27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

EnterpriseDB Advanced Server < 8.2.4.12 Version Detection<br />

<strong>PVS</strong> ID: 4201 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running EnterpriseDB Advanced Server version: \n %L \n\nThis version of<br />

EnterpriseDB is vulnerable to a remote Denial of Service attack. An attacker exploiting this<br />

flaw would need to be able to authenticate to the database. Successful exploitation would<br />

result in the service crashing and denying access to valid users.<br />

Solution: Upgrade to version 8.2.4.12 or higher.<br />

CVE-2007-4639<br />

PHP < 5.2.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4202 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120<br />

distinct security flaws impacting confidentiality, integrity and availability. The reported<br />

version of PHP is: \n %L<br />

Solution: Upgrade to version 5.2.4 or higher.<br />

MailMarshal <<br />

CVE-2007-3806<br />

<strong>PVS</strong> ID: 4203 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a directory traversal flaw.\n\nThe remote<br />

host is running MailMarshal Mail Server version 6.2.1 or lower. There is a flaw in the<br />

remote version of this server. An attacker can create an archive file such that upon opening,<br />

critical system files would be overwritten with files of the attacker's choice. Successful<br />

exploitation would result in the attacker replacing arbitrary files.<br />

Solution: Upgrade to a version higher than 6.2.1.<br />

CVE Not available<br />

iTunes < 7.4.0 MP4/AAC File covr atom Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4204 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running iTunes - an application for managing and listening to music media files. The<br />

version of iTunes client is %L. \nThis version of iTunes is vulnerable to a buffer overflow<br />

due to the way that it processes malformed MP4/AAC files. An attacker exploiting this<br />

Family Internet Services 1092

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!