27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: Upgrade to version 8.8 SP3 or higher.<br />

CVE Not available<br />

ClamAV < 0.93.1 memcpy() .chm File Handling DoS<br />

<strong>PVS</strong> ID: 4642 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running ClamAV version: %L\n\nThis version of ClamAV is vulnerable to a<br />

flaw within the 'libclamav/chmunpack.c' file. Specifically, when handling malformed '.chm'<br />

files, the application fails to adequately parse the file. An attacker sending a malformed<br />

.chm file to a server running ClamAV would be able to crash the service.<br />

Solution: Upgrade to version 0.93.1 or higher.<br />

MicroTik Router <<br />

CVE-2008-3914<br />

<strong>PVS</strong> ID: 4643 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running a MicroTik router. The reported version is:<br />

%L\n\nThis version of MicroTik router is vulnerable to a flaw within its SNMP module.<br />

An attacker exploiting this vulnerability would send the MicroTik router malformed SNMP<br />

queries. These queries would bypass any local 'read-only' restrictions and be executed by<br />

the router.<br />

Solution: If possible, disable SNMP or only allow queries from trusted hosts. When available,<br />

upgrade to a version higher than 2.9.51 or 3.13.<br />

MicroTik Router <<br />

CVE-2008-6976<br />

<strong>PVS</strong> ID: 4644 FAMILY: Generic<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running a MicroTik router. The reported version is:<br />

%L\n\nThis version of MicroTik router is vulnerable to a flaw within its SNMP module.<br />

An attacker exploiting this vulnerability would send the MicroTik router malformed SNMP<br />

queries. These queries would bypass any local 'read-only' restrictions and be executed by<br />

the router.<br />

Solution: If possible, disable SNMP or only allow queries from trusted hosts. When available,<br />

upgrade to a version higher than 2.9.51 or 3.13.<br />

Family Internet Services 1217

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!