27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Mozilla SeaMonkey < 1.1.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4153 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote Windows host contains a web browser that is affected by<br />

multiple vulnerabilities.\n\nThe installed version of SeaMonkey allows unescaped URIs to<br />

be passed to external programs, may lead to execution of arbitrary code on the affected host<br />

subject to the user's privileges, and could also allow privilege escalation attacks against<br />

addons that create 'about:blank' windows and populate them in certain ways.<br />

Solution: Upgrade to version 1.1.4 or higher.<br />

CVE-2007-3844<br />

Kaspersky Ani-Spam < 3.0.0 [0278] File Permission Weakness Local Privilege Escalation<br />

<strong>PVS</strong> ID: 4154 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a local flaw due to the way that it creates<br />

local file permissions.\n\nThe remote host is running the Kaspersky Anti-spam server. This<br />

version of Kaspersky is vulnerable to a local flaw. Specifically, it is alleged that the<br />

application creates local files with permissions that would allow a local attacker the ability<br />

to either gain access to confidential data or subvert the integrity of the application. The<br />

details of the flaw are currently unknown; however, the vendor has acknowledged the flaw.<br />

An attacker exploiting these flaws would need local access to the machine. Successful<br />

exploitation would result in the attacker gaining access to confidential data or processes.<br />

Solution: Upgrade to version 3.0.0 [0278] or higher.<br />

CVE-2007-4206<br />

Microsoft Office Version Information<br />

<strong>PVS</strong> ID: 4155 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Microsoft Office suite of business tools. The exact version<br />

is \n%L<br />

Solution: N/A<br />

CVE Not available<br />

YouSendIt Client Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4156 FAMILY: Internet Services RISK: LOW NESSUS ID:Not Available<br />

Description: The remote client is utilizing the 'YouSendIt' service. YouSendIt allows users to send<br />

large attachments via email. YouSendIt is a web-based service. Given this, internal<br />

corporate users can use this service to bypass outbound email security.<br />

Family Internet Services 1079

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!