27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is missing a Mac OS X update that fixes various security<br />

issues.\n\n The remote host is running a version of Mac OS X that is older than version<br />

10.5.2. Mac OS X 10.5.2 contains several security fixes for a number of programs.<br />

Solution: Upgrade to version 10.5.2 or higher.<br />

CVE-2008-0042<br />

WebDAV Mini Redirector Client Detection<br />

<strong>PVS</strong> ID: 4374 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Windows client utilizes the WebDAV service via the Mini Redirector client<br />

software version: %L<br />

Solution: Ensure that you are running the latest version of WebDAV Mini Redirector.<br />

CVE Not available<br />

ClamAV < 0.92.1 Multiple Overflows<br />

<strong>PVS</strong> ID: 4375 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running ClamAV version: %L\n\nThis version of ClamAV is vulnerable to several flaws<br />

due to the way that it parses user-supplied input. It has been reported that there is a heap<br />

overflow within the 'mew.c' file. It has further been reported that there is an integer<br />

overflow in the 'cli_scanpe' function of the 'pe.c' file. An attacker exploiting these flaws<br />

would either crash the service or execute arbitrary code on the remote machine.<br />

Solution: Upgrade to version 0.92.1 or higher.<br />

CVE-2008-0318<br />

Apache mod_jk2 < 2.0.4 Multiple Overflows<br />

<strong>PVS</strong> ID: 4376 FAMILY: Web Servers RISK: HIGH NESSUS ID:31786<br />

Description: Synopsis :\n\nThe remote host is affected by multiple buffer overflow<br />

vulnerabilities.\n\nThe remote host is running Apache web server with mod_jk2, a<br />

connector that connects a web server such as Apache. According to its banner, the version<br />

of mod_jk2 installed is affected by multiple buffer overflow vulnerabilities. An attacker<br />

may be able to exploit these vulnerabilities to cause a denial-of-service condition or execute<br />

arbitrary code subject to the privileges of the user running the Apache process.<br />

Solution: Upgrade to version 2.0.4 or higher.<br />

CVE-2007-6258<br />

WinIPDS Version Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1141

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!