27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is missing a Mac OS X update that fixes a security<br />

issue.\n\nThe remote host is running a version of Mac OS X 10.4 that is older than version<br />

10.4.9 or a version of Mac OS X 10.3 that does not have <strong>Security</strong> Update 2007-003<br />

applied. This update contains several security fixes for the following programs :\n\n -<br />

ColorSync\n - CoreGraphics\n - Crash Reporter\n - CUPS\n - Disk Images\n - DS Plugins\n<br />

- Flash Player\n - GNU Tar\n - HFS\n - HID Family\n - ImageIO\n - Kernel\n - MySQL<br />

server\n - <strong>Network</strong>ing\n - OpenSSH\n - Printing\n - QuickDraw Manager\n - servermgrd\n<br />

- SMB File Server\n - Software Update\n - sudo \n - WebLog<br />

Solution: Upgrade to version 10.4.9 or higher.<br />

CVE-2006-4829<br />

GnuPG < 1.4.7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3948 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running GnuPG. The version of GnuPG is: \n %L \nThis version is vulnerable to a<br />

number of security and privacy flaws.<br />

Solution: Upgrade to version 1.4.7 or higher.<br />

CVE-2007-1263<br />

Apache Tomcat < 5.5.23 / 6.0.10 Directory Traversal Arbitrary File Access<br />

<strong>PVS</strong> ID: 3949 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a directory traversal flaw.\n\nThe remote<br />

host is running the Apache Tomcat server. This version of Tomcat is vulnerable to a<br />

directory traversal flaw. An attacker exploiting this flaw would only need to be able to send<br />

a malformed request to the server. Successful exploitation would result in the attacker<br />

being able to read arbitrary files with the permission of the web server process. This can<br />

lead to disclosure of source code or confidential data. The reported version of Tomcat is: \n<br />

%L<br />

Solution: Upgrade to version 5.5.23, 6.0.10 or higher.<br />

CVE-2007-0450<br />

Horde < 3.1.4 NLS.php new_lang Parameter XSS<br />

<strong>PVS</strong> ID: 3950 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:24817<br />

Family Internet Services 1023

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!