27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>PVS</strong> ID: 4377 FAMILY: CGI RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the WinIPDS application. WinIPDS is an advanced function<br />

printing (AFP) and intelligent print data stream (IPDS) print server. The reported version<br />

is: %L<br />

Solution: Ensure that you are running the latest version of this software.<br />

CVE Not available<br />

Flash Media Server Detection<br />

<strong>PVS</strong> ID: 4378 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Adobe Flash Media Server. The reported version is: %L<br />

Solution: N/A<br />

CVE Not available<br />

Flash Media Server Detection<br />

<strong>PVS</strong> ID: 4379 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Adobe Flash Media Server. The reported version is: %L<br />

Solution: N/A<br />

CVE Not available<br />

Flash Media Server Detection<br />

<strong>PVS</strong> ID: 4380 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to several remote overflows.\n\nThe remote<br />

host is running Adobe Flash Media Server. The reported version is: %L\n\nThis version of<br />

Flash Media Server is vulnerable to several flaws. There is a flaw in the way that the server<br />

handles RTMP messages. A specific and malformed request can cause the server to access<br />

memory that has already been de-allocated. Another flaw with the RTMP processing would<br />

allow an attacker to allocate a large buffer that would lead to a corruption of heap memory.<br />

Solution: Upgrade to version 2.0.5 or higher.<br />

CVE-2007-6431<br />

Kerio MailServer < 6.5.0 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4381 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:31119<br />

Family Internet Services 1142

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!