27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote host can be tricked into modifying administrative<br />

credentials.\n\nThe version of WordPress installed on the remote host is vulnerable to a<br />

flaw that would allow any user to reset the password of any other user account. After<br />

resetting the password, the newly reset password would be sent to the email address linked<br />

to the account.<br />

Solution: Upgrade to version 2.6.2 or higher.<br />

Trac Version Detection<br />

CVE-2008-4107<br />

<strong>PVS</strong> ID: 4649 FAMILY: CGI RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Trac, a web-based software management application that<br />

supports bug-tracking and source code browsing. The version of Trac is: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Microsoft Office OneNote Client Detection<br />

<strong>PVS</strong> ID: 4650 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Microsoft OneNote on Office version '%L'<br />

Solution: N/A<br />

CVE Not available<br />

QuickTime < 7.5.5 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4651 FAMILY: Web Clients RISK: HIGH NESSUS ID:34118<br />

Description: Synopsis :\n\nThe remote host contains an application that is affected by multiple<br />

vulnerabilities.\n\n The version of QuickTime installed on the remote host is older than<br />

7.5.5. Such versions contain several vulnerabilities :\n\n - Heap and stack buffer overflows<br />

in the handling of panorama atoms in QTVR (QuickTime Virtual Reality) movie files could<br />

lead to an application crash or arbitrary code execution (CVE-2008-3624 and<br />

CVE-2008-3625).\n - A memory corruption issue in QuickTime's handling of STSZ atoms<br />

in movie files could lead to an application crash or arbitrary code execution<br />

(CVE-2008-3626).\n - Multiple memory corruption issues in QuickTime's handling of<br />

H.264-encoded movie files could lead to an application crash or arbitrary code execution<br />

(CVE-2008-3627).\n - An out-of-bounds read issue in QuickTime's handling of PICT<br />

images could lead to an application crash (CVE-2008-3629).<br />

Solution: Either use QuickTime's Software Update preference to upgrade to the latest version or<br />

manually upgrade to version 7.5.5 or higher.<br />

Family Internet Services 1219

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!