-3956, CVE-2012-3957, CVE-2012-3958, CVE-2012-3959, CVE-2012-3960,<br />

CVE-2012-3961, CVE-2012-3962, CVE-2012-3963, CVE-2012-3964)\n\n - An error<br />

exists related to 'about:newtab' and the browser's history. This error can allow a newly<br />

opened tab to further open a new window and navigate to the privileged 'about:newtab'<br />

page leading to possible privilege escalation. (CVE-2012-3965)\n\n - An error exists<br />

related to bitmap (BMP) and icon (ICO) file decoding that can lead to memory corruption<br />

causing application crashes and potentially arbitrary code execution. (CVE-2012-3966)\n\n<br />

- A use-after-free error exists related to WebGL shaders. (CVE-2012-3968)\n\n - A buffer<br />

overflow exists related to SVG filters. (CVE-2012-3969)\n\n A use-after-free error exists<br />

related to elements having 'requiredFeatures' attributes. (CVE-2012-3970)\n\n - A 'Graphite<br />

2' library memory corruption error exists. (CVE-2012-3971)\n\n - An XSLT out-of-bounds<br />

read error exists related to 'format-number'. (CVE-2012-3972)\n\n - Remote debugging is<br />

possible even when disabled and the 'HTTPMonitor' extension is enabled.<br />

(CVE-2012-3973)\n\n - The installer can be ticked into running unauthorized executables.<br />

(CVE-2012-3974)\n\n - The DOM parser can unintentionally load linked resources in<br />

extensions. (CVE-2012-3975)\n\n - Incorrect SSL certificate information can be displayed<br />

in the address bar when two 'onLocationChange' events fire out of order.<br />

(CVE-2012-3976)\n\n - <strong>Security</strong> checks related to location objects can be bypassed if<br />

crafted calls are made to the browser chrome code. (CVE-2012-3978)\n\n - Calling 'eval' in<br />

the web console can allow injected code to be executed with browser chrome privileges.<br />

(CVE-2012-3980)<br />

Solution: Upgrade to Firefox 15.0 or later.<br />

CVE-2012-3980<br />

Mozilla Thunderbird 14.x <<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6560 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:61717<br />

Description: Synopsis :\n\nThe remote host has a mail client installed that is vulnerable to multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Thunderbird is : \n %L<br />

\n\nVersions of Thunderbird 14.x are potentially affected by the following security issues<br />

:\n\n - An error exists related to 'Object.defineProperty' and the location object that could<br />

allow cross-site scripting attacks. (CVE-2012-1956)\n\n - Unspecified memory safety<br />

issues exist. (CVE-2012-1970, CVE-2012-1971)\n\n - Multiple use-after-free errors exist.<br />

(CVE-2012-1972, CVE-2012-1973, CVE-2012-1974, CVE-2012-1975, CVE-2012-1976,<br />

CVE-2012-3956, CVE-2012-3957, CVE-2012-3958, CVE-2012-3959, CVE-2012-3960,<br />

CVE-2012-3961, CVE-2012-3962, CVE-2012-3963, CVE-2012-3964)\n\n - An error<br />

exists related to bitmap (BMP) and icon (ICO) file decoding that can lead to memory<br />

corruption, causing application crashes and potentially arbitrary code execution.<br />

(CVE-2012-3966)\n\n - A use-after-free error exists related to WebGL shaders.<br />

(CVE-2012-3968)\n\n - A buffer overflow exists related to SVG filters.<br />

(CVE-2012-3969)\n\n - A use-after-free error exists related to elements having<br />

'requiredFeatures' attributes. (CVE-2012-3970)\n\n - A 'Graphite 2' library memory<br />

corruption error exists. (CVE-2012-3971)\n\n - An XSLT out-of-bounds read error exists<br />

related to 'format-number'. (CVE-2012-3972)\n\n - The installer can be tricked into running<br />

unauthorized executables. (CVE-2012-3974)\n\n - The DOM parser can unintentionally<br />

Family Internet Services 1794


load linked resources in extensions. (CVE-2012-3975)\n\n - <strong>Security</strong> checks related to<br />

location objects can be bypassed if crafted calls are made to the browser chrome code.<br />

(CVE-2012-3978)\n\n - Calling 'eval' in the web console can allow injected code to be<br />

executed with browser chrome privileges. (CVE-2012-3980)<br />

Solution: Upgrade to Thunderbird 15.0 or later.<br />

CVE-2012-3980<br />

Mozilla SeaMonkey 2.x < 2.12 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6561 FAMILY: Web Clients RISK: HIGH NESSUS ID:61718<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

vulnerabilities.\n\nFor your information, the observed version of SeaMonkey is : \n %L<br />

\n\nVersions of SeaMonkey 2.x earlier than 2.12 are potentially affected by the following<br />

security issues :\n\n - An error exists related to 'Object.defineProperty' and the location<br />

object that could allow cross-site scripting attacks. (CVE-2012-1956)\n\n - Unspecified<br />

memory safety issues exist. (CVE-2012-1970, CVE-2012-1971)\n\n - Multiple<br />

use-after-free errors exist. (CVE-2012-1972, CVE-2012-1973, CVE-2012-1974,<br />

CVE-2012-1975, CVE-2012-1976, CVE-2012-3956, CVE-2012-3957, CVE-2012-3958,<br />

CVE-2012-3959, CVE-2012-3960, CVE-2012-3961, CVE-2012-3962, CVE-2012-3963,<br />

CVE-2012-3964)\n\n - An error exists related to bitmap (BMP) and icon (ICO) file<br />

decoding that can lead to memory corruption, causing application crashes and potentially<br />

arbitrary code execution. (CVE-2012-3966)\n\n - A use-after-free error exists related to<br />

WebGL shaders. (CVE-2012-3968)\n\n - A buffer overflow exists related to SVG filters.<br />

(CVE-2012-3969)\n\n - A use-after-free error exists related to elements having<br />

'requiredFeatures' attributes. (CVE-2012-3970)\n\n - A 'Graphite 2' library memory<br />

corruption error exists. (CVE-2012-3971)\n\n - An XSLT out-of-bounds read error exists<br />

related to 'format-number'. (CVE-2012-3972)\n\n - The DOM parser can unintentionally<br />

load linked resources in extensions. (CVE-2012-3975)\n\n - Incorrect SSL certificate<br />

information can be displayed in the address bar when two 'onLocationChange' events fire<br />

out of order. (CVE-2012-3976)\n\n - <strong>Security</strong> checks related to location objects can be<br />

bypassed if crafted calls are made to the browser chrome code. (CVE-2012-3978)<br />

Solution: Upgrade to SeaMonkey 2.12 or later.<br />

CVE-2012-3978<br />

Opera < 12.02 Truncated Dialog Vulnerability<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6562 FAMILY: Web Clients RISK: HIGH NESSUS ID:61732<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable by a truncated<br />

dialog vulnerability.\n\nThe remote host is running the Opera web browser. For your<br />

information, the observed version of Opera is : \n %L \n\nVersions of Opera earlier than<br />

12.02 are potentially affected by multiple vulnerabilities :\n\n - Certain user actions, when<br />

combined with specially crafted web pages, can cause displayed dialog boxes to be too<br />

small thus allowing the dialog buttons to be hidden. A user may be tricked into clicking<br />

what appear to be elements on the underlying page, but are actually the hidden dialog<br />

Family Internet Services 1795


uttons. This can allow arbitrary code execution to occur.<br />

Solution: Upgrade to Opera 12.02 or later.<br />

CVE Not available<br />

Google Chrome < 21.0.1180.89 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6563 FAMILY: Web Clients RISK: HIGH NESSUS ID:61774<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Google Chrome is :\n %L<br />

\n\nVersions of Google Chrome earlier than 21.0.1180.89 are potentially affected by the<br />

following vulnerabilities :\n\n - An out-of-bounds read error exists related to line-breaking.<br />

(CVE-2012-2865)\n\n - Variable casting errors exist related to 'run-ins' and XSL<br />

transformations. (CVE-2012-2866, CVE-2012-2871)\n\n - An unspecified error exists<br />

related to the SPDY protocol that can result in application crashes. (CVE-2012-2867)\n\n -<br />

A unspecified race condition exists related to 'workers' and XHR. (CVE-2012-2868)\n\n -<br />

An unspecified error exists related to stale buffers and URL loading. (CVE-2012-2869)\n\n<br />

- Memory management issues exist related to XPath processing. (CVE-2012-2870)\n\n -<br />

Cross-site scripting is possible during the SSL interstitial process.<br />

(CVE-2012-2872)\n\nSuccessful exploitation of any of these issue could lead to an<br />

application crash or even allow arbitrary code execution, subject to the user's privileges.<br />

Solution: Upgrade to Google Chrome 21.0.1180.89 or later.<br />

CVE-2012-2872<br />

Ustream mobile Android app detection<br />

<strong>PVS</strong> ID: 6564 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Ustream Android mobile application. Ustream app provides<br />

the user with the capiblity of broadcasting live using the phone's camera. It also allows for<br />

streaming of live events directly on the phone.<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

CVE Not available<br />

Ustream mobile Android app streaming detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6565 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is attempting to view a live stream using the Ustream Android mobile<br />

application. Ustream app provides the user with the capiblity of broadcasting live using the<br />

phone's camera. It also allows for streaming of live events directly on the phone.<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

Family Internet Services 1796


CVE Not available<br />

Mac Outlook Client Version Detection<br />

<strong>PVS</strong> ID: 6566 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Mac Outlook client version : %L .<br />

Solution: N/A<br />

CVE Not available<br />

Spiceworks Client Version Detection<br />

<strong>PVS</strong> ID: 6567 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Spiceworks client version : %L . Spiceworks is a free<br />

software package used to manage network devices.<br />

Solution: N/A<br />

CVE Not available<br />

Asterisk Peer IAX2 Call Handling ACL Rule Bypass (AST-2012-013)<br />

<strong>PVS</strong> ID: 6568 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:61994<br />

Description: Synopsis :\n\nThe remote VoIP server is affected by a security bypass vulnerability.\n\nFor<br />

your information, the observed version of Asterisk is : \n %L \n\nAccording to the version<br />

in its SIP banner, the version of Asterisk running on the remote host is potentially affected<br />

by a vulnerability that could allow a remote, authenticated attacker to bypass access<br />

controls on out-bound calls.\n\nInter-Asterisk eXchange (IAX2) out-bound call restrictions<br />

can be bypassed if peer credentials, defined in a dynamic Asterisk Realtime Architecture<br />

(ARA) backend, are used by an attacker.<br />

Solution: Upgrade to Asterisk 1.8.15.1 / 10.7.1 or apply the patches listed in the Asterisk advisory<br />

CVE-2012-4737<br />

Foursquare app on an Android mobile device<br />

<strong>PVS</strong> ID: 6569 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Android mobile device is running the Foursquare app. Foursquare is a free app<br />

used to share and save places you visit.<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1797


Carbonite 'Cloud' Backup Service Detection<br />

<strong>PVS</strong> ID: 6570 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is subscribed to the Carbonite Backup 'Cloud' service. This service<br />

automates backup of the hard drive to the Carbonite web servers on the Internet.<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

CVE Not available<br />

Carbonite 'Cloud' Backup Service Detection<br />

<strong>PVS</strong> ID: 6571 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is subscribed to the Carbonite Backup 'Cloud' service. This service<br />

automates backup of the hard drive to the Carbonite web servers on the Internet.<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

CVE Not available<br />

MS Skydrive 'Cloud' Backup Service Detection<br />

<strong>PVS</strong> ID: 6572 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is subscribed to the Skydrive Backup 'Cloud' service. This service<br />

automates backup of the hard drive to the Skydrive web servers on the Internet.<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

CVE Not available<br />

Sprint TV app on Android mobile devices<br />

<strong>PVS</strong> ID: 6573 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host has launched the SprintTV mobile app.Sprint TV provides the ability to<br />

view live tv shows ranging from sports, news and entertainment. Sprint TV offers a free<br />

version for Sprint customers, as well as offers a premium service which offers more<br />

channels.\n\nThe following device model was since:\n %L \n<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Real <strong>Network</strong>s RealPlayer < 15.0.6.14 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6574 FAMILY: Web Clients RISK: HIGH NESSUS ID:62065<br />

Family Internet Services 1798


Description: Synopsis :\n\nThe remote host is running an application that is vulnerable to multiple<br />

vulnerabilities.\n\nThe remote host is running RealPlayer, a multi-media application. For<br />

your information, the observed build of RealPlayer is:\n %L .\n\nRealPlayer builds earlier<br />

than 15.0.6.14 are potentially affected by multiple vulnerabilities :\n\n - A buffer overflow<br />

error exists related to 'AAC' handling, specifically unpacking of the stream data.<br />

(CVE-2012-2407)\n\n - A heap-corruption error exists related to the 'AAC SDK' decoding.<br />

(CVE-2012-2408)\n\n - Two unspecified buffer overflow errors exist related to<br />

'RealMedia'. (CVE-2012-2409, CVE-2012-2410)\n\n - A divide-by-zero error exists related<br />

to 'RealAudio' and codec frame size. (CVE-2012-3234)<br />

Solution: Upgrade to RealPlayer 15.0.6.14 or later.<br />

CVE-2012-3234<br />

iTunes < 10.7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6575 FAMILY: Web Clients RISK: HIGH NESSUS ID:62077<br />

Description: Synopsis :\n\nThe remote host contains a multimedia application that has multiple<br />

vulnerabilities.\n\nThe remote host has iTunes installed, a popular media player for<br />

Windows and Mac OS. For your information, the observed version of iTunes is:\n %L<br />

\n\nVersions of iTunes earlier than 10.7 are reportedly affected by multiple memory<br />

corruption vulnerabilities in WebKit.<br />

Solution: Upgrade to iTunes 10.7 or later.<br />

CVE-2012-3712<br />

Apache 2.2 < 2.2.23 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6576 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:62101<br />

Description: Synopsis :\n\nThe remote web server uses a version of Apache that is affected by multiple<br />

vulnerabilities.\n\nFor your information, the version of Apache installed on the remote host<br />

is :\n %L \n\nApache versions earlier than 2.2.23 are affected by the following<br />

vulnerabilities.\n\n - The utility 'apachectl' can receive a zero-length directory name in the<br />

LD_LIBRARY_PATH via the 'envvars' file. A local attacker with access to that utility<br />

could exploit this to load a malicious Dynamic Shared Object (DSO), leading to arbitrary<br />

code execution. (CVE-2012-0883)\n\n - An input validation error exists related to<br />

'mod_negotiation', 'Multiviews' and untrusted uploads that can allow cross-site scripting<br />

attacks. (CVE-2012-2687)<br />

Solution: Upgrade to Apache version 2.2.23 or later.<br />

CVE-2012-2687<br />

JustCloud 'Cloud' Backup Service Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6577 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1799


Description: The remote client is subscribed to the JustCloud Backup 'Cloud' service. This service<br />

automates backup of the hard drive to the JustCloud web servers on the Internet.<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

CVE Not available<br />

JustCloud 'Cloud' Backup Service Detection<br />

<strong>PVS</strong> ID: 6578 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is subscribed to the JustCloud Backup 'Cloud' service. This service<br />

automates backup of the hard drive to the JustCloud web servers on the Internet.<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

Pushdo botnet detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 6579 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe host is infected with a botnet\n\nThe remote host appears to be infected<br />

with the Pushdo botnet<br />

Solution: The machine should be manually inspected and cleaned<br />

CVE Not available<br />

Wunderlist 'Cloud' sync Detection<br />

<strong>PVS</strong> ID: 6580 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is subscribed to Wunderlist 'Cloud' service and has attempted to sync<br />

data. Wunderlist is a task management tool where one can create to-do list and share them<br />

with colleagues and friends.<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

CVE Not available<br />

Wunderlist 'Cloud' Service Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6581 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is subscribed to Wunderlist 'Cloud' service. Wunderlist is a task<br />

management tool where one can create to-do list and share them with colleagues and<br />

friends.<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

Family Internet Services 1800


CVE Not available<br />

Mac OS X : Safari < 6.0.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6582 FAMILY: Web Clients RISK: HIGH NESSUS ID:62216<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by several<br />

vulnerabilities.\n\nThe remote Mac OS X host has Safari installed. For your information,<br />

the observed version of Safari is: \n %L \n\nVersions of Safari earlier than 6.0.1 are<br />

reportedly affected by several issues :\n\n - A logic error in Safari's handling of the<br />

Quarantine attribute caused the safe mode not to be triggered on Quarantined files, which<br />

could lead to the disclosure of local file contents. (CVE-2012-3713)\n\n - A rare condition<br />

in the handling of Form Autofill could lead to the disclosure of information from the<br />

Address Book 'Me' card that was not included in the Autofill popover.<br />

(CVE-2012-3714)\n\n - A logic issue in the handling of HTTPS URLs in the address bar<br />

when pasting text could result in the request being sent over HTTP. (CVE-2012-3715)\n\n -<br />

Numerous issues exist in WebKit. (CVE-2011-3105, CVE-2012-2817, CVE-2012-2818,<br />

CVE-2012-2829, CVE-2012-2831, CVE-2012-2842, CVE-2012-2843, CVE-2012-3598,<br />

CVE-2012-3601, CVE-2012-3602, CVE-2012-3606, CVE-2012-3607, CVE-2012-3612,<br />

CVE-2012-3613, CVE-2012-3614, CVE-2012-3616, CVE-2012-3617, CVE-2012-3621,<br />

CVE-2012-3622,CVE-2012-3623, CVE-2012-3624, CVE-2012-3632, CVE-2012-3643,<br />

CVE-2012-3647, CVE-2012-3648, CVE-2012-3649, CVE-2012-3651,<br />

CVE-2012-3652,CVE-2012-3654, CVE-2012-3657, CVE-2012-3658,CVE-2012-3659,<br />

CVE-2012-3660, CVE-2012-3671,CVE-2012-3672, CVE-2012-3673,<br />

CVE-2012-3675,CVE-2012-3676, CVE-2012-3677, CVE-2012-3684,CVE-2012-3685,<br />

CVE-2012-3687, CVE-2012-3688,CVE-2012-3692, CVE-2012-3699,<br />

CVE-2012-3700,CVE-2012-3701, CVE-2012-3702, CVE-2012-3703,CVE-2012-3704,<br />

CVE-2012-3705, CVE-2012-3706,CVE-2012-3707, CVE-2012-3708,<br />

CVE-2012-3709,CVE-2012-3710, CVE-2012-3711, CVE-2012-3712)<br />

Solution: Upgrade to Safari 6.0.1 or later.<br />

CVE-2012-3710<br />

Mac OS X 10.7 < 10.7.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6583 FAMILY: Generic RISK: HIGH NESSUS ID:61413<br />

Description: Synopsis :\n\nThe remote host is missing a Mac OS X update that fixes a security<br />

issue.\n\nFor your information, the observed version of Mac OS X is : \n %L \n\nThe<br />

remote host is running a version of Mac OS X 10.7 that is older than version 10.7.5. The<br />

newer version contains numerous security-related fixes for the following components :\n\n<br />

- Apache\n\n - BIND\n\n - CoreText\n\n - Data <strong>Security</strong>\n\n - ImageIO\n\n - Installer\n\n -<br />

International Components for Unicode\n\n - Kernel\n\n - Mail\n\n - PHP\n\n - Profile<br />

Manager\n\n - QuickLook\n\n - QuickTime\n\n - Ruby\n\n - USB\nIAVA Reference :<br />

2012-A-0017\nIAVA Reference : 2012-A-0085\nIAVB Reference : 2012-B-0006\nSTIG<br />

Finding Severity : Category I<br />

Solution: Upgrade to Mac OS X 10.7.5 or later.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1801


CVE-2012-3723<br />

Mac OS X 10.8 < 10.8.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6584 FAMILY: Generic RISK: HIGH NESSUS ID:62215<br />

Description: Synopsis :\n\nThe remote host is missing a Mac OS X update that fixes a security<br />

issue.\n\nFor your information, the observed version of Mac OS X is : \n %L \n\nThe<br />

remote host is running a version of Mac OS X 10.8 that is older than version 10.8.2. The<br />

newer version contains numerous security-related fixes for the following components :\n\n<br />

- BIND\n\n - Data <strong>Security</strong>\n\n - LoginWindow\n\ - Mobile Accounts\n\n - PHP\n\n<br />

Solution: Upgrade to Mac OS X 10.8.2 or later.<br />

CVE-2012-3720<br />

Salesforce Application Detection<br />

<strong>PVS</strong> ID: 6585 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is subscribed to the Salesforce service.<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

CVE Not available<br />

Sugarsync 'Cloud' Backup Service Detection<br />

<strong>PVS</strong> ID: 6586 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is subscribed to the Sugarsync Backup 'Cloud' service. This service<br />

automates backup of the hard drive to the Sugarsync web servers on the Internet.<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

CVE Not available<br />

Sugarsync 'Cloud' Backup Service Detection<br />

<strong>PVS</strong> ID: 6587 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is subscribed to the Sugarsync Backup 'Cloud' service. This service<br />

automates backup of the hard drive to the Sugarsync web servers on the Internet.<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

CVE Not available<br />

SSL Client Hello Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1802


<strong>PVS</strong> ID: 6588 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client has initiated an SSL Client Hello packet<br />

Solution: N/A<br />

CVE Not available<br />

Apple iOS < 6.0 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6589 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is an iPhone, iPod Touch, or iPad running iOS. For your information, the observed version<br />

of iOS is : \n %L \n\nVersions of iOS less than 6.0 are potentially affected by multiple<br />

vulnerabilities. Apple iOS 6.0 contains security fixes for the following products :\n\n -<br />

Numerous memory errors exist related to handling 'TIFF', 'PNG' and 'JPEG' images and<br />

'ImageIO' that can allow arbitrary code execution. (CVE-2011-1167, CVE-2011-3026,<br />

CVE-2011-3048, CVE-2011-3328, CVE-2012-1173, CVE-2012-3726)\n\n - Several issues<br />

exist related to 'CoreGraphics' and 'FreeType' (CVE-2012-1126, CVE-2012-1127,<br />

CVE-2012-1128, CVE-2012-1129, CVE-2012-1130, CVE-2012-1131, CVE-2012-1132,<br />

CVE-2012-1133, CVE-2012-1134, CVE-2012-1135, CVE-2012-1136, CVE-2012-1137,<br />

CVE-2012-1138, CVE-2012-1139, CVE-2012-1140, CVE-2012-1141, CVE-2012-1142,<br />

CVE-2012-1143, CVE-2012-1144)\n\n - Numerous issues exist related to libxml and can<br />

lead to application crashes or arbitrary code execution. (CVE-2011-1944, CVE-2011-2821,<br />

CVE-2011-2834, CVE-2011-3919)\n\n - A stack-based buffer overflow exists related to<br />

'locale ID' and 'International Components for Unicode' (ICU). (CVE-2011-4599)\n\n - An<br />

unitialized memory access issue exists related to 'Sorenson' encoded movie files and<br />

'CoreMedia'. (CVE-2012-3722)\n\n - An URL handling issue exists related to 'CF<strong>Network</strong>'<br />

that can disclose sensitive information. (CVE-2012-3724)\n\n - The 'DNAv4' protocol<br />

discloses sensitive information when connecting to unencrypted Wi-Fi networks.<br />

(CVE-2012-3725)\n\n - A buffer overflow error exists related to 'IPSec' and 'racoon'<br />

configuration files. (CVE-2012-3727)\n\n - An invalid pointer dereference error exists<br />

related to the kernel and packet filter ioctls. (CVE-2012-3728)\n\n - An uninitialized<br />

memory access error exists related to the kernel and the Berkeley Packet Filter interpreter.<br />

(CVE-2012-3729)\n\n - Several issues exist related to 'Mail' and the handling of<br />

attachments and 'S/MIME' signed messages. (CVE-2012-3730, CVE-2012-3731,<br />

CVE-2012-3732)\n\n - Information disclosure issues exist related to 'Messages', 'Office<br />

Viewer', system logs, and 'UIKit'. (CVE-2012-3733, CVE-2012-3734, CVE-2012-3743,<br />

CVE-2012-3746)\n\n - Memory corruption errors exist related to 'OpenGL'.<br />

(CVE-2011-3457)\n\n - Numerous errors exist related to 'Passcode Lock'.<br />

(CVE-2012-3735, CVE-2012-3736, CVE-2012-3737, CVE-2012-3738, CVE-2012-3739,<br />

CVE-2012-3740)\n\n - An error exists in 'Restrictions' that can allow unauthorized<br />

purchases. (CVE-2012-3741)\n\n - Errors exist in 'Safari' that are related to misleading<br />

URL characters and password auto complete. (CVE-2012-3742, CVE-2012-0680)\n\n - A<br />

buffer overflow error exists related to 'Telephony' and SMS handling.<br />

(CVE-2012-3745)\n\n - Many errors exist related to the bundled 'WebKit' components.<br />

(CVE-2011-2845, CVE-2011-3016, CVE-2011-3021, CVE-2011-3027, CVE-2011-3032,<br />

CVE-2011-3034, CVE-2011-3035, CVE-2011-3036, CVE-2011-3037, CVE-2011-3038,<br />

CVE-2011-3039, CVE-2011-3040, CVE-2011-3041, CVE-2011-3042, CVE-2011-3043,<br />

Family Internet Services 1803


CVE-2011-3044, CVE-2011-3050, CVE-2011-3053, CVE-2011-3059, CVE-2011-3060,<br />

CVE-2011-3064, CVE-2011-3067, CVE-2011-3068, CVE-2011-3069, CVE-2011-3071,<br />

CVE-2011-3073, CVE-2011-3074, CVE-2011-3075, CVE-2011-3076, CVE-2011-3078,<br />

CVE-2011-3081, CVE-2011-3086, CVE-2011-3089, CVE-2011-3090, CVE-2011-3105,<br />

CVE-2011-3913, CVE-2011-3924, CVE-2011-3926, CVE-2011-3958, CVE-2011-3966,<br />

CVE-2011-3968, CVE-2011-3969, CVE-2011-3971, CVE-2012-0682, CVE-2012-0683,<br />

CVE-2012-1520, CVE-2012-1521, CVE-2012-2815, CVE-2012-2818, CVE-2012-3589,<br />

CVE-2012-3590, CVE-2012-3591, CVE-2012-3592, CVE-2012-3593, CVE-2012-3594,<br />

CVE-2012-3595, CVE-2012-3596, CVE-2012-3597, CVE-2012-3598, CVE-2012-3599,<br />

CVE-2012-3600, CVE-2012-3601, CVE-2012-3602, CVE-2012-3603, CVE-2012-3604,<br />

CVE-2012-3605, CVE-2012-3608, CVE-2012-3609, CVE-2012-3610, CVE-2012-3611,<br />

CVE-2012-3612, CVE-2012-3613, CVE-2012-3614, CVE-2012-3615, CVE-2012-3617,<br />

CVE-2012-3618, CVE-2012-3620, CVE-2012-3624, CVE-2012-3625, CVE-2012-3626,<br />

CVE-2012-3627, CVE-2012-3628, CVE-2012-3629, CVE-2012-3630, CVE-2012-3631,<br />

CVE-2012-3633, CVE-2012-3634, CVE-2012-3635, CVE-2012-3636, CVE-2012-3637,<br />

CVE-2012-3638, CVE-2012-3639, CVE-2012-3640, CVE-2012-3641, CVE-2012-3642,<br />

CVE-2012-3644, CVE-2012-3645, CVE-2012-3646, CVE-2012-3647, CVE-2012-3648,<br />

CVE-2012-3650, CVE-2012-3651, CVE-2012-3652, CVE-2012-3653, CVE-2012-3655,<br />

CVE-2012-3656, CVE-2012-3658, CVE-2012-3659, CVE-2012-3660, CVE-2012-3661,<br />

CVE-2012-3663, CVE-2012-3664, CVE-2012-3665, CVE-2012-3666, CVE-2012-3667,<br />

CVE-2012-3668, CVE-2012-3669, CVE-2012-3670, CVE-2012-3671, CVE-2012-3672,<br />

CVE-2012-3673, CVE-2012-3674, CVE-2012-3676, CVE-2012-3677, CVE-2012-3678,<br />

CVE-2012-3679, CVE-2012-3680, CVE-2012-3681, CVE-2012-3682, CVE-2012-3683,<br />

CVE-2012-3684, CVE-2012-3686, CVE-2012-3691, CVE-2012-3693, CVE-2012-3695,<br />

CVE-2012-3696, CVE-2012-3703, CVE-2012-3704, CVE-2012-3706, CVE-2012-3708,<br />

CVE-2012-3710, CVE-2012-3747)<br />

Solution: Upgrade to iOS 6.0 or later.<br />

CVE-2012-3747<br />

Accessing iTunes Store on an Apple iOS device<br />

<strong>PVS</strong> ID: 6590 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Apple iOS device is browsing the iTunes Store. The iTunes Store is a<br />

software-based online digital media store operated by Apple. It offers millions of songs,<br />

videos, and apps. The following type of device and iOS version has been detected:\n %L%<br />

\n<br />

realtime<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

CVE Not available<br />

Browsing Cydia software packages<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6591 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1804


Description: The remote client is accessing the Cydia software packages. Cydia is an indepented<br />

third-party app distribution platform for Apple iOS. Cydia is mostly use for<br />

Jailbroken devices. The following iOS version was detected:\n %L \n<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

CVE Not available<br />

Google Chrome < 22.0.1229.79 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6592 FAMILY: Web Clients RISK: HIGH NESSUS ID:62313<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Google Chrome is :\n %L<br />

\n\nVersions of Google Chrome earlier than 22.0.1229.79 are potentially affected by the<br />

following vulnerabilities :\n\n - Out-of-bounds write errors exist related to Skia and the<br />

PDF viewer. (CVE-2012-2874, CVE-2012-2883, CVE-2012-2895)\n\n - Various,<br />

unspecified errors exist related to the PDF viewer. (CVE-2012-2875)\n\n - A buffer<br />

overflow error exists related to 'SSE2' optimizations. (CVE-2012-2876)\n\n - An<br />

unspecified error exists related to extensions and modal dialogs that can allow application<br />

crashes. (CVE-2012-2877)\n\n - Use-after-free errors exist related to plugin handling,<br />

'onclick' handling, 'SVG' text references and the PDF viewer. (CVE-2012-2878,<br />

CVE-2012-2887, CVE-2012-2888, CVE-2012-2890)\n\n - An error exists related to 'DOM'<br />

topology corruption. (CVE-2012-2879)\n\n - Race conditions exist in the plugin paint<br />

buffer. (CVE-2012-2880)\n\n - 'DOM' tree corruption can occur with plugins.<br />

(CVE-2012-2881)\n\n - A pointer error exists related to 'OGG' container handling.<br />

(CVE-2012-2882)- An out-of-bounds read error exists related to Skia.<br />

(CVE-2012-2884)\n\n - The possibility of a double-free error exists related to application<br />

exit. (CVE-2012-2885)\n\n - Universal cross-site scripting issues exist related to the v8<br />

JavaScript engine bindings and frame handling. (CVE-2012-2886, CVE-2012-2889)\n\n -<br />

Address information can be leaked via inter process communication (IPC).<br />

(CVE-2012-2891)\n\n - A bypass error exists related to pop-up block.<br />

(CVE-2012-2892)\n\n - A double-free error exists related to 'XSL' transforms.<br />

(CVE-2012-2893)\n\n - An error exists related to graphics context handling.<br />

(CVE-2012-2894)\n\n - An integer overflow error exists related to 'WebGL'.<br />

(CVE-2012-2896)\nSuccessful exploitation of any of these issues could lead to an<br />

application crash or even allow arbitrary code execution, subject to the user's privileges.<br />

Solution: Upgrade to Google Chrome 22.0.1229.79 or later.<br />

CVE-2012-2896<br />

Foursquare app on an Apple iOS mobile device<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6593 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Apple iOS mobile device is running the Foursquare app. Foursquare is a free<br />

app used to share and save places you visit.<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

Family Internet Services 1805


CVE Not available<br />

Slacker application music streaming on an Android mobile device<br />

<strong>PVS</strong> ID: 6594 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Android mobile device is running the Slacker application to stream music.<br />

Slacker is an Internet radio service for streaming music across mobile devices.<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

CVE Not available<br />

Slacker application music streaming on an Apple iOS mobile device<br />

<strong>PVS</strong> ID: 6595 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Apple iOS mobile device is running the Slacker application to stream music.<br />

Slacker is an Internet radio service for streaming music across mobile devices.<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

CVE Not available<br />

Slacker application music streaming leaking information<br />

<strong>PVS</strong> ID: 6596 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote mobile device is running the Slacker application to stream music. Slacker is an<br />

Internet radio service for streaming music across mobile devices. The application sents the<br />

device ID over clear text. The following ID was seen:\n %L<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

CVE Not available<br />

IEC 60870-5-104 server detection<br />

<strong>PVS</strong> ID: 6597 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is running the IEC 60870-5-104 protocol. This protocol is<br />

typically used to control electric power transmission systems commonly found on<br />

SCADA networks. The IEC 60870-5-104 protocol runs over TCP/IP and allows<br />

these control devices to communicate over global networks.<br />

Solution: Ensure that access to this server is restricted to only trusted hosts/networks<br />

Flash Player <<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1806


<strong>PVS</strong> ID: 6598 FAMILY: Web Clients RISK: HIGH NESSUS ID:62467<br />

Description: Synopsis :\n\nThe remote host contains a browser plug-in that is affected by multiple<br />

vulnerabilities.\n\nThe remote host has Adobe Flash Player installed. For your information,<br />

the observed version of Adobe Flash Player is : \n %L \n\nVersions of Flash Player earlier<br />

than 11.4.402.278 is affected by multiple vulnerabilities:\n\n - Several unspecified issues<br />

exist that can lead to buffer overflows and arbitrary code execution. (CVE-2012-5248,<br />

CVE-2012-5249, CVE-2012-5250, CVE-2012-5251, CVE-2012-5253, CVE-2012-5254,<br />

CVE-2012-5255, CVE-2012-5257, CVE-2012-5259, CVE-2012-5260, CVE-2012-5262,<br />

CVE-2012-5264, CVE-2012-5265, CVE-2012-5266, CVE-2012-5285, CVE-2012-5286,<br />

CVE-2012-5287)\n\n - Several unspecified issues exist that can lead to memory corruption<br />

and arbitrary code execution. (CVE-2012-5252, CVE-2012-5256, CVE-2012-5258,<br />

CVE-2012-5261, CVE-2012-5263, CVE-2012-5267, CVE-2012-5268, CVE-2012-5269,<br />

CVE-2012-5270, CVE-2012-5271, CVE-2012-5272)\n\n - An unspecified issue exists<br />

having unspecified impact. (CVE-2012-5673)\n<br />

Solution: Upgrade to Flash Player 11.4.402.287 or later.<br />

Flash Player <<br />

CVE-2012-5273<br />

<strong>PVS</strong> ID: 6599 FAMILY: Web Clients RISK: HIGH NESSUS ID:62480<br />

Description: Synopsis :\n\nThe remote host contains a browser plug-in that is affected by multiple<br />

vulnerabilities.\n\nThe remote host has Adobe Flash Player installed. For your information,<br />

the observed version of Adobe Flash Player is : \n %L \n\nVersions of Flash Player earlier<br />

than 11.4.402.278 is affected by multiple vulnerabilities:\n\n - Several unspecified issues<br />

exist that can lead to buffer overflows and arbitrary code execution. (CVE-2012-5248,<br />

CVE-2012-5249, CVE-2012-5250, CVE-2012-5251, CVE-2012-5253, CVE-2012-5254,<br />

CVE-2012-5255, CVE-2012-5257, CVE-2012-5259, CVE-2012-5260, CVE-2012-5262,<br />

CVE-2012-5264, CVE-2012-5265, CVE-2012-5266, CVE-2012-5285, CVE-2012-5286,<br />

CVE-2012-5287)\n\n - Several unspecified issues exist that can lead to memory corruption<br />

and arbitrary code execution. (CVE-2012-5252, CVE-2012-5256, CVE-2012-5258,<br />

CVE-2012-5261, CVE-2012-5263, CVE-2012-5267, CVE-2012-5268, CVE-2012-5269,<br />

CVE-2012-5270, CVE-2012-5271, CVE-2012-5272)\n\n - An unspecified issue exists<br />

having unspecified impact. (CVE-2012-5673)\n<br />

Solution: Upgrade to Flash Player 11.4.402.287 or later.<br />

CVE-2012-5273<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Google Chrome < 22.0.1229.92 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6600 FAMILY: Web Clients RISK: HIGH NESSUS ID:62518<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Google Chrome is :\n %L<br />

\n\nVersions of Google Chrome earlier than 22.0.1229.92 are potentially affected by the<br />

following vulnerabilities :\n\n - An unspecified error exists related to Skia text rendering<br />

can cause the application to crash. (CVE-2012-2900)\n\n - A race condition exists related<br />

Family Internet Services 1807


to audio device handling. (CVE-2012-5108)\n\n - Out-of-bounds read errors exist related to<br />

'ICU' regular expressions and the compositor. (CVE-2012-5109, CVE-2012-5110)\n\n -<br />

The 'Pepper' plugins are missing crash monitoring. (CVE-2012-5111)\n\nSuccessful<br />

exploitation of any of these issues could lead to an application crash or even allow arbitrary<br />

code execution, subject to the user's privileges.<br />

Solution: Upgrade to Google Chrome 22.0.1229.92 or later.<br />

CVE-2012-5111<br />

Google Chrome < 22.0.1229.94 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6601 FAMILY: Web Clients RISK: HIGH NESSUS ID:62519<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Google Chrome is :\n %L<br />

\n\nVersions of Google Chrome earlier than 22.0.1229.94 are potentially affected by the<br />

following vulnerabilities :\n\n - A use-after-free error exists related to SVG handling that<br />

can be used to exploit the renderer process.(Issue #154983) \n\n - An unspecified error<br />

exists related to IPC handling that can allow an attacker to escape the application sandbox.<br />

(Issue #154987)\n\nSuccessful exploitation of any of these issues could lead to an<br />

application crash or even allow arbitrary code execution, subject to the user's privileges.<br />

Solution: Upgrade to Google Chrome 22.0.1229.94 or later.<br />

Mozilla Firefox 15.x <<br />

CVE-2012-5112<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6602 FAMILY: Web Clients RISK: HIGH NESSUS ID:62580<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox 15.x are potentially affected by the following security issues :\n\n -<br />

Multiple memory-corruption vulnerabilities in the browser engine that could lead to<br />

arbitrary code execution. (CVE-2012-3982, CVE-2012-3983, CVE-2012-4191)\n\n - A<br />

URI-spoofing vulnerability due to an error when handling the '' dropdown menu.<br />

This issue can be exploited to display arbitrary content while showing the URL of another<br />

site. An attacker can also exploit this issue to cause click jacking attacks. (CVE-2012-3984,<br />

CVE-2012-5354)\n\n - A security-bypass vulnerability exists because it fails to properly<br />

enforce the same-origin policy. Specifically, the error occurs when handling<br />

'document.domain'. An attacker can exploit this issue to execute cross-site scripting attacks.<br />

(CVE-2012-3985)\n\n - Multiple security bypass vulnerabilities exists in the<br />

'nsDOMWindowUtils' methods. (CVE-2012-3986)\n\n - A cross-site scripting vulnerability<br />

exists because it fails to sufficiently sanitize user-supplied input. Specifically, this issue<br />

occurs when transitioning into Reader Mode. Note: This issue affects only Firefox for<br />

Android. CVE-2012-3987)\n\n - A use-after-free issue occurs when invoking full screen<br />

mode and navigating backwards in history. (CVE-2012-3988)\n\n - A denial-of-service<br />

vulnerability that occurs due to invalid cast error. Specifically, this issue occurs when using<br />

the instanceof operator on certain JavaScript objects. (CVE-2012-3989)\n\n - A<br />

Family Internet Services 1808


security-bypass vulnerability exists because it fails to properly enforce the cross-origin<br />

policy. Specifically, this issue occurs when invoking the 'GetProperty()' function through<br />

JSAPI. An attacker can exploit this issue to perform arbitrary code-execution.<br />

(CVE-2012-3991)\n\n - A cross-site scripting vulnerability exists because it fails to<br />

sufficiently sanitize user-supplied input. Specifically, this issue occurs when handling the<br />

'location' property through binary plugins. (CVE-2012-3994)\n\n - A security-bypass<br />

vulnerability exists because of an error in the Chrome Object Wrapper (COW) when<br />

handling the 'InstallTrigger' object. An attacker can exploit this issue to access certain<br />

privileged functions and properties. (CVE-2012-4184, CVE-2012-3993)\n\n - An arbitrary<br />

code-execution occurs when handling the 'location.hash' property and history navigation.<br />

(CVE-2012-3992)\n\n - An out-of-bounds read error affects the<br />

'IsCSSWordSpacingSpace()' function. (CVE-2012-3995)\n\n - A use-after-free error affects<br />

the 'nsHTMLCSSUtils::CreateCSSPropertyTxn()' function. (CVE-2012-4179)\n\n - A<br />

heap-based buffer-overflow vulnerability exists in the<br />

'nsHTMLEditor::IsPrevCharInNodeWhitespace()' function. (CVE-2012-4180)\n\n - A<br />

use-after-free error affects the 'nsSMILAnimationController::DoSample()' function.<br />

(CVE-2012-4181)\n\n - A use-after-free error affects the 'nsTextEditRules::WillInsert()'<br />

function. (CVE-2012-4182)\n\n - A use-after-free error affects the<br />

'DOMSVGTests::GetRequiredFeatures()' function. (CVE-2012-4183)\n\n - A<br />

buffer-overflow vulnerability exists in the 'nsCharTraits::length()' function.<br />

(CVE-2012-4185)\n\n - A heap-based buffer-overflow vulnerability exists in the<br />

'nsWaveReader::DecodeAudioData()" function. (CVE-2012-4186)\n\n - A<br />

memory-corruption vulnerability exists in the 'insPos' property. (CVE-2012-4187)\n\n - A<br />

heap-based buffer-overflow exists in the 'Convolve3x3()' function. (CVE-2012-4188)\n\n -<br />

A use-after-free error affects the 'nsIContent::GetNameSpaceID()' function.<br />

(CVE-2012-3990)\n\n - A cross domain information disclosure exists due to improper<br />

access to the 'location' object. (CVE-2012-4192)\n\n - A security-bypass vulnerability<br />

exists due to an error in security wrappers does not unwrap the 'defaultValue()' function<br />

properly. An attacker can exploit this issue to gain access to the 'location' object.<br />

(CVE-2012-4193)\nThese vulnerabilities allow attackers to execute arbitrary script or<br />

HTML code, steal cookie-based authentication credentials, conduct phishing attacks,<br />

execute arbitrary code in the context of the vulnerable application, crash affected<br />

applications, obtain potentially sensitive information, gain escalated privileges, bypass<br />

security restrictions, and perform unauthorized actions; other attacks may also be possible.<br />

Solution: Upgrade to Firefox 16.0 or later.<br />

CVE-2012-5354<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla SeaMonkey 2.x < 2.13 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6603 FAMILY: Web Clients RISK: HIGH NESSUS ID:62583<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox 16.x are potentially affected by the following security issues :\n\n -<br />

Multiple memory-corruption vulnerabilities in the browser engine that could lead to<br />

arbitrary code execution. (CVE-2012-3982, CVE-2012-3983, CVE-2012-4191)\n\n - A<br />

URI-spoofing vulnerability due to an error when handling the '' dropdown menu.<br />

This issue can be exploited to display arbitrary content while showing the URL of another<br />

Family Internet Services 1809


site. An attacker can also exploit this issue to cause click jacking attacks.<br />

(CVE-2012-3984)\n\n - A security-bypass vulnerability exists because it fails to properly<br />

enforce the same-origin policy. Specifically, the error occurs when handling<br />

'document.domain'. An attacker can exploit this issue to execute cross-site scripting attacks.<br />

(CVE-2012-3985)\n\n - Multiple security bypass vulnerabilities exists in the<br />

'nsDOMWindowUtils' methods. (CVE-2012-3986)\n\n - A cross-site scripting vulnerability<br />

exists because it fails to sufficiently sanitize user-supplied input. Specifically, this issue<br />

occurs when transitioning into Reader Mode. Note: This issue affects only Firefox for<br />

Android. CVE-2012-3987)\n\n - A use-after-free issue occurs when invoking full screen<br />

mode and navigating backwards in history. (CVE-2012-3988)\n\n - A denial-of-service<br />

vulnerability that occurs due to invalid cast error. Specifically, this issue occurs when using<br />

the instanceof operator on certain JavaScript objects. (CVE-2012-3989)\n\n - A<br />

security-bypass vulnerability exists because it fails to properly enforce the cross-origin<br />

policy. Specifically, this issue occurs when invoking the 'GetProperty()' function through<br />

JSAPI. An attacker can exploit this issue to perform arbitrary code-execution.<br />

(CVE-2012-3991)\n\n - A cross-site scripting vulnerability exists because it fails to<br />

sufficiently sanitize user-supplied input. Specifically, this issue occurs when handling the<br />

'location' property through binary plugins. (CVE-2012-3994)\n\n - A security-bypass<br />

vulnerability exists because of an error in the Chrome Object Wrapper (COW) when<br />

handling the 'InstallTrigger' object. An attacker can exploit this issue to access certain<br />

privileged functions and properties. (CVE-2012-4184, CVE-2012-3993)\n\n - An arbitrary<br />

code-execution occurs when handling the 'location.hash' property and history navigation.<br />

(CVE-2012-3992)\n\n - An out-of-bounds read error affects the<br />

'IsCSSWordSpacingSpace()' function. (CVE-2012-3995)\n\n - A use-after-free error affects<br />

the 'nsHTMLCSSUtils::CreateCSSPropertyTxn()' function. (CVE-2012-4179)\n\n - A<br />

heap-based buffer-overflow vulnerability exists in the<br />

'nsHTMLEditor::IsPrevCharInNodeWhitespace()' function. (CVE-2012-4180)\n\n - A<br />

use-after-free error affects the 'nsSMILAnimationController::DoSample()' function.<br />

(CVE-2012-4181)\n\n - A use-after-free error affects the 'nsTextEditRules::WillInsert()'<br />

function. (CVE-2012-4182)\n\n - A use-after-free error affects the<br />

'DOMSVGTests::GetRequiredFeatures()' function. (CVE-2012-4183)\n\n - A<br />

buffer-overflow vulnerability exists in the 'nsCharTraits::length()' function.<br />

(CVE-2012-4185)\n\n - A heap-based buffer-overflow vulnerability exists in the<br />

'nsWaveReader::DecodeAudioData()" function. (CVE-2012-4186)\n\n - A<br />

memory-corruption vulnerability exists in the 'insPos' property. (CVE-2012-4187)\n\n - A<br />

heap-based buffer-overflow exists in the 'Convolve3x3()' function. (CVE-2012-4188)\n\n -<br />

A use-after-free error affects the 'nsIContent::GetNameSpaceID()' function.<br />

(CVE-2012-3990)\n\n - A cross domain information disclosure exists due to improper<br />

access to the 'location' object. (CVE-2012-4192)\n\n - A security-bypass vulnerability<br />

exists due to an error in security wrappers does not unwrap the 'defaultValue()' function<br />

properly. An attacker can exploit this issue to gain access to the 'location' object.<br />

(CVE-2012-4193)\nThese vulnerabilities allow attackers to execute arbitrary script or<br />

HTML code, steal cookie-based authentication credentials, conduct phishing attacks,<br />

execute arbitrary code in the context of the vulnerable application, crash affected<br />

applications, obtain potentially sensitive information, gain escalated privileges, bypass<br />

security restrictions, and perform unauthorized actions; other attacks may also be possible.<br />

Solution: Upgrade to SeaMonkey 2.13 or later.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1810


CVE-2012-5354<br />

Mozilla Thunderbird 15.x <<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6604 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:62582<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox 16.x are potentially affected by the following security issues :\n\n -<br />

Multiple memory-corruption vulnerabilities in the browser engine that could lead to<br />

arbitrary code execution. (CVE-2012-3982, CVE-2012-3983, CVE-2012-4191)\n\n - A<br />

URI-spoofing vulnerability due to an error when handling the '' dropdown menu.<br />

This issue can be exploited to display arbitrary content while showing the URL of another<br />

site. An attacker can also exploit this issue to cause click jacking attacks. (CVE-2012-3984,<br />

CVE-2012-5354)\n\n - A security-bypass vulnerability exists because it fails to properly<br />

enforce the same-origin policy. Specifically, the error occurs when handling<br />

'document.domain'. An attacker can exploit this issue to execute cross-site scripting attacks.<br />

(CVE-2012-3985)\n\n - Multiple security bypass vulnerabilities exists in the<br />

'nsDOMWindowUtils' methods. (CVE-2012-3986)\n\n - A cross-site scripting vulnerability<br />

exists because it fails to sufficiently sanitize user-supplied input. Specifically, this issue<br />

occurs when transitioning into Reader Mode. Note: This issue affects only Firefox for<br />

Android. CVE-2012-3987)\n\n - A use-after-free issue occurs when invoking full screen<br />

mode and navigating backwards in history. (CVE-2012-3988)\n\n - A denial-of-service<br />

vulnerability that occurs due to invalid cast error. Specifically, this issue occurs when using<br />

the instanceof operator on certain JavaScript objects. (CVE-2012-3989)\n\n - A<br />

security-bypass vulnerability exists because it fails to properly enforce the cross-origin<br />

policy. Specifically, this issue occurs when invoking the 'GetProperty()' function through<br />

JSAPI. An attacker can exploit this issue to perform arbitrary code-execution.<br />

(CVE-2012-3991)\n\n - A cross-site scripting vulnerability exists because it fails to<br />

sufficiently sanitize user-supplied input. Specifically, this issue occurs when handling the<br />

'location' property through binary plugins. (CVE-2012-3994)\n\n - A security-bypass<br />

vulnerability exists because of an error in the Chrome Object Wrapper (COW) when<br />

handling the 'InstallTrigger' object. An attacker can exploit this issue to access certain<br />

privileged functions and properties. (CVE-2012-4184, CVE-2012-3993)\n\n - An arbitrary<br />

code-execution occurs when handling the 'location.hash' property and history navigation.<br />

(CVE-2012-3992)\n\n - An out-of-bounds read error affects the<br />

'IsCSSWordSpacingSpace()' function. (CVE-2012-3995)\n\n - A use-after-free error affects<br />

the 'nsHTMLCSSUtils::CreateCSSPropertyTxn()' function. (CVE-2012-4179)\n\n - A<br />

heap-based buffer-overflow vulnerability exists in the<br />

'nsHTMLEditor::IsPrevCharInNodeWhitespace()' function. (CVE-2012-4180)\n\n - A<br />

use-after-free error affects the 'nsSMILAnimationController::DoSample()' function.<br />

(CVE-2012-4181)\n\n - A use-after-free error affects the 'nsTextEditRules::WillInsert()'<br />

function. (CVE-2012-4182)\n\n - A use-after-free error affects the<br />

'DOMSVGTests::GetRequiredFeatures()' function. (CVE-2012-4183)\n\n - A<br />

buffer-overflow vulnerability exists in the 'nsCharTraits::length()' function.<br />

(CVE-2012-4185)\n\n - A heap-based buffer-overflow vulnerability exists in the<br />

'nsWaveReader::DecodeAudioData()" function. (CVE-2012-4186)\n\n - A<br />

memory-corruption vulnerability exists in the 'insPos' property. (CVE-2012-4187)\n\n - A<br />

heap-based buffer-overflow exists in the 'Convolve3x3()' function. (CVE-2012-4188)\n\n -<br />

A use-after-free error affects the 'nsIContent::GetNameSpaceID()' function.<br />

(CVE-2012-3990)\n\n - A cross domain information disclosure exists due to improper<br />

Family Internet Services 1811


access to the 'location' object. (CVE-2012-4192)\n\n - A security-bypass vulnerability<br />

exists due to an error in security wrappers does not unwrap the 'defaultValue()' function<br />

properly. An attacker can exploit this issue to gain access to the 'location' object.<br />

(CVE-2012-4193)\n These vulnerabilities allow attackers to execute arbitrary script or<br />

HTML code, steal cookie-based authentication credentials, conduct phishing attacks,<br />

execute arbitrary code in the context of the vulnerable application, crash affected<br />

applications, obtain potentially sensitive information, gain escalated privileges, bypass<br />

security restrictions, and perform unauthorized actions; other attacks may also be possible.<br />

Solution: Upgrade to Thunderbird 16.0.1 or later.<br />

BigFix Client Detection<br />

CVE-2012-5354<br />

<strong>PVS</strong> ID: 6605 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a BigFix Client which is controlled by the server at %L<br />

Solution: N/A<br />

CVE Not available<br />

BigFix Client Version Detection<br />

<strong>PVS</strong> ID: 6606 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a BigFix Client version %L<br />

Solution: N/A<br />

BigFix Server Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 6607 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a BigFix server<br />

Solution: N/A<br />

BigFix Server Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 6608 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a BigFix server which has a deployment serial number of %L<br />

Solution: N/A<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1812


MySQL Server 5.5.x <<br />

CVE Not available<br />

<strong>PVS</strong> ID: 6609 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:62640<br />

Description: Synopsis :\n\nThe remote database server is vulnerable to multiple attack vectors.\n\nFor<br />

your information, the observed version of MySQL Community server is \n %L \n\nThe<br />

version of MySQL 5.5 / 5.1 installed on the remote host is earlier than 5.5.26 / 5.1.64. As<br />

such, it is reportedly affected by the following vulnerabilities:\n\n - An exploitable<br />

vulnerability which allows successful authenticated network attacks via multiple protocols,<br />

can cause in some cases a Denial-of-Service.<br />

Solution: Upgrade to MySQL Community Server 5.5.26 / 5.1.64 later.<br />

MySQL Server 5.5.x <<br />

CVE-2012-3173<br />

<strong>PVS</strong> ID: 6610 FAMILY: Database RISK: HIGH NESSUS ID:62641<br />

Description: Synopsis :\n\nThe remote database server is vulnerable to multiple attack vectors.\n\nFor<br />

your information, the observed version of MySQL Community server is \n %L \n\nThe<br />

version of MySQL 5.5 / 5.1 installed on the remote host is earlier than 5.5.27 / 5.1.65. As<br />

such, it is reportedly affected by the following vulnerabilities:\n\n - An exploitable<br />

vulnerability which allows successful authenticated network attacks via multiple protocols.<br />

In some cases it can cause a Denial-of-Service or result in execution of arbitrary code.<br />

Solution: Upgrade to MySQL Community Server 5.5.27 / 5.1.65 later.<br />

MySQL Server 5.5.x <<br />

CVE-2012-3197<br />

<strong>PVS</strong> ID: 6611 FAMILY: Database<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:62642<br />

Description: Synopsis :\n\nThe remote database server is vulnerable to multiple attack vectors.\n\nFor<br />

your information, the observed version of MySQL Community server is \n %L \n\nThe<br />

version of MySQL 5.5 / 5.1 installed on the remote host is earlier than 5.5.28 / 5.1.66. As<br />

such, it is reportedly affected by the following vulnerabilities:\n\n - An exploitable<br />

vulnerability requiring logon to the Operating System which can result in unauthorized read<br />

access to a subset of MySQL Server accessible data. (CVE-2012-3160)\n\n - An<br />

exploitable vulnerability which allows successful authenticated network attacks via<br />

multiple protocols. A successful attack of this vulnerability can result in a<br />

Denial-of-Service. (CVE-2012-3177, CVE 2012-3180)\n<br />

Solution: Upgrade to MySQL Community Server 5.5.28 / 5.1.66 later.<br />

Family Internet Services 1813


CVE-2012-3180<br />

BigFix Client Patch Update<br />

<strong>PVS</strong> ID: 6612 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a BigFix client downloading the following patches from the BigFix<br />

server<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Mozilla SeaMonkey 2.13.x < 2.13.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6613 FAMILY: Web Clients RISK: HIGH NESSUS ID:62747<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

vulnerabilities.\n\nFor your information, the observed version of SeaMonkey is : \n %L<br />

\n\nVersions of SeaMonkey 2.13.1 and earlier are potentially affected by the following<br />

security issues :\n\n - The true value of 'window.location' can be shadowed by user content<br />

through the use of the 'valueOf' method, which can be combined with some plugins to<br />

perform cross-site scripting attacks. (CVE-2012-4194)\n\n - The 'CheckURL' function of<br />

'window.location' can be forced to return the wrong calling document and principal,<br />

allowing a cross-site scripting attack. (CVE-2012-4195)\n\n - It is possible to use property<br />

injection by prototype to bypass security wrapper protections on the 'Location' object,<br />

allowing the cross-origin reading of the 'Location' object. (CVE-2012-4196)\n<br />

Solution: Upgrade to SeaMonkey 2.13.2 or later.<br />

CVE-2012-4196<br />

Mozilla Thunderbird 16.x < 16.0.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6614 FAMILY: SMTP Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:62746<br />

Description: Synopsis :\n\nThe remote host has a mail client installed that is vulnerable to multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Thunderbird is : \n %L<br />

\n\nVersions earlier than Thunderbird 16.0.2 are potentially affected by the following<br />

security issues :\n\n - The true value of 'window.location' can be shadowed by user content<br />

through the use of the 'valueOf' method, which can be combined with some plugins to<br />

perform cross-site scripting attacks. (CVE-2012-4194)\n\n - The 'CheckURL' function of<br />

'window.location' can be forced to return the wrong calling document and principal,<br />

allowing a cross-site scripting attack. (CVE-2012-4195)\n\n - It is possible to use property<br />

injection by prototype to bypass security wrapper protections on the 'Location' object,<br />

allowing the cross-origin reading of the 'Location' object. (CVE-2012-4196)\n<br />

Solution: Upgrade to Thunderbird 16.0.2 or later.<br />

Family Internet Services 1814


CVE-2012-4196<br />

Apple iOS < 6.0.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6615 FAMILY: Web Clients RISK: HIGH NESSUS ID:62803<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is an iPhone, iPod Touch, or iPad running iOS. For your information, the observed version<br />

of iOS is : \n %L \n\nVersions of iOS < 6.0.1 are potentially affected by multiple<br />

vulnerabilities. Apple iOS 6.0.1 contains security fixes for the following products :\n\n -<br />

Kernel extension API responses containing an 'OSBundleMachOHeaders' key may include<br />

kernel addresses, which can aid in further attacks. (CVE-2012-3749)\n\n - The lock screen<br />

can provide 'Passbook' data to an attacker having physical device access but not a passcode.<br />

(CVE-2012-3750)\n\n - A time-of-check-to-time-of-use issue in the handling of JavaScript<br />

array in WebKit could lead to arbitrary, remote code execution. (CVE-2012-3748)\n\n - A<br />

use-after-free issue in the handling of SVG images in WebKit code could lead to arbitrary,<br />

remote code execution. (CVE-2012-5112)\n<br />

Solution: Upgrade to iOS 6.0.1 or later.<br />

CVE-2012-5112<br />

Google Chrome < 23.0.1271.64 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6616 FAMILY: Web Clients RISK: HIGH NESSUS ID:62861<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Google Chrome is :\n %L<br />

\n\nVersions of Google Chrome earlier than 23.0.1271.64 are potentially affected by the<br />

following vulnerabilities :\n\n - Use-after-free errors exist related to SVG filter handling,<br />

video layout, extension tab handling and plug-in placeholder handling. (CVE-2012-5116,<br />

CVE-2012-5121, CVE-2012-5125, CVE-2012-5126)\n\n - An error exists related to<br />

inappropriate SVG subresource loading in the 'img' context. (CVE-2012-5117)\n\n - A race<br />

condition exists related to 'Pepper' buffer handling. (CVE-2012-5119)\n\n - A bad cast error<br />

exists related to input handling. (CVE-2012-5122)\n\n - Out-of-bounds reads exist related<br />

to Skia. (CVE-2012-5123)\n\n - A memory corruption error exists related to texture<br />

handling. (CVE-2012-5124)\n\n - An integer overflow error exists related to 'WebP'<br />

handling. This error can lead to out-of-bounds reads. (CVE-2012-5127)\n\n - An improper<br />

write error exists related to the 'v8' JavaScript engine. (CVE-2012-5128)\n\nSuccessful<br />

exploitation of any of these issues could lead to an application crash or even allow arbitrary<br />

code execution, subject to the user's privileges.\n<br />

Solution: Upgrade to Google Chrome 23.0.1271.64 or later.<br />

CVE-2012-5128<br />

Steam Valve Client Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6617 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1815


Description: Synopsis :\n\nThe remote host is running a gaming console.\n\nThe remote host is running<br />

the Steam Valve Client. Steam Valve is an entertainment platform used for gaming, chat,<br />

and more. The remote version is %L<br />

Solution: Ensure that such usage is authorized with respect to existing policies and guidelines<br />

CVE Not available<br />

Opera < 12.10 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6618 FAMILY: Web Clients RISK: HIGH NESSUS ID:62821<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable by multiple<br />

vulnerabilities.\n\nThe remote host is running the Opera web browser. For your<br />

information, the observed version of Opera is : \n %L \n\nVersions of Opera earlier than<br />

12.10 are potentially affected by the following vulnerabilities :\n\n - An error exists related<br />

to certificate revocation checking that can allow the application to indicate that a site is<br />

secure even though the check has not completed. (1029)\n\n - An error exists related to<br />

Cross-Origin Resource Sharing (CORS) handling that can allow specially crafted requests<br />

to aid in disclosing sensitive data. (1030)\n\n - An error exists related to data URIs that<br />

allows bypassing of the 'Same Origin Policy' and cross-site scripting attacks. (1031)\n\n -<br />

An error exists related to SVG image handling that can result in arbitrary code execution.<br />

(1033)\n\n - Two unspecified errors exist having unspecified impact.<br />

Solution: Upgrade to Opera 12.10 or later.<br />

2012-6467<br />

Microsoft Office365 Access<br />

<strong>PVS</strong> ID: 6619 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client has initiated an SSL session to the Microsoft office365 portal<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

QuickTime < 7.7.3 Multiple Vulnerabilities (Windows)<br />

<strong>PVS</strong> ID: 6620 FAMILY: Web Clients RISK: HIGH NESSUS ID:62890<br />

Description: Synopsis :\n\nThe remote host contains an application that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of QuickTime is %L.\n\nVersions<br />

of QuickTime earlier thanolder than 7.7.3 are affected by the following vulnerabilities :\n\n<br />

- A buffer overflow exists in the handling of REGION records in PICT files.<br />

(CVE-2011-1374)\n\n - A memory corruption issue exists in the handling of PICT files.<br />

(CVE-2012-3757)\n\n - A use-after-free issue exists in the QuickTime plugin's handling of<br />

'_qtactivex_' parameters within an HTML object element. (CVE-2012-3751)\n\n - A buffer<br />

overflow exists in the handling of the transform attribute in text3GTrack elements in<br />

TeXML files. (CVE-2012-3758)\n\n - Multiple buffer overflows exist in the handling of<br />

Family Internet Services 1816


style elements in TeXML files. (CVE-2012-3752)\n\n - A buffer overflow exists in the<br />

handling of MIME types. (CVE-2012-3753)\n\n - A use-after-free issue exists in the<br />

QuickTime ActiveX control's handling of the 'Clear()' method. (CVE-2012-3754)\n\n - A<br />

buffer overflow exists in the handling of Targa image files. (CVE-2012-3755)\n\n - A<br />

buffer overflow exists in the handling of 'rnet' boxes in MP4 files.<br />

(CVE-2012-3756)\nSuccessful exploitation of these issues could result in program<br />

termination or arbitrary code execution, subject to the user's privileges.<br />

Solution: Upgrade to QuickTime 7.7.3 or later.<br />

CVE-2012-3758<br />

Opera < 12.11 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6621 FAMILY: Web Clients RISK: HIGH NESSUS ID:62984<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable by multiple<br />

vulnerabilities.\n\nThe remote host is running the Opera web browser. For your<br />

information, the observed version of Opera is : \n %L \n\nVersions of Opera earlier than<br />

12.11 are potentially affected by the following vulnerabilities :\n\n - A heap-based buffer<br />

overflow error exists related to handling HTTP responses that can lead to application<br />

crashes or arbitrary code execution. (1036)\n\n - An issue exists related to the application's<br />

error handling that can allow a malicious website to determine the existence of and path to<br />

local files. (1037)<br />

Solution: Upgrade to Opera 12.11 or later.<br />

CVE Not available<br />

Mac OS X : Safari < 6.0.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6622 FAMILY: Web Clients RISK: HIGH NESSUS ID:62802<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by several<br />

vulnerabilities.\n\nThe remote Mac OS X host has Safari installed. For your information,<br />

the observed version of Safari is: \n %L \n\nVersions of Safari earlier than 6.0.2 are<br />

reportedly affected by several issues :\n\n - A time-of-check-to-time-of-use issue in the<br />

handling of JavaScript array in WebKit could lead to arbitrary, remote code execution.<br />

(CVE-2012-3748)\n\n - A use-after-free issue in the handling of SVG images in WebKit<br />

code could lead to arbitrary, remote code execution. (CVE-2012-5112)<br />

Solution: Upgrade to Safari 6.0.2 or later.<br />

CVE-2012-5112<br />

Apache Tomcat 7.0.x < 7.0.28 Header Parsing Remote Denial of Service<br />

<strong>PVS</strong> ID: 6623 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:62985<br />

Family Internet Services 1817


Description: Synopsis :\n\nThe remote web server is affected by a remote denial of service<br />

vulnerabily.\n\nFor your information, the observed version of Apache Tomcat installed on<br />

the remote host is : \n %L \n\nVersions of Tomcat 7.0.x earlier than 7.0.28 are potentially<br />

affected by a remote denial of service vulnerability:\n\n - A flaw exists within the<br />

parseHeaders() function that could allow for a crafted header to cause a remote denial of<br />

service (CVE-2012-2733)\n\n - An error exists related to the 'NIO' connector when HTTPS<br />

and 'sendfile' are enabled that can force the application into an infinite loop.<br />

(CVE-2012-4534)<br />

Solution: Upgrade to Apache Tomcat 7.0.28 or later.<br />

CVE-2012-4534<br />

Apache Tomcat 7.0.x < 7.0.30 DIGEST Authentication Multiple <strong>Security</strong> Weaknesses<br />

<strong>PVS</strong> ID: 6624 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:62988<br />

Description: Synopsis :\n\nThe remote web server is affected by multiple security weaknesses.\n\nFor<br />

your information, the observed version of Apache Tomcat installed on the remote host is :<br />

\n %L \n\nVersions of Tomcat 7.0.x earlier than 7.0.30 are potentially affected by the<br />

following vulnerabilities:\n\n - Replay-countermeasure functionality in HTTP Digest<br />

Access Authentication tracks cnonce values instead of nonce values, which makes it easier<br />

for attackers to bypass access restrictions by sniffing the network for valid requests.<br />

(CVE-2012-5885)\n\n - HTTP Digest Access Authentication implementation caches<br />

information about the authenticated user, which could potentially allow an attacker to<br />

bypass authentication via session ID. (CVE-2012-5886)\n\n - HTTP Digest Access<br />

Authentication implementation does not properly check for stale nonce values with<br />

enforcement of proper credentials, which allows an attacker to bypass restrictions by<br />

sniffing requests. (CVE-2012-5887)<br />

Solution: Upgrade to Apache Tomcat 7.0.30 or later.<br />

Mozilla Firefox 16.x <<br />

CVE-2012-5887<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6625 FAMILY: Web Clients RISK: HIGH NESSUS ID:62998<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox 16.x are potentially affected by the following security issues :\n\n -<br />

Several memory safety bugs exist in the browser engine used in Mozilla-based products<br />

that could be exploited to execute arbitrary code. (CVE-2012-5842, CVE-2012-5843)\n\n -<br />

An error exists in the method 'image::RasterImage::DrawFrameTo' related to GIF images<br />

that could allow a heap-based buffer overflow, leading to arbitrary code execution.<br />

(CVE-2012-4202)\n\n - An error exists related to SVG text and CSS properties that could<br />

lead to application crashes. (CVE-2012-5836)\n\n - A bookmarked, malicious 'javascript:'<br />

URL could allow execution of local executables. (CVE-2012-4203)\n\n - The JavaScript<br />

function 'str_unescape' could allow arbitrary code execution. (CVE-2012-4204)\n\n -<br />

Family Internet Services 1818


'XMLHttpRequest' objects inherit incorrect principals when created in sandboxes that could<br />

allow cross-site request forgery attacks (XSRF). (CVE-2012-4205)\n\n - An error exists<br />

related to the application installer and DLL loading. (CVE-2012-4206)\n\n -<br />

'XrayWrappers' can expose DOM properties that are not meant to be accessible outside of<br />

the chrome compartment. (CVE-2012-4208)\n\n - Errors exist related to 'evalInSandbox',<br />

'HZ-GB-2312' charset, frames and the 'location' object, the 'Style Inspector', 'Developer<br />

Toolbar' and 'cross-origin wrappers' that could allow cross-site scripting (XSS) attacks.<br />

(CVE-2012-4201, CVE-2012-4207, CVE-2012-4209, CVE-2012-4210, CVE-2012-5837,<br />

CVE-2012-5841)\n\n - Various use-after-free, out-of-bounds read and buffer overflow<br />

errors exist that could potentially lead to arbitrary code execution. (CVE-2012-4212,<br />

CVE-2012-4213, CVE-2012-4214, CVE-2012-4215, CVE-2012-4216, CVE-2012-4217,<br />

CVE-2012-4218, CVE-2012-5829, CVE-2012-5830, CVE-2012-5833, CVE-2012-5835,<br />

CVE-2012-5838, CVE-2012-5839, CVE-2012-5840)<br />

Solution: Upgrade to Firefox 17.0 or later.<br />

CVE-2012-5843<br />

Mozilla SeaMonkey 2.x <<br />

<strong>PVS</strong> ID: 6626 FAMILY: Web Clients RISK: HIGH NESSUS ID:63001<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

vulnerabilities.\n\nFor your information, the observed version of SeaMonkey is: \n %L<br />

\n\nVersions of SeaMonkey 2.13.x are potentially affected by the following security issues<br />

:\n\n - Several memory safety bugs exist in the browser engine used in Mozilla-based<br />

products that could be exploited to execute arbitrary code. (CVE-2012-5842,<br />

CVE-2012-5843)\n\n - An error exists in the method 'image::RasterImage::DrawFrameTo'<br />

related to GIF images that could allow a heap-based buffer overflow leading to arbitrary<br />

code execution. (CVE-2012-4202)\n\n - An error exists related to SVG text and CSS<br />

properties that could lead to application crashes. (CVE-2012-5836)\n\n - The JavaScript<br />

function 'str_unescape' could allow arbitrary code execution. (CVE-2012-4204)\n\n -<br />

'XMLHttpRequest' objects inherit incorrect principals when created in sandboxes that could<br />

allow cross-site request forgery attacks (XSRF). (CVE-2012-4205)\n\n - 'XrayWrappers'<br />

can expose DOM properties that are not meant to be accessible outside of the chrome<br />

compartment. (CVE-2012-4208)\n\n - Errors exist related to 'evalInSandbox',<br />

'HZ-GB-2312' charset, frames and the 'location' object, and 'cross-origin wrappers' that can<br />

allow cross-site scripting (XSS) attacks. (CVE-2012-4201, CVE-2012-4207,<br />

CVE-2012-4209, CVE-2012-5841)\n\n - Various use-after-free, out-of-bounds read and<br />

buffer overflow errors exist that could potentially lead to arbitrary code execution.<br />

(CVE-2012-4212, CVE-2012-4213, CVE-2012-4214, CVE-2012-4215, CVE-2012-4216,<br />

CVE-2012-4217, CVE-2012-4218, CVE-2012-5829, CVE-2012-5830, CVE-2012-5833,<br />

CVE-2012-5835, CVE-2012-5838, CVE-2012-5839, CVE-2012-5840)<br />

Solution: Upgrade to SeaMonkey 2.14 or later.<br />

CVE-2012-5843<br />

Mozilla Thunderbird 16.x <<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1819


<strong>PVS</strong> ID: 6627 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:63000<br />

Description: Synopsis :\n\nThe remote host has a mail client installed that is vulnerable to multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Thunderbird is : \n %L<br />

\n\nVersions of Thunderbird 16.x are potentially affected by the following security issues<br />

:\n\n - Several memory safety bugs exist in the browser engine used in Mozilla-based<br />

products that could be exploited to execute arbitrary code. (CVE-2012-5842,<br />

CVE-2012-5843)\n\n - An error exists in the method 'image::RasterImage::DrawFrameTo'<br />

related to GIF images that could allow a heap-based buffer overflow, leading to arbitrary<br />

code execution. (CVE-2012-4202)\n\n - An error exists related to SVG text and CSS<br />

properties that could lead to application crashes. (CVE-2012-5836) - The JavaScript<br />

function 'str_unescape' could allow arbitrary code execution. (CVE-2012-4204)\n\n -<br />

'XMLHttpRequest' objects inherit incorrect principals when created in sandboxes that could<br />

allow cross-site request forgery attacks (XSRF). (CVE-2012-4205)\n\n - 'XrayWrappers'<br />

can expose DOM properties that are not meant to be accessible outside of the chrome<br />

compartment. (CVE-2012-4208)\n\n - Errors exist related to 'evalInSandbox',<br />

'HZ-GB-2312' charset, frames and the 'location' object, and 'cross-origin wrappers' that<br />

could allow cross-site scripting (XSS) attacks. (CVE-2012-4201, CVE-2012-4207,<br />

CVE-2012-4209 CVE-2012-5841)\n\n - Various use-after-free, out-of-bounds read and<br />

buffer overflow errors exist that could potentially lead to arbitrary code execution.<br />

(CVE-2012-4212, CVE-2012-4213, CVE-2012-4214, CVE-2012-4215, CVE-2012-4216,<br />

CVE-2012-4217, CVE-2012-4218, CVE-2012-5829, CVE-2012-5830, CVE-2012-5833,<br />

CVE-2012-5835, CVE-2012-5838, CVE-2012-5839, CVE-2012-5840)<br />

Solution: Upgrade to Thunderbird 17.0 or later.<br />

CVE-2012-5843<br />

Google Chrome < 23.0.1271.91 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6628 FAMILY: Web Clients RISK: HIGH NESSUS ID:63063<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Google Chrome is :\n %L<br />

\n\nVersions of Google Chrome earlier than 23.0.1271.91 are potentially affected by the<br />

following vulnerabilities :\n\n - An out-of-bounds read error exists related to 'Skia'.<br />

(CVE-2012-5130)\n\n - An unspecified error exists related to chunked encoding that can<br />

result in application crashes. (CVE-2012-5132)\n\n - Use-after-free errors exist related to<br />

'SVG' filters and printing. (CVE-2012-5133, CVE-2012-5135)\n\n - A buffer underflow<br />

error exists related to 'libxml'. (CVE-2012-5134)\n\n - A cast error exists related to input<br />

element handling. (CVE-2012-5136)\nSuccessful exploitation of any of these issues could<br />

lead to an application crash or even allow arbitrary code execution, subject to the user's<br />

privileges.<br />

Solution: Upgrade to Google Chrome 23.0.1271.91 or later.<br />

CVE-2012-5136<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Google Chrome < 23.0.1271.95 Multiple Vulnerabilities<br />

Family Internet Services 1820


<strong>PVS</strong> ID: 6629 FAMILY: Web Clients RISK: HIGH NESSUS ID:63110<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Google Chrome is :\n %L<br />

\n\nVersions of Google Chrome earlier than 23.0.1271.95 are potentially affected by the<br />

following vulnerabilities :\n\n - A use-after-free error exists related to media source<br />

handling. (CVE-2012-5137)\n\n - An unspecified error exists related to file path handling.<br />

(CVE-2012-5138)\nSuccessful exploitation of either of these issues could lead to an<br />

application crash or even allow arbitrary code execution, subject to the user's privileges.<br />

Solution: Upgrade to Google Chrome 23.0.1271.95 or later.<br />

CVE-2012-5138<br />

Confidential data on server<br />

<strong>PVS</strong> ID: 6630 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is dispensing confidential data %L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Confidential data on server<br />

<strong>PVS</strong> ID: 6631 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is dispensing confidential data %L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Confidential data on server<br />

<strong>PVS</strong> ID: 6632 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is dispensing confidential data %L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Confidential data on server<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1821


<strong>PVS</strong> ID: 6633 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is dispensing confidential data %L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Confidential data on server<br />

<strong>PVS</strong> ID: 6634 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is dispensing confidential data %L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Confidential data on server<br />

<strong>PVS</strong> ID: 6635 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is dispensing confidential data %L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Confidential data on server<br />

<strong>PVS</strong> ID: 6636 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is dispensing confidential data %L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Confidential data on server<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6637 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1822


Description: The remote server is dispensing confidential data %L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Confidential data on server<br />

<strong>PVS</strong> ID: 6638 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is dispensing confidential data %L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Samsung / Dell Printer SNMP Backdoor<br />

<strong>PVS</strong> ID: 6639 FAMILY: Backdoors RISK: HIGH NESSUS ID:63136<br />

Description: Synopsis :\n\nThe remote host has a backdoor administrator account\n\nThe remote host<br />

appears to be a Samsung printer, or a Dell printer manufactured by Samsung. It has a<br />

hardcoded SNMP read-write community string that allows access even when SNMP has<br />

been disabled in the printer management utility. A remote, unauthenticated attacker could<br />

exploit this to take control of the printer.<br />

Solution: Apply an optional firmware update. Contact the device's vendor for more information. In<br />

addition one can, disable SNMPv1/v2 on the printer and instead use the secure SNMPv3<br />

mode<br />

CVE-2012-4964<br />

DHCPv6 client detection<br />

<strong>PVS</strong> ID: 6640 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is a DHCPv6 client<br />

Solution: N/A<br />

CVE Not available<br />

DHCPv6 server detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6641 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1823


Description: The remote server is a DHCPv6 server<br />

Solution: N/A<br />

CVE Not available<br />

Tectia SSH Server Authentication Bypass<br />

<strong>PVS</strong> ID: 6642 FAMILY: SSH RISK: HIGH NESSUS ID:63156<br />

Description: Synopsis :\n\nThe remote SSH server is vulnerable to an authentication bypass<br />

vulnerability\n\nFor your information, the observed version of Tectia SSH Server is: \n %L<br />

\n\nVersion of Tectia SSH server earlier than 6.3.3 / 6.2.6 / 6.1.13 / 6.0.20 are vulnerable.<br />

A remote, unauthenticated attacker can bypass authentication by sending a specially crafted<br />

request, allowing the attackerto authenticate as root.\n\nThe software is only vulnerable<br />

when running on Unix or Unix-like operating systems.<br />

Solution: Upgrade to Tectia SSH server 6.3.3 / 6.2.6 / 6.1.13 / 6.0.20. Additionally one can disable<br />

password authentication in the ssh-server-config.xml configuration file (this file needs to be<br />

created if it does not already exists)<br />

CVE-2012-5975<br />

Google Chrome < 23.0.1271.97 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6643 FAMILY: Web Clients RISK: HIGH NESSUS ID:63232<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Google Chrome is :\n %L<br />

\n\nVersions of Google Chrome earlier than 23.0.1271.97 are potentially affected by the<br />

following vulnerabilities :\n\n - Use-after-free errors exist related to visibility events and<br />

the URL loader. (CVE-2012-5139, CVE-2012-5140)\n - An unspecified error exists related<br />

to instantiation of the 'Chromoting' client plugin. (CVE-2012-5141)\n - An unspecified<br />

error exists related to history navigation that can lead to application crashes.<br />

(CVE-2012-5142)\n - An integer overflow error exists related to the 'PPAPI' image buffers.<br />

(CVE-2012-5143)\n - A stack corruption error exists related to 'AAC' decoding.<br />

(CVE-2012-5144)\n - The bundled version of Adobe Flash Player contains flaws that can<br />

lead to arbitrary code execution. (CVE-2012-5676, CVE-2012-5677, CVE-2012-5678)<br />

Solution: Upgrade to Google Chrome 23.0.1271.97 or later.<br />

CVE-2012-5678<br />

Apache Tomcat 7.0.x < 7.0.32 CSRF Filter Bypass<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6644 FAMILY: Web Servers RISK: HIGH NESSUS ID:63200<br />

Description: Synopsis :\n\nThe remote web server is affected by a security bypass vulnerability.\n\nFor<br />

your information, the observed version of Apache Tomcat installed on the remote host is :<br />

\n %L \n\nVersions of Tomcat 7.0.x earlier than 7.0.32 are potentially affected by the<br />

following vulnerability:\n\n - An error exists in the file 'filters/CsrfPreventionFilter.java'<br />

Family Internet Services 1824


that can allow cross-site request forgery (CSRF) attacks to bypass the filtering. This can<br />

allow access to protected resources without a session identifier.<br />

Solution: Upgrade to Apache Tomcat 7.0.32 or later.<br />

Flash Player <<br />

CVE-2012-4431<br />

<strong>PVS</strong> ID: 6645 FAMILY: Web Clients RISK: HIGH NESSUS ID:63242<br />

Description: Synopsis :\n\nThe remote host contains a browser plug-in that is affected by multiple<br />

vulnerabilities.\n\nThe remote host has Adobe Flash Player installed. For your information,<br />

the observed version of Adobe Flash Player is : \n %L \n\nVersions of Flash Player 11.x<br />

equal to or earlier than 11.5.502.110, or 10.x equal to or earlier than 10.3.183.43 are<br />

affected by multiple vulnerabilities:\n\n - An unspecified error exists that can allow a buffer<br />

overflow and arbitrary code execution. (CVE-2012-5676)\n\n - An unspecified error exists<br />

that can allow an integer overflow and arbitrary code execution. (CVE-2012-5677)\n\n - An<br />

unspecified error exists that can lead to memory corruption and arbitrary code execution.<br />

(CVE-2012-5678)<br />

Solution: Upgrade to Flash Player 10.3.183.48 / 11.5.502.135 or later.<br />

Flash Player <<br />

CVE-2012-5678<br />

<strong>PVS</strong> ID: 6646 FAMILY: Web Clients RISK: HIGH NESSUS ID:63242<br />

Description: Synopsis :\n\nThe remote host contains a browser plug-in that is affected by multiple<br />

vulnerabilities.\n\nThe remote host has Adobe Flash Player installed. For your information,<br />

the observed version of Adobe Flash Player is : \n %L \n\nVersions of Flash Player 11.x<br />

equal to or earlier than 11.5.502.110, or 10.x equal to or earlier than 10.3.183.43 are<br />

affected by multiple vulnerabilities:\n\n - An unspecified error exists that can allow a buffer<br />

overflow and arbitrary code execution. (CVE-2012-5676)\n\n - An unspecified error exists<br />

that can allow an integer overflow and arbitrary code execution. (CVE-2012-5677)\n\n - An<br />

unspecified error exists that can lead to memory corruption and arbitrary code execution.<br />

(CVE-2012-5678)<br />

Solution: Upgrade to Flash Player 10.3.183.48 / 11.5.502.135 or later.<br />

Flash Player <<br />

CVE-2012-5678<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6647 FAMILY: Web Clients RISK: HIGH NESSUS ID:63242<br />

Description: Synopsis :\n\nThe remote host contains a browser plug-in that is affected by multiple<br />

vulnerabilities.\n\nThe remote host has Adobe Flash Player installed. For your information,<br />

the observed version of Adobe Flash Player is : \n %L \n\nVersions of Flash Player 11.x<br />

equal to or earlier than 11.5.502.110, or 10.x equal to or earlier than 10.3.183.43 are<br />

Family Internet Services 1825


affected by multiple vulnerabilities:\n\n - An unspecified error exists that can allow a buffer<br />

overflow and arbitrary code execution. (CVE-2012-5676)\n\n - An unspecified error exists<br />

that can allow an integer overflow and arbitrary code execution. (CVE-2012-5677)\n\n - An<br />

unspecified error exists that can lead to memory corruption and arbitrary code execution.<br />

(CVE-2012-5678)<br />

Solution: Upgrade to Flash Player 10.3.183.48 / 11.5.502.135 or later.<br />

CVE-2012-5678<br />

iPhone App Install Detected<br />

<strong>PVS</strong> ID: 8002 FAMILY: Mobile Devices RISK: INFO NESSUS ID:Not Available<br />

Description: An iPhone device on the network was detected installing a program from the iTunes store.<br />

The newly installed program was : \n %L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Opera < 12.12 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6649 FAMILY: Web Clients RISK: HIGH NESSUS ID:63301<br />

Description: Synopsis :\n\nThe remote host is running the Opera web browser. For your information, the<br />

observed version of Opera is : \n %L \n\nVersions of Opera earlier than 12.12 is reportedly<br />

affected by the following vulnerabilities :\n\n - An error exists related to GIF image file<br />

handling that can allow heap memory corruption and can lead to application crashes or<br />

arbitrary code execution. (1038)\n\n - An information-disclosure vulnerability exists due to<br />

improper profile folder permissions, that can allow access to read the sensitive contents of<br />

profile files such as cache, password, and Opera's configuration files. (This issue affects<br />

only Opera Linux/Unix) (1039)\n\n - An error exists related to URL handling and the<br />

address bar that can allow rapid, repeated web requests to cause the incorrect URL to be<br />

displayed. (1040)<br />

Solution: Upgrade to Opera 12.12 or later.<br />

CVE-2012-6472<br />

Netsuite Client Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6650 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote client is accessing the Netsuite cloud services.\n\nThe remote<br />

client is running the Netsuite application. Netsuite is a 'cloud' service which allows<br />

companies to manage business data remotely.<br />

Family Internet Services 1826


Solution: N/A<br />

CVE Not available<br />

Instagram Upload Activity Detected<br />

<strong>PVS</strong> ID: 6651 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is utilizing an Instagram application to upload a photo. Instagram is a free<br />

photo-sharing application for mobile devices that can publish photos on Facebook, Twitter,<br />

and Tumblr, as well as its native application interface. The user has uploaded the image<br />

using the following username : %L<br />

realtimeonly<br />

Solution: Ensure that such activity is authorized for your network<br />

CVE Not available<br />

Real <strong>Network</strong>s RealPlayer < 16.0.0.282 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6652 FAMILY: Web Clients RISK: HIGH NESSUS ID:63289<br />

Description: Synopsis :\n\nThe remote host is running a multimedia application that is vulnerable to<br />

multiple vulnerabilities.\n\nThe remote host is running RealPlayer application. For your<br />

information, the observed build of RealPlayer is:\n %L .\n\nRealPlayer builds earlier than<br />

16.0.0.282 are potentially affected by multiple vulnerabilities :\n\n - An error exists related<br />

to 'RealAudio' handling and invalid pointers that can allow arbitrary code execution.<br />

(CVE-2012-5690)\n\n - An error exists related to 'RealMedia' handling that can allow a<br />

buffer overflow leading to arbitrary code execution. (CVE-2012-5691)<br />

Solution: Upgrade to RealPlayer 16.0.0.282 or later.<br />

CVE-2012-5691<br />

MySQL Server 5.1 < 5.1.63 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6653 FAMILY: Database<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:61393<br />

Description: Synopsis :\n\nThe remote database server is vulnerable to multiple attack vectors.\n\nFor<br />

your information, the observed version of MySQL Community Server is : \n %L \n\nThe<br />

version of MySQL 5.1 installed on the remote host is earlier than 5.1.63 and is, therefore,<br />

affected by the following vulnerabilities :\n\n - Several errors exist related to 'GIS<br />

Extension' and 'Server Optimizer' components that can allow denial of service attacks.<br />

(CVE-2012-0540, CVE-2012-1689, CVE-2012-1734)\n\n - A security bypass vulnerability<br />

exists that occurs due to improper casting during user login sessions. (Bug #64884 /<br />

CVE-2012-2122)\n\n - An error exists related to key length and sort order index that can<br />

lead to application crashes. (Bug #59387 / CVE-2012-2749)<br />

Solution: Upgrade to MySQL Community Server 5.1.63 later<br />

Family Internet Services 1827


Flash Player <<br />

CVE-2012-2749<br />

<strong>PVS</strong> ID: 6654 FAMILY: Web Clients RISK: HIGH NESSUS ID:62836<br />

Description: Synopsis :\n\nThe remote host contains a browser plug-in that is affected by multiple<br />

vulnerabilities.\n\nThe remote host has Adobe Flash Player installed. For your information,<br />

the observed version of Adobe Flash Player is : \n %L \n\nVersions of Flash Player 11.x<br />

equal to or earlier than 11.4.402.287, or 10.x equal to or earlier than 10.3.183.29 are<br />

affected by multiple vulnerabilities:\n\n - Several unspecified issues exist that can lead to<br />

buffer overflows and arbitrary code execution. (CVE-2012-5274, CVE-2012-5275,<br />

CVE-2012-5276, CVE-2012-5277, CVE-2012-5280)\n\n - An unspecified security bypass<br />

issue exists that can lead to arbitrary code execution. (CVE-2012-5278)\n\n - An<br />

unspecified issue exists that can lead to memory corruption and arbitrary code execution.<br />

(CVE-2012-5279)<br />

Solution: Upgrade to Flash Player 10.3.183.43 / 11.5.502.110 or later.<br />

Flash Player <<br />

CVE-2012-5280<br />

<strong>PVS</strong> ID: 6655 FAMILY: Web Clients RISK: HIGH NESSUS ID:62836<br />

Description: Synopsis :\n\nThe remote host contains a browser plug-in that is affected by multiple<br />

vulnerabilities.\n\nThe remote host has Adobe Flash Player installed. For your information,<br />

the observed version of Adobe Flash Player is : \n %L \n\nVersions of Flash Player 11.x<br />

equal to or earlier than 11.4.402.287, or 10.x equal to or earlier than 10.3.183.29 are<br />

affected by multiple vulnerabilities:\n\n - Several unspecified issues exist that can lead to<br />

buffer overflows and arbitrary code execution. (CVE-2012-5274, CVE-2012-5275,<br />

CVE-2012-5276, CVE-2012-5277, CVE-2012-5280)\n\n - An unspecified security bypass<br />

issue exists that can lead to arbitrary code execution. (CVE-2012-5278)\n\n - An<br />

unspecified issue exists that can lead to memory corruption and arbitrary code execution.<br />

(CVE-2012-5279)<br />

Solution: Upgrade to Flash Player 10.3.183.43 / 11.5.502.110 or later.<br />

Flash Player <<br />

CVE-2012-5280<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6656 FAMILY: Web Clients RISK: HIGH NESSUS ID:62836<br />

Description: Synopsis :\n\nThe remote host contains a browser plug-in that is affected by multiple<br />

vulnerabilities.\n\nThe remote host has Adobe Flash Player installed. For your information,<br />

the observed version of Adobe Flash Player is : \n %L \n\nVersions of Flash Player 11.x<br />

equal to or earlier than 11.4.402.287, or 10.x equal to or earlier than 10.3.183.29 are<br />

affected by multiple vulnerabilities:\n\n - Several unspecified issues exist that can lead to<br />

buffer overflows and arbitrary code execution. (CVE-2012-5274, CVE-2012-5275,<br />

Family Internet Services 1828


CVE-2012-5276, CVE-2012-5277, CVE-2012-5280)\n\n - An unspecified security bypass<br />

issue exists that can lead to arbitrary code execution. (CVE-2012-5278)\n\n - An<br />

unspecified issue exists that can lead to memory corruption and arbitrary code execution.<br />

(CVE-2012-5279)<br />

Solution: Upgrade to Flash Player 10.3.183.43 / 11.5.502.110 or later.<br />

CVE-2012-5280<br />

Apache Tomcat 6.0.x < 6.0.36 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6657 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:62987<br />

Description: Synopsis :\n\nThe remote web server is affected by multiple vunerabilities.\n\nFor your<br />

information, the observed version of Apache Tomcat 6.0 installed on the remote host is : \n<br />

%L \n\nVersions earlier than Apache Tomcat 6.0.36 are potentially affected by multiple<br />

vulnerabilities :\n\n - A flaw exists within the parseHeaders() function that could allow for<br />

a crafted header to cause a remote denial of service. (CVE-2012-2733)\n\n - An error exists<br />

related to FORM authentication that can allow security bypass if 'j_security_check' is<br />

appended to the request. (CVE-2012-3546)\n\n - An error exists in the file<br />

'filters/CsrfPreventionFilter.java' that can allow cross-site request forgery (CSRF) attacks to<br />

bypass the filtering. This can allow access to protected resources without a session<br />

identifier. (CVE-2012-4431)\n\n - An error exists related to the 'NIO' connector when<br />

HTTPS and 'sendfile' are enabled that can force the application into an infinite loop.<br />

(CVE-2012-4534)\n\n - Replay-countermeasure functionality in HTTP Digest Access<br />

Authentication tracks cnonce values instead of nonce values, which makes it easier for<br />

attackers to bypass access restrictions by sniffing the network for valid requests.<br />

(CVE-2012-5885)\n\n - HTTP Digest Access Authentication implementation caches<br />

information about the authenticated user, which could potentially allow an attacker to<br />

bypass authentication via session ID. (CVE-2012-5886)\n\n - HTTP Digest Access<br />

Authentication implementation does not properly check for stale nonce values with<br />

enforcement of proper credentials, which allows an attacker to bypass restrictions by<br />

sniffing requests. (CVE-2012-5887)<br />

Solution: Upgrade to Apache Tomcat 6.0.36 or later.<br />

CVE-2012-5887<br />

VLC Media Player < 2.0.5 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6658 FAMILY: Web Clients RISK: HIGH NESSUS ID:63381<br />

Description: Synopsis :\n\nThe remote host contains an application that is affected by multiple<br />

vulnerabilities\n\nThe remote host contains VLC player, a multi-media application. For<br />

your information, the observed version of VLC is : \n %L .\n\nVersions of VLC media<br />

player earlier than 2.0.5 are potentially affected by the following vulnerabilities :\n\n - An<br />

error exists in the file 'modules/codec/subsdec.c' ('libsubsdec_plugin.dll') that does not<br />

properly validate input and can allow a buffer overflow. Opening a specially crafted file<br />

can result in the execution of arbitrary code. Note that the subtitles feature must be enabled<br />

Family Internet Services 1829


for successful exploitation.\n\n - An error exists related to the 'freetype' renderer that does<br />

not properly validate input and can allow a buffer overflow. Opening a specially crafted file<br />

can result in the execution of arbitrary code.\n\n - Unspecified errors exist related to<br />

'libaiff_plugin.dll' and to the 'SWF' demuxer that have unspecified impact.<br />

Solution: Upgrade to VLC Media Player version 2.0.5 or later.<br />

CVE Not available<br />

Red Hat Satellite Client Communication<br />

<strong>PVS</strong> ID: 6659 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Red Hat Satellite client communicating with a Red Hat Satellite server<br />

in order to perform various administrative tasks.<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Red Hat Satellite Client Communication<br />

<strong>PVS</strong> ID: 6660 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Red Hat Satellite client communicating with a Red Hat Satellite server<br />

in order to perform various administrative tasks. This pertains to package downloads from<br />

the server.<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Red Hat Satellite Server Communication<br />

<strong>PVS</strong> ID: 6661 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Red Hat Satellite server communicating with a Red Hat Satellite client<br />

in order to perform various administrative tasks.<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Red Hat Satellite Server Communication Channel Detection - Server-Side<br />

Family Internet Services 1830


<strong>PVS</strong> ID: 6662 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Red Hat Satellite server communicating with a Red Hat Satellite client<br />

in order to perform various administrative task. Server-Side Channel Detection.<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Google Chrome < 24.0.1312.52 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6663 FAMILY: Web Clients RISK: HIGH NESSUS ID:63468<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Google Chrome is :\n %L<br />

\n\nVersions of Google Chrome earlier than 24.0.1312.52 are potentially affected by the<br />

following vulnerabilities :\n\n - Use-after-free errors exist related to SVG layout, DOM<br />

handling, video seeking, PDF fields and printing. (CVE-2012-5145, CVE-2012-5147,<br />

CVE-2012-5150, CVE-2012-5156, CVE-2013-0832)\n\n - An error related to malformed<br />

URLs can allow a Same Origin Policy (SOP) bypass, thereby allowing cross-site scripting<br />

attacks. (CVE-2012-5146)\n\n - A user-input validation error exists related to filenames<br />

and hyphenation support. (CVE-2012-5148)\n\n - Integer overflow errors exist related to<br />

audio IPC handling, PDF JavaScript and shared memory allocation. (CVE-2012-5149,<br />

CVE-2012-5151, CVE-2012-5154)\n\n - Out-of-bounds read errors exist related to video<br />

seeking, PDF image handling, printing and glyph handling. (CVE-2012-5152,<br />

CVE-2012-5157, CVE-2012-0833, CVE-2012-0834)\n\n - An out-of-bounds stack access<br />

error exists in the v8 JavaScript engine. (CVE-2012-5153)\n\n - A casting error exists<br />

related to PDF 'root' handling. (CVE-2013-0828)\n\n - An unspecified error exists that can<br />

corrupt database metadata leading to incorrect file access. (CVE-2013-0829)\n\n - An error<br />

exists related to IPC and 'NUL' termination. (CVE-2013-0830)\n\n - An error exists related<br />

to extensions that may allow improper path traversals. (CVE-2013-0831)\n\n - An<br />

unspecified error exists related to geolocation. (CVE-2013-0835)\n\n - An unspecified error<br />

exists related to garbage collection in the v8 JavaScript engine. (CVE-2013-0836)\n\n - An<br />

unspecified error exists related to extension tab handling. (CVE-2013-0837)\n\n - The<br />

bundled version of Adobe Flash Player contains flaws that can lead to arbitrary code<br />

execution. (CVE-2013-0630)\nSuccessful exploitation of some of these issues could lead to<br />

an application crash or even allow arbitrary code execution, subject to the user's privileges.<br />

Solution: Upgrade to Google Chrome 24.0.1312.52 or later.<br />

Oracle Java SE 7 <<br />

CVE-2013-0837<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6664 FAMILY: Web Clients RISK: HIGH NESSUS ID:63521<br />

Family Internet Services 1831


Description: Synopsis :\n\nThe remote Windows host contains a programming platform that is affected<br />

by a code execution vulnerability.\n\nThe remote host is running Java version : %L. This<br />

version of Oracle (formerly Sun) Java SE or Java for Business installed on the remote host<br />

is 7 Update 10 or earlier and is, therefore, potentially affected by the following security<br />

issues:\n\n - An unspecified issue exists in the Libraries component. (CVE-2012-3174)\n\n<br />

- An error exists in the 'MBeanInstantiator.findClass' method that could allow remote,<br />

arbitrary code execution. (CVE-2013-0422)\n\nNote that, according the advisory, these<br />

issues apply to client deployments of Java only and can only be exploited through untrusted<br />

'Java Web Start' applications and untrusted Java applets<br />

Solution: Update to JDK / JRE 7 Update 11 or later and, if necessary, remove any affected versions.<br />

Flash Player <<br />

CVE-2013-0422<br />

<strong>PVS</strong> ID: 6665 FAMILY: Web Clients RISK: HIGH NESSUS ID:63450<br />

Description: Synopsis :\n\nThe remote host has Adobe Flash player installed. For your information, the<br />

observed version of Adobe Flash Player is : \n %L \n\nVersions 10.x equal to or earlier<br />

than 10.3.183.48 or earlier than 11.5.502.135 is potentially affected by an unspecified<br />

buffer overflow that could lead to arbitrary code execution. (CVE-2013-0630)<br />

Solution: Upgrade to Flash Player 10.3.183.50 / 11.5.502.146 or later, or Google Chrome<br />

PepperFlash 11.5.31.137 or later.<br />

Flash Player <<br />

CVE-2013-0630<br />

<strong>PVS</strong> ID: 6666 FAMILY: Web Clients RISK: HIGH NESSUS ID:63450<br />

Description: Synopsis :\n\nThe remote host has Adobe Flash player installed. For your information, the<br />

observed version of Adobe Flash Player is : \n %L \n\nVersions 10.x equal to or earlier<br />

than 10.3.183.48 or earlier than 11.5.502.135 is potentially affected by an unspecified<br />

buffer overflow that could lead to arbitrary code execution. (CVE-2013-0630)<br />

Solution: Upgrade to Flash Player 10.3.183.50 / 11.5.502.146 or later, or Google Chrome<br />

PepperFlash 11.5.31.137 or later.<br />

Flash Player <<br />

CVE-2013-0630<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6667 FAMILY: Web Clients RISK: HIGH NESSUS ID:63450<br />

Description: Synopsis :\n\nThe remote host has Adobe Flash player installed. For your information, the<br />

observed version of Adobe Flash Player is : \n %L \n\nVersions 10.x equal to or earlier<br />

than 10.3.183.48 or earlier than 11.5.502.135 is potentially affected by an unspecified<br />

buffer overflow that could lead to arbitrary code execution. (CVE-2013-0630)<br />

Family Internet Services 1832


Solution: Upgrade to Flash Player 10.3.183.50 / 11.5.502.146 or later, or Google Chrome<br />

PepperFlash 11.5.31.137 or later.<br />

Mozilla Firefox 17.x <<br />

CVE-2013-0630<br />

<strong>PVS</strong> ID: 6668 FAMILY: Web Clients RISK: HIGH NESSUS ID:63551<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox 17.x are potentially affected by the following security issues :\n\n -<br />

Multiple, unspecified use-after-free, out-of-bounds read and buffer overflow errors exist.<br />

(CVE-2012-5829, CVE-2013-0760, CVE-2013-0761, CVE-2013-0762, CVE-2013-0763,<br />

CVE-2013-0766, CVE-2013-0767, CVE-2013-0771)\n\n - Two intermediate certificates<br />

were improperly issued by TURKTRUST certificate authority. (CVE-2013-0743)\n\n - A<br />

use-after-free error exists related to displaying HTML tables with many columns and<br />

column groups. (CVE-2013-0744)\n\n - An error exists related to the<br />

'AutoWrapperChanger' class that does not properly manage objects during garbage<br />

collection. (CVE-2012-0745)\n\n - An error exists related to 'jsval', 'quickstubs', and<br />

compartmental mismatches that can lead potentially exploitable crashes.<br />

(CVE-2013-0746)\n\n - Errors exist related to events in the plugin handler that can allow<br />

same-origin policy bypass. (CVE-2013-0747)\n\n - An error related to the 'toString' method<br />

of XBL objects can lead to address information leakage. (CVE-2013-0748)\n\n - An<br />

unspecified memory corruption issue exists. (CVE-2013-0749, CVE-2013-0769,<br />

CVE-2013-0770)\n\n - A buffer overflow exists related to JavaScript string concatenation.<br />

(CVE-2013-0750)\n\n - An error exists related to multiple XML bindings with SVG<br />

content, contained in XBL files. (CVE-2013-0752)\n\n - A use-after-free error exists<br />

related to 'XMLSerializer' and 'serializeToStream'. (CVE-2013-0753)\n\n - A use-after-free<br />

error exists related to garbage collection and 'ListenManager'. (CVE-2013-0754)\n\n - A<br />

use-after-free error exists related to the 'Vibrate' library and 'domDoc'.<br />

(CVE-2013-0755)\n\n - A use-after-free error exists related to JavaScript 'Proxy' objects.<br />

(CVE-2013-0756)\n\n - 'Chrome Object Wrappers' (COW) can be bypassed by changing<br />

object prototypes and can allow arbitrary code execution. (CVE-2013-0757)\n\n - An error<br />

related to SVG elements and plugins can allow privilege escalation. (CVE-2013-0758)\n\n<br />

- An error exists related to the address bar that can allow URL spoofing attacks.<br />

(CVE-2013-0759)\n\n - An error exists related to SSL and threading that can result in<br />

potentially exploitable crashes. (CVE-2013-0764)\n\n - An error exists related to 'Canvas'<br />

and bad height or width values passed to it from HTML. (CVE-2013-0768)<br />

Solution: Upgrade to Firefox 18.0 or later.<br />

CVE-2013-0771<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Thunderbird 17.x < 17.0.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6669 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:63553<br />

Family Internet Services 1833


Description: Synopsis :\n\nThe remote host has a mail client installed that is vulnerable to multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Thunderbird is : \n %L<br />

\n\nVersions of Thunderbird less than 17.0.2 are potentially affected by the following<br />

security issues :\n\n - Two intermediate certificates were improperly issued by<br />

TURKTRUST certificate authority. (CVE-2013-0743)\n\n - A use-after-free error exists<br />

related to displaying HTML tables with many columns and column groups.<br />

(CVE-2013-0744)\n\n - An error exists related to the 'AutoWrapperChanger' class that does<br />

not properly manage objects during garbage collection. (CVE-2012-0745)\n\n - An error<br />

exists related to 'jsval', 'quickstubs', and compartmental mismatches that could lead to<br />

potentially exploitable crashes. (CVE-2013-0746)\n\n - Errors exist related to events in the<br />

plugin handler that could allow same-origin policy bypass. (CVE-2013-0747)\n\n - An<br />

error related to the 'toString' method of XBL objects could lead to address information<br />

leakage. (CVE-2013-0748)\n\n - An unspecified memory corruption issue exists.<br />

(CVE-2013-0749, CVE-2013-0769)\n\n - A buffer overflow exists related to JavaScript<br />

string concatenation. (CVE-2013-0750)\n\n - An error exists related to multiple XML<br />

bindings with SVG content, contained in XBL files. (CVE-2013-0752)\n\n - A<br />

use-after-free error exists related to 'XMLSerializer' and 'serializeToStream'.<br />

(CVE-2013-0753)\n\n - A use-after-free error exists related to garbage collection and<br />

'ListenManager'. (CVE-2013-0754)\n\n - A use-after-free error exists related to the 'Vibrate'<br />

library and 'domDoc'. (CVE-2013-0755)\n\n - A use-after-free error exists related to<br />

JavaScript 'Proxy' objects. (CVE-2013-0756)\n\n - 'Chrome Object Wrappers' (COW) can<br />

be bypassed by changing object prototypes, which could allow arbitrary code execution.<br />

(CVE-2013-0757)\n\n - An error related to SVG elements and plugins could allow<br />

privilege escalation. (CVE-2013-0758)\n\n - An error exists related to the address bar that<br />

could allow URL spoofing attacks. (CVE-2013-0759)\n\n - Multiple, unspecified<br />

use-after-free, out-of-bounds read and buffer overflow errors exist. (CVE-2013-0761,<br />

CVE-2013-0762, CVE-2013-0763, CVE-2013-0766, CVE-2013-0767,<br />

CVE-2013-0771)\n\n - An error exists related to SSL and threading that could result in<br />

potentially exploitable crashes. (CVE-2013-0764)\n\n - An error exists related to 'Canvas'<br />

and bad height or width values passed to it from HTML. (CVE-2013-0768)<br />

Solution: Upgrade to Thunderbird 17.0.2 or later.<br />

CVE-2013-0771<br />

Mozilla SeaMonkey 2.x <<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6670 FAMILY: Web Clients RISK: HIGH NESSUS ID:63554<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

vulnerabilities.\n\nFor your information, the observed version of SeaMonkey is: \n %L<br />

\n\nVersions of SeaMonkey 2.14.x are potentially affected by the following security issues<br />

:\n\n - Multiple, unspecified use-after-free, out-of-bounds read and buffer overflow errors<br />

exist. (CVE-2012-5829, CVE-2013-0760, CVE-2013-0761, CVE-2013-0762,<br />

CVE-2013-0763, CVE-2013-0766, CVE-2013-0767, CVE-2013-0771)\n\n - Two<br />

intermediate certificates were improperly issued by TURKTRUST certificate authority.<br />

(CVE-2013-0743)\n\n - A use-after-free error exists related to displaying HTML tables<br />

with many columns and column groups. (CVE-2013-0744)\n\n - An error exists related to<br />

the 'AutoWrapperChanger' class that does not properly manage objects during garbage<br />

collection. (CVE-2012-0745)\n\n - An error exists related to 'jsval', 'quickstubs', and<br />

Family Internet Services 1834


compartmental mismatches that can lead potentially exploitable crashes.<br />

(CVE-2013-0746)\n\n - Errors exist related to events in the plugin handler that can allow<br />

same-origin policy bypass. (CVE-2013-0747)\n\n - An error related to the 'toString' method<br />

of XBL objects can lead to address information leakage. (CVE-2013-0748)\n\n - An<br />

unspecified memory corruption issue exists. (CVE-2013-0749, CVE-2013-0769,<br />

CVE-2013-0770)\n\n - A buffer overflow exists related to JavaScript string concatenation.<br />

(CVE-2013-0750)\n\n - An error exists related to multiple XML bindings with SVG<br />

content, contained in XBL files. (CVE-2013-0752)\n\n - A use-after-free error exists<br />

related to 'XMLSerializer' and 'serializeToStream'. (CVE-2013-0753)\n\n - A use-after-free<br />

error exists related to garbage collection and 'ListenManager'. (CVE-2013-0754)\n\n - A<br />

use-after-free error exists related to the 'Vibrate' library and 'domDoc'.<br />

(CVE-2013-0755)\n\n - A use-after-free error exists related to JavaScript 'Proxy' objects.<br />

(CVE-2013-0756)\n\n - 'Chrome Object Wrappers' (COW) can be bypassed by changing<br />

object prototypes and can allow arbitrary code execution. (CVE-2013-0757)\n\n - An error<br />

related to SVG elements and plugins can allow privilege escalation. (CVE-2013-0758)\n\n<br />

- An error exists related to the address bar that can allow URL spoofing attacks.<br />

(CVE-2013-0759)\n\n - An error exists related to SSL and threading that can result in<br />

potentially exploitable crashes. (CVE-2013-0764)\n\n - An error exists related to 'Canvas'<br />

and bad height or width values passed to it from HTML. (CVE-2013-0768)<br />

Solution: Upgrade to SeaMonkey 2.15 or later.<br />

CVE-2013-0770<br />

PHP 5.3.x < 5.3.21 cuRL X.509 Certificate Domain Name Matching MiTM Weakness<br />

<strong>PVS</strong> ID: 6671 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:63621<br />

Description: Synopsis :\n\nThe remote web server uses a version of PHP that is affected by a<br />

man-in-the-middle attack.\n\nFor your information, the version of PHP installed on the<br />

remote host is :\n %L \n\nPHP versions 5.3.x earlier than 5.3.21 are affected by a weakness<br />

in the cURL extension that call allow SSL spoofing and man-in-the-middle<br />

attacks.\n\nWhen attempting to validate a certificate, the cURL library (libcurl) fails to<br />

verify that a server hostname matches a domain name in an X.509 certificate's 'Subject<br />

Common Name' (CN) or 'SubjectAltName'.\n\nNote that this plugin does not attempt to<br />

verify whether the PHP install has been built with the cURL extention but instead relies<br />

only on PHP's self-reported version number.<br />

Solution: Upgrade to PHP version 5.3.21 or later.<br />

CVE Not available<br />

PHP 5.4.x < 5.4.11 cURL X.509 Certificate Domain Name Matching MiTM Weakness<br />

<strong>PVS</strong> ID: 6672 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:63622<br />

Family Internet Services 1835


Description: Synopsis :\n\nThe remote web server uses a version of PHP that is affected by a<br />

man-in-the-middle attack.\n\nFor your information, the version of PHP installed on the<br />

remote host is :\n %L \n\nPHP versions 5.4.x earlier than 5.4.11 are affected by a weakness<br />

in the cURL extension that call allow SSL spoofing and man-in-the-middle<br />

attacks.\n\nWhen attempting to validate a certificate, the cURL library (libcurl) fails to<br />

verify that a server hostname matches a domain name in an X.509 certificate's 'Subject<br />

Common Name' (CN) or 'SubjectAltName'.\n\nNote that this plugin does not attempt to<br />

verify whether the PHP install has been built with the cURL extention but instead relies<br />

only on PHP's self-reported version number.<br />

Solution: Upgrade to PHP version 5.4.11 or later.<br />

CVE Not available<br />

Google Chrome < 24.0.1312.56 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6673 FAMILY: Web Clients RISK: HIGH NESSUS ID:63645<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Google Chrome is :\n %L<br />

\n\nVersions of Google Chrome earlier than 24.0.1312.56 are potentially affected by the<br />

following vulnerabilities :\n\n - A use-after-free vulnerability exists related to font handling<br />

and canvas. (CVE-2013-0839)\n\n - An error exists related to URL validation and the<br />

opening of new browser windows. (CVE-2013-0840)\n\n - An array index is not properly<br />

checked in relation to content blocking. (CVE-2013-0841)\n\n - An unspecified error exists<br />

related to handling null characters in embedded paths. (CVE-2013-0842)\n\nSuccessful<br />

exploitation of some of these issues could lead to an application crash or even allow<br />

arbitrary code execution, subject to the user's privileges.<br />

Solution: Upgrade to Google Chrome 24.0.1312.56 or later.<br />

CVE-2013-0842<br />

MySQL Server 5.5.x < 5.5.29 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6674 FAMILY: Database RISK: HIGH NESSUS ID:63618<br />

Description: Synopsis :\n\nThe remote database server is affected by multiple vulnerabilities.\n\nFor<br />

your information, the observed version of MySQL server is \n %L \n\nThe version of<br />

MySQL 5.5 installed on the remote host is earlier than 5.5.29. Therefore, affected by<br />

vulnerabilities in the following components :\n\n - Information Schema\n\n - InnoDB\n\n -<br />

MyISAM\n\n - Server\n\n - Server Locking\n\n - Server Optimizer\n\n - Server Parser\n\n -<br />

Server Partition\n\n - Server Privileges\n\n - Server Replication\n\n - Stored Procedure<br />

Solution: Upgrade to MySQL Server 5.5.29 or later<br />

CVE-2013-0389<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

MySQL Server 5.1.x < 5.1.67 Multiple Vulnerabilities<br />

Family Internet Services 1836


<strong>PVS</strong> ID: 6675 FAMILY: Database RISK: HIGH NESSUS ID:63617<br />

Description: Synopsis :\n\nThe remote database server is affected by multiple vulnerabilities.\n\nFor<br />

your information, the observed version of MySQL server is \n %L \n\nThe version of<br />

MySQL 5.1 installed on the remote host is earlier than 5.1.67. Therefore, affected by<br />

vulnerabilities in the following components :\n\n - Information Schema\n\n - InnoDB\n\n -<br />

Server\n\n - Server Locking\n\n - Server Optimizer\n\n - Server Privileges\n\n - Server<br />

Replication<br />

Solution: Upgrade to MySQL Server 5.1.67 later.<br />

CVE-2013-0389<br />

Windows 8 App Store Access<br />

<strong>PVS</strong> ID: 6676 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host has access Microsoft's Windows Store. Windows Store is the digital<br />

distribution platform for Windows 8 and Windows RT OS. One can obtain free and paid<br />

applications using the Windows Store.<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

CVE Not available<br />

Windows 8 App Store Download Detected<br />

<strong>PVS</strong> ID: 6677 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host has access attempted to download an application from Microsoft's<br />

Windows Store. Windows Store is the digital distribution platform for Windows 8 and<br />

Windows RT OS. One can obtain free and paid applications using the Windows Store.<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

CVE Not available<br />

Windows 8 Tile Services Detection<br />

<strong>PVS</strong> ID: 6678 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Windows 8. It has attempted to sync data used for the windows<br />

live tiles for services such as sports, weather, news and finance. Windows 8 Live Tiles<br />

allow for live updates on various data feeds. The following service was seen to attempt to<br />

sync data :\n %L \n<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

CVE Not available<br />

Apple iOS < 6.1 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1837


<strong>PVS</strong> ID: 6679 FAMILY: Web Clients RISK: HIGH NESSUS ID:64287<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is an iPhone, iPod Touch, or iPad running iOS. For your information, the observed version<br />

of iOS is : \n %L \n\nVersions of iOS < 6.1 are potentially affected by multiple<br />

vulnerabilities. Apple iOS 6.1 contains security fixes for the following products :\n\n - An<br />

error related to 'EUC-JP' encoding could allow cross-site scripting attacks.<br />

(CVE-2011-3058)\n\n - An out-of-bounds read error exists related to 802.11i information<br />

handling that could allow remote attackers to disable Wi-Fi. (CVE-2012-2619)\n\n - An<br />

error exists related to certificate-based 'Apple ID' authentication that could allow improper<br />

trust extension. (CVE-2013-0963)\n\n - An error exists related to the 'copyin' and 'copyout'<br />

functions that could allow a user-mode process to access the first page of kernel memory.<br />

(CVE-2013-0964)\n\n - An error exists related to Mobile Safari preferences that could<br />

improperly allow JavaScript to be enabled after a user has disabled it.<br />

(CVE-2013-0974)\n\n - Many errors exist related to the bundled 'WebKit' components.<br />

(CVE-2012-2824, CVE-2012-2857, CVE-2012-2889, CVE-2012-3606, CVE-2012-3607,<br />

CVE-2012-3621, CVE-2012-3632, CVE-2012-3687, CVE-2012-3701, CVE-2013-0948,<br />

CVE-2013-0949, CVE-2013-0950, CVE-2013-0951, CVE-2013-0952, CVE-2013-0953,<br />

CVE-2013-0954, CVE-2013-0955, CVE-2013-0956, CVE-2013-0958, CVE-2013-0959,<br />

CVE-2013-0962, CVE-2013-0968)\n\n - Two intermediate certificates, improperly issued<br />

by TURKTRUST certificate authority, are incorrectly trusted.<br />

Solution: Upgrade to iOS 6.1 or later.<br />

CVE-2013-0974<br />

Opera < 12.13 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6680 FAMILY: Web Clients RISK: HIGH NESSUS ID:64363<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable by multiple<br />

vulnerabilities.\n\nThe remote host is running the Opera web browser. For your<br />

information, the observed version of Opera is : \n %L \n\nVersions of Opera earlier than<br />

12.13 are potentially affected by the following vulnerabilities :\n\n - An error exists related<br />

to DOM manipulation that could lead to application crashes or arbitrary code execution.<br />

(1042)\n\n - An error exists related to SVG 'clipPaths' that could lead to memory corruption<br />

or arbitrary code execution. (1043)\n\n - The application could fail to make the proper<br />

'pre-flight' Cross-Origin Resource Sharing (CORS) requests. In some situations this error<br />

could aid an attacker in cross-site request forgery (XSRF) attacks. (1045)\n\n - An<br />

unspecified, low severity issue exists that has an unspecified impact.<br />

Solution: Upgrade to Opera 12.13 or later.<br />

CVE-2013-1639<br />

Windows OS Version Information<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6681 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1838


Description: The remote host is running Microsoft Windows build version : %L<br />

Solution: N/A<br />

CVE Not available<br />

Email Attachment Detection (client)<br />

<strong>PVS</strong> ID: 6682 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host sent an email with the following attachment<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Barracuda <strong>Network</strong>s device detection<br />

<strong>PVS</strong> ID: 6683 FAMILY: SMTP Clients RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is a Barracuda <strong>Network</strong>s security device<br />

Solution: N/A<br />

CVE Not available<br />

Barracuda Spam Firewall version detection<br />

<strong>PVS</strong> ID: 6684 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is a security device\n\nThe remote host is running the<br />

Barracuda Spam Firewall version : %L<br />

Solution: N/A<br />

Oracle Java SE 7 <<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6685 FAMILY: Web Clients RISK: HIGH NESSUS ID:64454<br />

Description: Synopsis :\n\nThe remote Windows host contains a programming platform that is affected<br />

by multiple vulnerabilities.\n\nThe remote host is running Java version : %L. This version<br />

of Oracle (formerly Sun) Java SE or Java for Business installed on the remote host is 7<br />

Update 11 or earlier and is, therefore, potentially affected by security issues in the<br />

following components :\n\n - 2D\n\n - AWT\n\n - Beans\n\n - CORBA\n\n -<br />

Deployment\n\n - Install\n\n - JavaFX\n\n - JAXP\n\n - JAX-WS\n\n - JMX\n\n - JSSE\n\n<br />

- Libraries\n\n - <strong>Network</strong>ing\n\n - RMI\n\n - Scripting\n\n - Sound<br />

Family Internet Services 1839


Solution: Update to JDK / JRE 7 Update 13 or later and, if necessary, remove any affected versions.<br />

CVE-2013-1489<br />

Samba 3.x < 3.5.21 / 3.6.12 and 4.x < 4.0.2 SWAT Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6686 FAMILY: Samba<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:64459<br />

Description: Synopsis :\n\nThe remote Samba server is affected by multiple vulnerabilities.\n\nFor your<br />

information, the observed version of Samba is :\n %L \n\nAccording to its banner, the<br />

version of Samba 3.x or 4.x running on the remote host is earlier than 3.5.21 / 3.6.12 or<br />

4.0.2. It is, therefore, affected by the following vulnerabilities :\n\n - An error exists in the<br />

SWAT interface that could allow 'clickjacking' attacks. (CVE-2013-0213, Issue #9576)\n\n<br />

- An error exists in the SWAT interface that could allow cross-site request forgery (XSRF)<br />

attacks. (CVE-2013-0214, Issue #9577)\n\nNote that these issues are only exploitable when<br />

SWAT is enabled and it is not enabled by default.<br />

Solution: Either install the appropriate patch referenced in the project's advisory or upgrade to 3.5.21<br />

/ 3.6.12 / 4.0.2 or later<br />

Flash Player <<br />

CVE-2013-0214<br />

<strong>PVS</strong> ID: 6687 FAMILY: Web Clients RISK: HIGH NESSUS ID:64506<br />

Description: Synopsis :\n\nThe remote host contains a browser plug-in that is affected by multiple<br />

vulnerabilities.\n\nThe remote host has Adobe Flash Player installed. For your information,<br />

the observed version of Adobe Flash Player is : \n %L \n\nVersions of Flash Player 11.x<br />

equal to or earlier than 11.5.502.146, or 10.x equal to or earlier than 10.3.183.50 are<br />

affected by multiple vulnerabilities:\n\n - An unspecified error exists that could allow a<br />

buffer overflow leading to code execution. (CVE-2013-0633)\n\n - An unspecified error<br />

exists that could allow memory corruption leading to code execution. (CVE-2013-0634)<br />

Solution: Upgrade to Flash Player 10.3.183.51 / 11.5.502.149 or later.<br />

Flash Player <<br />

CVE-2013-0634<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6688 FAMILY: Web Clients RISK: HIGH NESSUS ID:64584<br />

Description: Synopsis :\n\nThe remote host contains a browser plug-in that is affected by multiple<br />

vulnerabilities.\n\nThe remote host has Adobe Flash Player installed. For your information,<br />

the observed version of Adobe Flash Player is : \n %L \n\nVersions of Flash Player 11.x<br />

equal to or earlier than 11.5.502.149, or 10.x equal to or earlier than 10.3.183.51 are<br />

affected by multiple vulnerabilities:\n\n - Several unspecified issues exist that could lead to<br />

buffer overflows and arbitrary code execution. (CVE-2013-1372, CVE-2013-0645,<br />

CVE-2013-1373, CVE-2013-1369, CVE-2013-1370, CVE-2013-1366, CVE-2013-1365,<br />

CVE-2013-1368, CVE-2013-0642, CVE-2013-1367)\n\n - Several unspecified<br />

Family Internet Services 1840


use-after-free vulnerabilities exist that could lead to remote code execution.<br />

(CVE-2013-0649, CVE-2013-1374, CVE-2013-0644)\n\n - Two unspecified issues exist<br />

that could lead to memory corruption and arbitrary code execution. (CVE-2013-0638,<br />

CVE-2013-0647)\n\n - An unspecified information disclosure vulnerability exists.<br />

(CVE-2013-0637)\n\n - An unspecified integer overflow vulnerability<br />

exists.(CVE-2013-0639)<br />

Solution: Upgrade to Flash Player 10.3.183.63 / 11.6.602.168 or later.<br />

CVE-2013-1374<br />

Siemens SIMATIC RF-MANAGER Detection (SCADA)<br />

<strong>PVS</strong> ID: 6689 FAMILY: SCADA RISK: INFO NESSUS ID:64682<br />

Description: The remote host has been identified as a Siemens SIMATIC RF-MANAGER. It is an RFID<br />

management system.<br />

Solution: Ensure that access to this server is restricted to only trusted hosts/networks<br />

CVE Not available<br />

Asterisk Peer Multiple Vulnerabilities (AST-2012-014 / AST-2012-015)<br />

<strong>PVS</strong> ID: 6690 FAMILY: Generic RISK: HIGH NESSUS ID:64717<br />

Description: Synopsis :\n\nThe remote VoIP server is affected by multiple vulnerabilities.\n\nFor your<br />

information, the observed version of Asterisk is : \n %L \n\nAccording to the version in its<br />

SIP banner, the version of Asterisk running on the remote host is potentially affected by the<br />

following vulnerabilities :\n\n - A stack-based buffer overflow error exists related to SIP,<br />

HTTP and XMPP handling over TCP. Note that in the case of 'Certified Asterisk', SIP is<br />

not affected. Further note that in the case of XMPP, an attacker must establish an<br />

authenticated session first. (CVE-2012-5976)\n\n - An error exists related to device state<br />

cache and anonymous calls that could allow system resources to be exhausted. Note this<br />

vulnerability only affects systems configured to allow anonymous calls. (CVE-2012-5977)<br />

Solution: Upgrade to Asterisk 1.8.19.1 / 10.11.1 / 11.1.2, Certified Asterisk 1.8.11-cert10 or apply<br />

the patches listed in the Asterisk advisory<br />

Mozilla Firefox 18.x <<br />

CVE-2012-5977<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6691 FAMILY: Web Clients RISK: HIGH NESSUS ID:64723<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox 18.x and older are potentially affected by the following security<br />

issues :\n\n - Numerous memory safety errors exist. (CVE-2013-0783,<br />

CVE-2013-0784)\n\n - An out-of-bounds read error exists related to the handling of GIF<br />

images. (CVE-2013-0772)\n\n - An error exists related to 'WebIDL' object wrapping that<br />

Family Internet Services 1841


has an unspecified impact. (CVE-2013-0765)\n\n - An error exists related to Chrome<br />

Object Wrappers (COW) or System Only Wrappers (SOW) that could allow security<br />

bypass. (CVE-2013-0773)\n\n - The file system location of the active browser profile could<br />

be disclosed and used in further attacks. (CVE-2013-0774)\n\n - A use-after-free error<br />

exists in the function 'nsImageLoadingContent'. (CVE-2013-0775)\n\n - Spoofing HTTPS<br />

URLs is possible due to an error related to proxy '407' responses and embedded script code.<br />

(CVE-2013-0776)\n\n - A heap-based use-after-free error exists in the function<br />

'nsDisplayBoxShadowOuter::Paint'. (CVE-2013-0777)\n\n - An out-of-bounds read error<br />

exists in the function 'ClusterIterator::NextCluster'. (CVE-2013-0778)\n\n - An<br />

out-of-bounds read error exists in the function 'nsCodingStateMachine::NextState'.<br />

(CVE-2013-0779)\n\n - A heap-based use-after-free error exists in the function<br />

'nsOverflowContinuationTracker::Finish'. (CVE-2013-0780)\n\n - A heap-based<br />

use-after-free error exists in the function 'nsPrintEngine::CommonPrint'.<br />

(CVE-2013-0781)\n\n - A heap-based buffer overflow error exists in the function<br />

'nsSaveAsCharset::DoCharsetConversion'. (CVE-2013-0782)<br />

Solution: Upgrade to Firefox 19.0 or later.<br />

CVE-2013-0784<br />

Mozilla Thunderbird 17.x < 17.0.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6692 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:64724<br />

Description: Synopsis :\n\nThe remote host has a mail client installed that is vulnerable to multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Thunderbird is : \n %L<br />

\n\nVersions of Thunderbird less than 17.0.3 are potentially affected by the following<br />

security issues :\n\n- Numerous memory safety errors exist. (CVE-2013-0783,<br />

CVE-2013-0784)\n\n - An out-of-bounds read error exists related to the handling of GIF<br />

images. (CVE-2013-0772)\n\n - An error exists related to 'WebIDL' object wrapping that<br />

has an unspecified impact. (CVE-2013-0765\n\n - An error exists related to Chrome Object<br />

Wrappers (COW) or System Only Wrappers (SOW) that could allow security bypass.<br />

(CVE-2013-0773)\n\n - The file system location of the active browser profile could be<br />

disclosed and used in further attacks. (CVE-2013-0774)\n\n - A use-after-free error exists<br />

in the function 'nsImageLoadingContent'. (CVE-2013-0775)\n\n - Spoofing HTTPS URLs<br />

is possible due to an error related to proxy '407' responses and embedded script code.<br />

(CVE-2013-0776)\n\n - A heap-based use-after-free error exists in the function<br />

'nsDisplayBoxShadowOuter::Paint'. (CVE-2013-0777)\n\n\n\n - An out-of-bounds read<br />

error exists in the function 'ClusterIterator::NextCluster'. (CVE-2013-0778)\n\n - An<br />

out-of-bounds read error exists in the function 'nsCodingStateMachine::NextState'.<br />

(CVE-2013-0779)\n\n - A heap-based use-after-free error exists in the function<br />

'nsOverflowContinuationTracker::Finish'. (CVE-2013-0780)\n\n - A heap-based<br />

use-after-free error exists in the function 'nsPrintEngine::CommonPrint'.<br />

(CVE-2013-0781)\n\n - A heap-based buffer overflow error exists in the function<br />

'nsSaveAsCharset::DoCharsetConversion'. (CVE-2013-0782)<br />

Solution: Upgrade to Thunderbird 17.0.3 or later.<br />

CVE-2013-0784<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1842


SeaMonkey < 2.16 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6693 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of SeaMonkey is<br />

%L.\n\nVersions of SeaMonkey earlier than 2.16 are potentially affected by multiple<br />

vulnerabilities :\n\n - Numerous memory safety errors exist. (CVE-2013-0783,<br />

CVE-2013-0784)\n\n - An out-of-bounds read error exists related to the handling of GIF<br />

images. (CVE-2013-0772)\n\n - An error exists related to 'WebIDL' object wrapping that<br />

has an unspecified impact. (CVE-2013-0765)\n\n - An error exists related to Chrome<br />

Object Wrappers (COW) or System Only Wrappers (SOW) that could allow security<br />

bypass. (CVE-2013-0773)\n\n - The file system location of the active browser profile could<br />

be disclosed and used in further attacks. (CVE-2013-0774)\n\n - A use-after-free error<br />

exists in the function 'nsImageLoadingContent'. (CVE-2013-0775)\n\n - Spoofing HTTPS<br />

URLs is possible due to an error related to proxy '407' responses and embedded script code.<br />

(CVE-2013-0776)\n\n - A heap-based use-after-free error exists in the function<br />

'nsDisplayBoxShadowOuter::Paint'. (CVE-2013-0777)\n\n - An out-of-bounds read error<br />

exists in the function 'ClusterIterator::NextCluster'. (CVE-2013-0778)\n\n - An<br />

out-of-bounds read error exists in the function 'nsCodingStateMachine::NextState'.<br />

(CVE-2013-0779)\n\n - A heap-based use-after-free error exists in the function<br />

'nsOverflowContinuationTracker::Finish'. (CVE-2013-0780)\n\n - A heap-based<br />

use-after-free error exists in the function 'nsPrintEngine::CommonPrint'.<br />

(CVE-2013-0781)\n\n - A heap-based buffer overflow error exists in the function<br />

'nsSaveAsCharset::DoCharsetConversion'. (CVE-2013-0782)<br />

Solution: Upgrade to Mozilla SeaMonkey 2.16 or later.<br />

CVE-2013-0784<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Google Chrome < 25.0.1364.97 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6694 FAMILY: Web Clients RISK: HIGH NESSUS ID:64813<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Google Chrome is :\n %L<br />

\n\nVersions of Google Chrome earlier than 25.0.1364.97 are potentially affected by the<br />

following vulnerabilities :\n\n - An unspecified memory corruption error exists related to<br />

'web audio node'. (CVE-2013-0879)\n\n - Use-after-free errors exist related to database and<br />

URL handling. (CVE-2013-0880, CVE-2013-0898)\n\n - Improper memory read errors<br />

exist related to Matroska, excessive SVG parameters, and Skia. (CVE-2013-0881,<br />

CVE-2013-0882, CVE-2013-0883, CVE-2013-0888)\n\n - An error exists related to<br />

improper loading of 'NaCl'. (CVE-2013-0884)\n\n - The 'web store' is granted too many<br />

API permissions. (CVE-2013-0885)\n\n - The developer tools process is granted too many<br />

permissions and trusts remote servers incorrectly. (CVE-2013-0887)\n\n - User gestures are<br />

not properly checked with respect to dangerous file downloads. (CVE-2013-0889)\n\n - An<br />

unspecified memory safety issue exists in the IPC layer. (CVE-2013-0890)\n\n - Integer<br />

overflow errors exist related to blob and 'Opus' handling. (CVE-2013-0891,<br />

CVE-2013-0899)\n\n - Numerous, unspecified, lower-severity issues exist related to the<br />

IPC layer. (CVE-2013-0892)\n\n - Race conditions exist related to media handling and<br />

ICU. (CVE-2013-0893, CVE-2013-0900)\n\n - A buffer overflow exists related to vorbis<br />

Family Internet Services 1843


decoding. (CVE-2013-0894)\n\n - Memory management errors exist related to plugin<br />

message handling. (CVE-2013-0896)\n\n - An off-by-one read error exists related to PDF<br />

handling. (CVE-2013-0897)\n\nNote that the vendor states that WebKit's MathML<br />

implementation has been disabled in this release. This is due to several unspecified, high<br />

severity security issues. Successful exploitation of some of these issues could lead to an<br />

application crash or even allow arbitrary code execution, subject to the user's privileges.<br />

Solution: Upgrade to Google Chrome 25.0.1364.97 or later.<br />

mDNS Client Queries<br />

CVE-2013-2268<br />

<strong>PVS</strong> ID: 6695 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client has issued a response query for the following resource name.<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

MAC change detection (SNMP)<br />

<strong>PVS</strong> ID: 6696 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client has just issued a trap which indicates a change of MAC Address<br />

realtimeonly<br />

Solution: Solution Not Available<br />

CVE Not available<br />

Ecava IntegraXor < 4.00.4283 ActiveX Remote Buffer Overflow (SCADA)<br />

<strong>PVS</strong> ID: 6697 FAMILY: SCADA RISK: HIGH NESSUS ID:64630<br />

Description: Synopsis :\n\nThe remote Windows host contains a SCADA application that is affected by<br />

a buffer overflow vulnerability.\n\nFor you information, the observed version of the server<br />

is : \n %L \n\nThe IntegraXor server installed on the remote host is earlier than 4.00 Build<br />

4283. As such, it is reportedly affected by a buffer overflow vulnerability in the ActiveX<br />

file 'PE3DO32A.ocx'. If an attacker can trick a user on the affected host into visiting a<br />

specially crafted web page, they may be able to leverage this issue to conduct a denial of<br />

service (DoS) or execute arbitrary code on the host subject to user's privileges.<br />

Solution: Upgrade to version 4.00.4283 or later<br />

CVE-2012-4700<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1844


Ecava IntegraXor Server Login Attempt (SCADA)<br />

<strong>PVS</strong> ID: 6698 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host has attempted to login into a Ecava IntegraXor SCADA Server. The<br />

following username and password where transmitted in clear text:\n %L \n<br />

Solution: Ensure that access to this server is restricted to only trusted hosts/networks<br />

CVE Not available<br />

Oracle Java SE Multiple Vulnerabilities (February 2013 CPU Update 1)<br />

<strong>PVS</strong> ID: 6699 FAMILY: Web Clients RISK: HIGH NESSUS ID:64790<br />

Description: Synopsis :\n\nThe remote Windows host contains a programming platform that is affected<br />

by multiple vulnerabilities.\n\nThe remote host is running Java version : %L. This version<br />

of Oracle (formerly Sun) Java SE or Java for Business installed on the remote host is earlier<br />

than 7 Update 15, 6 Update 41, 5 Update 40. It is therefore, potentially affected by security<br />

issues in the following components :\n\n - Deployment\n\n - JMX\n\n - JSSE\n\n -<br />

Libraries<br />

Solution: Update to JDK / JRE 7 Update 15, 6 update 41, 5 update 40 or later and, if necessary,<br />

remove any affected versions.<br />

CVE-2013-1487<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1845

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!