27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>PVS</strong> ID: 4682 FAMILY: Generic RISK: HIGH NESSUS ID:34211<br />

Description: Synopsis :\n\nThe remote host is missing a Mac OS X update that fixes various security<br />

issues.\n\nThe remote host is running a version of Mac OS X 10.5 that is older than version<br />

10.5.5. Mac OS X 10.5.5 contains security fixes for a number of programs.\nIAVA<br />

Reference : 2008-A-0045\nIAVB Reference : 2008-B-0078\nSTIG Finding Severity :<br />

Category I<br />

Solution: Upgrade to version 10.5.5 or higher.<br />

CVE-2008-3622<br />

Hitachi IP Phone Detection<br />

<strong>PVS</strong> ID: 4683 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is a Hitachi WIP5000 IP Phone terminal.<br />

Solution: N/A<br />

CVE Not available<br />

Trend Micro OfficeScan 'cgiRecvFile.exe' Buffer Overflow<br />

<strong>PVS</strong> ID: 4684 FAMILY: Generic RISK: HIGH NESSUS ID:34216<br />

Description: Synopsis :\n\nThe remote host contains an application that is affected by a buffer overflow<br />

vulnerability.\n\nTrend Micro OfficeScan or Client Server Messaging <strong>Security</strong> is installed<br />

on the remote host. The installed version is affected by a buffer overflow vulnerability. By<br />

setting the parameter 'ComputerName' to a very long string in a specially crafted HTTP<br />

request, a malicious user within the local network may be able to trigger a stack-based<br />

overflow in 'cgiRecvFile.exe'. Exploitation of this issue requires manipulation of the<br />

parameters 'TempFileName', 'NewFileSize', and 'Verify' and, if successful, would result in<br />

arbitrary code execution on the remote system.<br />

Solution: Upgrade to : \n\n - Trend Micro OfficeScan 8.0 Build 1361/2424 or 3060 depending on the<br />

current OfficeScan patch level.\n - Trend Micro Client Server Messaging <strong>Security</strong> 3.6<br />

Build 1195.\n - Trend Micro OfficeScan 7.3 Build 3167.<br />

CVE-2008-2437<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

IBM WebSphere Application Server 6.1 < Fix Pack 19 Unspecified Vulnerability<br />

<strong>PVS</strong> ID: 4685 FAMILY: Web Servers RISK: HIGH NESSUS ID:34219<br />

Description: Synopsis :\n\nThe remote application server is affected by an unspecified vulnerability.\n\n<br />

IBM WebSphere Application Server 6.1 before Fix Pack 19 appears to be running on the<br />

remote host. Such versions reportedly have an as-yet unspecified security exposure when<br />

the 'FileServing' feature in the Servlet Engine / Web Container component is enabled.<br />

(PK64302).<br />

Family Internet Services 1229

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!