27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>PVS</strong> ID: 4741 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web browser has enabled an ActiveX / Java program that operates within the<br />

browser. The software, System Requirements Lab (SRL), is used to benchmark the<br />

capabilities of the client machine.<br />

Solution: Ensure that you are running the latest version of SRL.<br />

CVE Not available<br />

Bugzilla quips.cgi Unspecified Crafted Variable <strong>Security</strong> Bypass<br />

<strong>PVS</strong> ID: 4742 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe security controls on the remote host can be bypassed.\n\nThe remote<br />

host is running Bugzilla, a bug-tracking software with a web interface. The version of<br />

Bugzilla on the remote host suffers from a flaw where an authenticated user can bypass<br />

security controls and modify quips. The reported version of Bugzilla is: \n %L \n<br />

Solution: Upgrade to version 2.20.7, 2.22.6, 3.0.6 or higher.<br />

CVE-2008-6098<br />

MySQL Enterprise Server 5.0 < 5.0.70 Privilege Bypass<br />

<strong>PVS</strong> ID: 4743 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:34727<br />

Description: Synopsis : \n\nThe remote database server is susceptible to a privilege bypass<br />

attack.\n\nThe version of MySQL Enterprise Server 5.0 installed on the remote host is<br />

earlier than 5.0.70. In such versions, it is possible for a local user to circumvent privileges<br />

through the creation of MyISAM tables employing the 'DATA DIRECTORY' and 'INDEX<br />

DIRECTORY' options to overwrite existing table files in the application's data directory.<br />

Note that this issue was supposed to have been addressed in version 5.0.60, but the fix was<br />

incomplete. The reported version of MySQL server is: \n %L<br />

Solution: Upgrade to version 5.0.70 or higher.<br />

CVE-2008-4098<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

ClamAV < 0.94.1 get_unicode_name() Function Off-by-One Buffer Overflow<br />

<strong>PVS</strong> ID: 4744 FAMILY: Web Clients RISK: HIGH NESSUS ID:34729<br />

Description: Synopsis : \n\nThe remote antivirus service is affected by a buffer overflow vulnerability.<br />

\n\nAccording to its version, the clamd antivirus daemon on the remote host is earlier than<br />

0.94.1. Such versions have an off-by-one heap overflow vulnerability in the code<br />

responsible for parsing VBA project files, specifically in the 'get_unicode_name()' function<br />

of 'libclamav/vba_extract.c', when a specific 'name' buffer is passed to it. Using a specially<br />

crafted VBA project file embedded in an OLE2 Office document, a remote attacker can<br />

Family Internet Services 1246

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!