27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2008-3290<br />

Retrospect Backup Server < 7.6 Authentication Module Password Hash Disclosure (ESA-08-009)<br />

<strong>PVS</strong> ID: 4607 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:33562<br />

Description: Synopsis : \n\nThe remote Windows host has an application that is affected by an<br />

information disclosure vulnerability.\n\nAccording to its version number, the<br />

Authentication Module in the Retrospect Backup Server installed on the remote host uses a<br />

weak hash algorithm to hash a user's password, which could allow a remote attacker to gain<br />

control of a client's machine. The reported version number is: \n %L<br />

Solution: Upgrade to version 7.6 or higher.<br />

CVE-2008-3288<br />

RealPlayer for Windows < 6.0.14.806 / 6.0.12.1675 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4608 FAMILY: Web Clients RISK: HIGH NESSUS ID:33744<br />

Description: Synopsis :\n\nThe remote Windows application is affected by at least one security<br />

vulnerability.\n\nAccording to its version number, the installed version of RealPlayer /<br />

RealPlayer Enterprise on the remote Windows host suffers from possibly several issues<br />

:\n\n - Heap memory corruption issues in several ActiveX controls can lead to arbitrary<br />

code execution (CVE-2008-1309).\n - An unspecified local resource reference vulnerability<br />

(CVE-2008-3064).\n - An SWF file heap-based buffer overflow (CVE-2007-5400).\n - A<br />

buffer overflow involving the 'import()' method in an ActiveX control implemented by the<br />

'rjbdll.dll' module could result in arbitrary code execution (CVE-2008-3066).\n\nNote that<br />

RealPlayer 11 (builds 6.0.14.738 - 6.0.14.802) are only affected by the first issue<br />

(CVE-2008-1309).\nNote that the vendor's advisory states that version numbers for<br />

RealPlayer 10.5 are not sequential.<br />

Solution: Upgrade to RealPlayer 11.0.3 (build 6.0.14.806) / RealPlayer 10.5 (build 6.0.12.1675) or<br />

higher.<br />

CVE-2008-3066<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Thunderbird < 2.0.0.16 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4609 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:33563<br />

Description: Synopsis :\n\nThe remote Windows host contains a mail client that is affected by multiple<br />

vulnerabilities.\n\nThe installed version of Thunderbird is affected by various security<br />

issues :\n\n\n - Several stability bugs leading to crashes that, in some cases, show traces of<br />

memory corruption (MFSA 2008-21).\n\n - By taking advantage of the privilege level<br />

stored in the pre-compiled 'fastload' file, an attacker may be able to run arbitrary JavaScript<br />

code with chrome privileges (MFSA 2008-24).\n\n - Arbitrary code execution is possible in<br />

'mozIJSSubScriptLoader.loadSubScript()' (MFSA 2008-25).\n\n - Several function calls in<br />

Family Internet Services 1206

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!