27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

IBM WebSphere Application Server < 6.0.2.31 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4725 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:34501<br />

Description: Synopsis : \n\nThe remote application server is affected by multiple vulnerabilities.\n\nIBM<br />

WebSphere Application Server 6.0.2 before Fix Pack 31 appears to be running on the<br />

remote host. Such versions are reportedly affected by multiple vulnerabilities.\n\n - By<br />

sending a specially crafted HTTP request with the 'Host' header field set to more than 256<br />

bytes, it may be possible to crash the remote application server (PK69371).\n - An<br />

unspecified security exposure vulnerability exists if the 'fileServing' feature is enabled<br />

(PK64302).\n - Web services security fails to honor Certificate Revocation Lists (CRL)<br />

configured in Certificate Store Collections (PK61258). The reported version of WebSphere<br />

is: \n %L<br />

Solution: Apply Fix Pack 31 (6.0.2.31) or higher.<br />

CVE-2008-4111<br />

VLC Media Player < 0.9.5 TY Media File Handling Memory Curruption<br />

<strong>PVS</strong> ID: 4726 FAMILY: Web Clients RISK: HIGH NESSUS ID:34400<br />

Description: Synopsis : \n\nThe remote Windows host contains an application that is affected by a<br />

memory corruption vulnerability.\n\nThe version of VLC Media Player installed on the<br />

remote host is earlier than 0.9.5. Such versions do not properly parse TY media files. By<br />

sending a specially formatted TY file and tricking a user into opening the file, arbitrary<br />

code may be executed within the context of the affected application.\nThe reported version<br />

of VLC is: \n %L<br />

Solution: Upgrade to version 0.9.5 or higher.<br />

CVE-2008-4558<br />

OpenOffice < 2.4.2 WMF and EMF File Handling Buffer Overflows<br />

<strong>PVS</strong> ID: 4727 FAMILY: Generic RISK: HIGH NESSUS ID:34510<br />

Description: Synopsis : \n\nThe remote Windows host has a program affected by multiple buffer<br />

overflows.\n\n The version of OpenOffice 2.x installed on the remote host is earlier than<br />

2.4.2. Such versions are affected by several issues : \n\n - Specially crafted WMF files can<br />

lead to heap-based overflows and arbitrary code execution (CVE-2008-2237).\n - Specially<br />

crafted EMF files can lead to heap-based overflows and arbitrary code execution<br />

(CVE-2008-2238). The reported version/build of OpenOffice is: \n %L<br />

Solution: Upgrade to version 2.4.2 or higher.<br />

CVE-2008-2238<br />

IBM Tivoli Storage Manager Version Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1242

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!