27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Mozilla Thunderbird < 1.5.0.12 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4072 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:25350<br />

Description: Synopsis :\n\nThe remote Windows host contains a mail client that is affected by multiple<br />

vulnerabilities.\n\nThe remote version of Mozilla Thunderbird suffers from various security<br />

issues, at least one of which may lead to execution of arbitrary code on the affected host<br />

subject to the user's privileges.<br />

Solution: Upgrade to version 1.5.0.12 or higher.<br />

CVE-2007-1558<br />

Mozilla SeaMonkey < 1.0.9 / 1.1.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4073 FAMILY: Web Clients RISK: HIGH NESSUS ID:25351<br />

Description: Synopsis :\n\nA web browser on the remote host is prone to multiple flaws.\n\nThe<br />

installed version of SeaMonkey contains various security issues, one of which may lead to<br />

execution of arbitrary code on the affected host subject to the user's privileges.<br />

Solution: Upgrade to version 1.0.9 / 1.1.2 or higher.<br />

CVE-2007-1558<br />

PHP < 5.2.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4074 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:25368<br />

Description: Synopsis : \n\nThe remote web server uses a version of PHP that is affected by multiple<br />

flaws.\n\nAccording to its banner, the version of PHP installed on the remote host is older<br />

than 5.2.3. Such versions may be affected by several issues including an integer overflow,<br />

'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. The reported<br />

version of PHP is: \n %L<br />

Solution: Upgrade to version 5.2.3 or higher.<br />

CVE-2007-2756<br />

ClamAV < 0.90.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4075 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running the ClamAV anti-virus client version %L\n\nThis version of<br />

ClamAV is vulnerable to a denial of service (DoS) attack when handling malformed RAR<br />

archive files. An attacker exploiting this flaw would only need the ability to send an email<br />

to the vulnerable system. Successful exploitation would result in the application crashing.<br />

Solution: Upgrade to version 0.90.3 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1057

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!