27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE-2007-3035<br />

Vulnerability in Windows Media Player Could Allow Remote Code Execution (936782)<br />

<strong>PVS</strong> ID: 4175 FAMILY: Web Clients RISK: HIGH NESSUS ID:25885<br />

Description: Synopsis :\n\nArbitrary code can be executed on the remote host through Windows Media<br />

Player.\n\nThe remote host is running Windows Media Player. There is a vulnerability in<br />

the remote version of this software that may allow an attacker to execute arbitrary code on<br />

the remote host. To exploit this flaw, one attacker would need to set up a rogue PNG image<br />

and send it to a victim on the remote host.<br />

Solution: Microsoft has released a set of patches for Windows 2000, XP, 2003 and Vista.<br />

CVE-2007-3035<br />

Vulnerability in Windows Media Player Could Allow Remote Code Execution (936782)<br />

<strong>PVS</strong> ID: 4176 FAMILY: Web Clients RISK: HIGH NESSUS ID:25885<br />

Description: Synopsis :\n\nArbitrary code can be executed on the remote host through Windows Media<br />

Player.\n\nThe remote host is running Windows Media Player. There is a vulnerability in<br />

the remote version of this software that may allow an attacker to execute arbitrary code on<br />

the remote host. To exploit this flaw, one attacker would need to set up a rogue PNG image<br />

and send it to a victim on the remote host.<br />

Solution: Microsoft has released a set of patches for Windows 2000, XP, 2003 and Vista.<br />

CVE-2007-3035<br />

Opera < 9.23 Arbitrary Code Execution<br />

<strong>PVS</strong> ID: 4177 FAMILY: Web Clients RISK: HIGH NESSUS ID:25900<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is affected by an arbitrary code<br />

execution vulnerability.\n\n The version of Opera installed on the remote host reportedly<br />

allows for execution of arbitrary code via specially-crafted Javascript if a user can be<br />

tricked into visiting a malicious site.<br />

Solution: Upgrade to version 9.23 or higher.<br />

Altiris Client Detection<br />

CVE-2007-4367<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4178 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is running Altiris. Altiris is a product for managing software installations<br />

across an enterprise network. With an Altiris client, it is possible for an Altiris server to<br />

remotely manage software configurations on the local machine.<br />

Family Internet Services 1085

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!