27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: The remote host is running the Novell eDirectory LDAP server. The reported version is: \n<br />

%L<br />

Solution: Ensure that you are using the latest version of the software.<br />

CVE Not available<br />

LDAP Version Detection<br />

<strong>PVS</strong> ID: 4496 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a Lightweight Directory Access Protocol (LDAP) server. LDAP<br />

is a directory service that can be queried or modified remotely. The reported name/version<br />

is: \n %L<br />

Solution: Ensure that you are using the latest version of the software.<br />

CVE Not available<br />

Mozilla Thunderbird < 2.0.0.14 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4497 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:32134<br />

Description: Synopsis :\n\nThe remote Windows host contains a mail client that is affected by multiple<br />

vulnerabilities.\n\nThe installed version of Thunderbird is affected by various security<br />

issues :\n\n - A series of vulnerabilities that allow for JavaScript privilege escalation and<br />

arbitrary code execution.\n - Several stability bugs leading to crashes that, in some cases,<br />

show traces of memory corruption.<br />

Solution: Upgrade to version 2.0.0.14 or higher.<br />

CVE-2008-1237<br />

MySQL 4.1 < 4.1.24 MyISAM Table Privilege Check Bypass<br />

<strong>PVS</strong> ID: 4498 FAMILY: Database RISK: LOW NESSUS ID:32137<br />

Description: Synopsis :\n\nThe remote database server allows a local user to circumvent<br />

privileges.\n\nThe version of MySQL installed on the remote host reportedly allows a local<br />

user to circumvent privileges through creation of MyISAM tables using the 'DATA<br />

DIRECTORY' and 'INDEX DIRECTORY' options to overwrite existing table files in the<br />

application's data directory.<br />

Solution: Upgrade to version 4.1.24 or higher.<br />

CVE-2008-2079<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

MySQL Enterprise Server 5.0 < 5.0.60 MyISAM Table Privilege Check Bypass<br />

<strong>PVS</strong> ID: 4499 FAMILY: Database RISK: LOW NESSUS ID:32138<br />

Family Internet Services 1174

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!