27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote database server is affected by multiple issues.\n\n According to<br />

its version, the installation of DB2 on the remote host is affected by one or more of the<br />

following issues :\n\n - A local user may be able to overwrite arbitrary files,\n create<br />

arbitrary world-writeable directories, or gain root \n privileges via symlink attacks or<br />

specially-crafted \n environment variables.\n - A user may be able to continue to execute a<br />

method even \n once privileges for the method have been revoked (IY88226, \n version 8<br />

only).\n - There is an unspecified vulnerability related to \n incorrect authorization routines<br />

(JR25940, version 8 \n only).\n - There is an unspecified vulnerability in \n<br />

'AUTH_LIST_GROUPS_FOR_AUTHID' (IZ01828, version 9.1 \n only).\n - There is an<br />

unspecified vulnerability in the 'db2licm'\n and 'db2pd' tools (IY97922 / IY97936).\n -<br />

There is an unspecified vulnerability involving \n 'db2licd' and the 'OSSEMEMDBG' and<br />

'TRC_LOG_FILE' \n environment variables (IY98011 / IY98101).\n - There is a buffer<br />

overflow involving the 'DASPROF'\n environment variable (IY97346 / IY99311).\n -<br />

There is an unspecified vulnerability that can arise\n during instance and FMP startup<br />

(IZ01923 / IZ02067).\n\nNote that there is currently insufficient information to determine<br />

to what extent the first set of issues overlaps the others.<br />

Solution: Apply DB2 Version 9 FixPak 3 / 8 FixPak 15 or higher.<br />

CVE-2007-4411<br />

Magnicomp SysInfo Version Detection<br />

<strong>PVS</strong> ID: 4240 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Magnicomp SysInfo tool. This tool is used to collect and<br />

manage system information. The detected version was '%L'<br />

Solution: Ensure that you are running the latest version of SysInfo and that the traffic cannot be<br />

sniffed or leaked.<br />

CVE Not available<br />

Quintum Technologies VoIP Server Detection<br />

<strong>PVS</strong> ID: 4241 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a Quintum Technologies VoIP router. The reported version info<br />

is '%L'<br />

Solution: Ensure that you are running the latest version of the device's software and that the traffic<br />

cannot be sniffed or leaked.<br />

Google Urchin <<br />

CVE Not available<br />

<strong>PVS</strong> ID: 4242 FAMILY: Generic<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 1103

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!