27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Bakbone NetVault, an enterprise backup/restore application. This version of<br />

NetVault is reported to be vulnerable to a remote buffer overflow. The details of the flaw<br />

are not currently known. It is believed that a successful attack would lead to arbitrary code<br />

being executed.<br />

Solution: Upgrade to version 7.4.0 or higher.<br />

CVE Not available<br />

ClamAV < 0.90.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3966 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the ClamAV antivirus client version %L\n\nThis version of ClamAV is vulnerable<br />

to multiple attack vectors. The more serious of the flaws is a buffer overflow. An attacker<br />

exploiting this flaw would need to be able to manipulate ClamAV to scan a malicious file<br />

(via email, web, etc.). Successful exploitation would result in the attacker executing<br />

arbitrary code on the remote ClamAV scanner.<br />

Solution: Upgrade to version 0.90.2 or higher.<br />

CVE-2007-1997<br />

XAMPP adodb.php mssql_connect Function Overflow<br />

<strong>PVS</strong> ID: 3967 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the XAMPP web server, a version of Apache which comes pre-bundled with Perl,<br />

MySQL, and PHP. This version of XAMPP is reported prone to a remote buffer overflow<br />

via the mssql_connect() function. An attacker exploiting this flaw would send a malformed<br />

argument to a script that passed the data to mssql_connect(). Successful exploitation would<br />

result in the attacker executing arbitrary code on the server.<br />

Solution: Upgrade to XAMPP greater than 1.6.0a.<br />

CVE-2007-2079<br />

ZoneAlarm Pro < 7.0.302.000 vsdatant Driver Local DoS<br />

<strong>PVS</strong> ID: 3968 FAMILY: Generic<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running ZoneAlarm, a firewall for Windows. The vendor has released<br />

version 7.0.302.000 of ZoneAlarm. This version corrects a flaw where a local user can<br />

disable the firewall.<br />

Family Internet Services 1028

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!