27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL injection attack.\n\nThe remote<br />

server is running the Ruby on Rails web application. The reported version is '%L'\nThis<br />

version of Rails is reported to be vulnerable to a flaw in the way that it handles ':offset' and<br />

':limit' parameters. An attacker exploiting these flaws would only require the ability to send<br />

malformed requests to the application. Successful exploitation would result in the attacker<br />

executing arbitrary SQL commands on the database used by Ruby on Rails.<br />

Solution: Upgrade to version 2.1.1 or higher.<br />

CVE-2008-4094<br />

DB2 < 8 FixPak 17 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4680 FAMILY: Database RISK: HIGH NESSUS ID:34195<br />

Description: Synopsis :\n\nThe remote database server is affected by multiple issues.\n\nAccording to its<br />

version, the installation of DB2 on the remote host is affected by multiple issues :\n\n - By<br />

sending a malicious DB2 UDB v7 client CONNECT/DETACH requests it may be possible<br />

to crash the remote DB2 server (IZ08134).\n\n - An unspecified vulnerability related to<br />

'DB2FMP' exists in DB2 (IZ20350).\n\n - By sending malicious packets to 'DB2JDS', it<br />

may be possible to crash the remote DB2 server (JR29274).\n\n - While running on<br />

Windows 'DB2FMP' runs with OS privileges (JR30228).\n\n - DAS server code is affected<br />

by a buffer overflow vulnerability (IZ22004).\n\n - Using INSTALL_JAR it may be<br />

possible to create and overwrite critical files on the system (IZ22142).<br />

Solution: Apply DB2 UDB Version 8 FixPak 17 or higher.<br />

CVE-2008-3960<br />

Google Chrome < 0.2.149.29 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4681 FAMILY: Web Clients RISK: HIGH NESSUS ID:34197<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is affected by multiple<br />

vulnerabilities.\n\nThe version of Google Chrome installed on the remote host is earlier<br />

than 0.2.149.29. Such versions are reportedly are affected by several issues : \n\n - A buffer<br />

overflow involving long filenames that display in the 'Save As...' dialog could lead to<br />

arbitrary code execution (Issue number 1414).\n - A buffer overflow in handling of link<br />

targets displayed in the status area when a user hovers over a link could lead to arbitrary<br />

code execution (Fix number 1797).\n - An out-of-bounds memory read when parsing URLs<br />

ending in ': %' could cause the application itself to crash (Issue number 122).\n - The<br />

default Downloads directory is set to Desktop, which could lead to malicious cluttering of<br />

the desktop with unwanted downloads and even execution of arbitrary programs (Fix<br />

number 17933).\nThe exact browser version is: \n %L<br />

Solution: Upgrade to version 0.2.149.29 or higher.<br />

CVE-2008-6998<br />

Mac OS X < 10.5.5 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1228

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!