27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Upgrade to version 7.5.476 or higher.<br />

CVE-2007-3777<br />

QuickTime < 7.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4132 FAMILY: Web Clients RISK: HIGH NESSUS ID:25703<br />

Description: Synopsis : \n\nThe remote Windows host contains an application that is affected by<br />

multiple issues.\n\nThe version of QuickTime installed on the remote Windows host is<br />

older than 7.2. Such versions contain several vulnerabilities that may allow an attacker to<br />

execute arbitrary code on the remote host if he can trick the user to open a specially-crafted<br />

file with QuickTime. The reported version of QuickTime is: \n %L<br />

Solution: Either use QuickTime's Software Update preference to upgrade to the latest version or<br />

manually upgrade to version 7.2 or later.<br />

CVE-2007-2389<br />

SquirrelMail G/PGP Encryption Plugin <<br />

<strong>PVS</strong> ID: 4133 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an arbitrary 'command insertion'<br />

flaw.\n\nThe remote host is running the SquirrelMail web-based email software with GPG<br />

Encryption enabled. This version of the GPG Plugin is vulnerable to a flaw in the way that<br />

it parses user-supplied data. An attacker exploiting this flaw would be able to execute shell<br />

commands on the remote server with the permissions of the SquirrelMail server process.<br />

Solution: Upgrade to a version of GPG Plugin higher than 2.1.<br />

CVE-2006-4169<br />

Apple iPhone/iPad Detection<br />

<strong>PVS</strong> ID: 4134 FAMILY: Mobile Devices RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is an Apple iPhone, iPod, or iPad. For your information, the version of iOS<br />

installed on the remote mobile device is \n%L\n\n<br />

Solution: N/A<br />

CVE Not available<br />

Apple iPhone Mail Program Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4135 FAMILY: SMTP Clients RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1073

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!