27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

DB2 9.1 < Fix Pack 6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4721 FAMILY: Database RISK: HIGH NESSUS ID:34475<br />

Description: Synopsis : \n\nThe remote database server is affected by multiple issues.\n\nAccording to<br />

its version, the installation of DB2 9.1 on the remote host is affected by one or more of the<br />

following issues : \n\n - An unspecified error in 'SQLNLS_UNPADDEDCHARLEN()' may<br />

lead to a segmentation fault in DB2 server (LI73364).\n - DB2 does not mark inoperative or<br />

drop views and triggers if the definer cannot maintain the objects (IZ22306).\n -<br />

Password-related connection string keyword values may appear in trace output (IZ23915).<br />

The observed version of DB2 was: \n %L<br />

Solution: Apply DB2 Version 9.1 Fix Pack 6 or higher.<br />

CVE Not available<br />

Microsoft Software Update DNS Query Detection<br />

<strong>PVS</strong> ID: 4722 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Microsoft computer.<br />

Solution: N/A<br />

CVE Not available<br />

Microsoft Software Update DNS Query Detection<br />

<strong>PVS</strong> ID: 4723 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Microsoft computer.<br />

Solution: N/A<br />

CVE Not available<br />

Trend Micro OfficeScan HTTP Request Buffer Overflow<br />

<strong>PVS</strong> ID: 4724 FAMILY: Generic RISK: HIGH NESSUS ID:34490<br />

Description: Synopsis : \n\nThe remote host contains an application that is affected by a buffer overflow<br />

vulnerability.\n\nTrend Micro OfficeScan is installed on the remote host. The installed<br />

version is affected by a buffer overflow vulnerability. By sending a specially crafted HTTP<br />

request to Trend Micro OfficeScan server CGI modules, it may be possible to trigger a<br />

stack based buffer overflow. Successful exploitation of this issue may result in arbitrary<br />

code execution on the remote system. The reported version of Trend Micro is: \n %L<br />

Solution: Upgrade to :\n\n - Trend Micro OfficeScan 7.3 Build 1374 or higher\n - Trend Micro<br />

OfficeScan 8.0 Build 3110 or higher<br />

CVE-2008-3862<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1241

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!