27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE Not available<br />

WS_FTP Server < 6.1.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4361 FAMILY: FTP Servers RISK: HIGH NESSUS ID:40771<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThis host is<br />

running a vulnerable version of WS_FTP FTP server. Versions up to and including 6.1.0<br />

are reported prone to multiple flaws:\n\n - A vulnerability caused by an improper handling<br />

of UDP packets within the FTP log server. An attacker can exploit this to crash the affected<br />

service. (CVE-2008-0608)\n\n - A buffer overflow vulnerability in the SSH server service<br />

when handling arguments to the 'opendir' command. (CVE-2008-0590)\n\n - An<br />

information disclosure vulnerability when processing HTTP requests for the<br />

'FTPLogServer/LogViewer.asp' script. An attacker can exploit this to gain access to the log<br />

viewing interface. (CVE-2008-5692)\n\nThe reported version of WS_FTP is\n%L<br />

Solution: Upgrade to version 6.1.1 or higher.<br />

CVE-2008-5693<br />

iPhoto < 7.1.2 Photocast Subscription Format String<br />

<strong>PVS</strong> ID: 4362 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:30201<br />

Description: Synopsis :\n\nThe remote Mac OS X host contains an application that is affected by a<br />

format string vulnerability.\n\nThe remote host is running a version of iPhoto older than<br />

version 7.1.2. Such versions are reportedly affected by a format string vulnerability. If an<br />

attacker can trick a user on the affected host into subscribing to a specially-crafted<br />

photocast, he may be able to leverage these issues to execute arbitrary code on the affected<br />

host subject to the user's privileges.<br />

Solution: Upgrade to version 7.1.2 or higher.<br />

CVE-2008-0043<br />

QuickTime < 7.4.1 RTSP Response Handling Overflow<br />

<strong>PVS</strong> ID: 4363 FAMILY: Web Clients RISK: HIGH NESSUS ID:30204<br />

Description: Synopsis :\n\nThe remote Windows host contains an application that is affected by a buffer<br />

overflow vulnerability.\n\nThe version of QuickTime installed on the remote Windows host<br />

is older than 7.4.1. Such versions contain a heap buffer overflow in the application's<br />

handling of HTTP responses when RTSP tunneling is enabled. If an attacker can trick a<br />

user to visit a specially-crafted webpage, he may be able to to execute arbitrary code on the<br />

remote host subject to the user's privileges.<br />

Solution: Upgrade to version 7.4.1 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1137

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!