27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

trigger this vulnerability and execute arbitrary code on the remote host with the privileges<br />

of the 'clamd' process. The reported version of ClamAV is: \n %L<br />

Solution: Upgrade to version 0.94.1 or later.<br />

CVE-2008-5050<br />

Mozilla Browser Plugin Detection<br />

<strong>PVS</strong> ID: 4745 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Firefox web browser is configured to use browser plugins. A browser plugin<br />

adds functionality to the browser and often extends its attack surface. Many Firefox<br />

browser plugins are created and maintained by third-party software vendors or enthusiasts.<br />

<strong>PVS</strong> observed the following plugin: \n %L<br />

Solution: You should manually inspect the following plugin to ensure that it is allowed according to<br />

corporate policies and guidelines.<br />

CVE Not available<br />

Flash Player APSB08-18 / APSB08-20 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4746 FAMILY: Web Clients RISK: HIGH NESSUS ID:34741<br />

Description: Synopsis : \n\nThe remote Windows host contains a browser plugin that is affected by<br />

multiple vulnerabilities.\n\nAccording to its version number, an instance of Flash Player on<br />

the remote Windows host is 9.0.124.0 or earlier. Such versions are potentially affected by<br />

several vulnerabilities : \n\n - A potential port-scanning issue. (CVE-2007-4324)\n -<br />

Possible privilege escalation attacks against web servers hosting Flash content and<br />

cross-domain policy files. (CVE-2007-6243)\n - Potential Clipboard attacks.<br />

(CVE-2008-3873)\n - FileReference upload and download APIs that don't require user<br />

interaction. (CVE-2008-4401)\n - A 'Clickjacking' issue that could be abused by an attacker<br />

to lure a web browser user into unknowingly clicking on a link or dialog.<br />

(CVE-2008-4503)\n - A potential cross-site scripting vulnerability. (CVE-2008-4818)\n - A<br />

potential issue that could be leveraged to conduct a DNS rebinding attack.<br />

(CVE-2008-4819)\n - An information disclosure issue affecting only the ActiveX control.<br />

(CVE-2008-4820)\n - An information disclosure issue involving interpretation of the 'jar: '<br />

protocol and affecting only the plugin for Mozilla browsers. (CVE-2008-4821)\n - An issue<br />

with policy file interpretation could potentially lead to bypass of a non-root domain policy.<br />

(CVE-2008-4822)\n - A potential HTML injection issue involving an ActionScript<br />

attribute. (CVE-2008-4823)\n\nThe reported version of Flash is: \n %L<br />

Solution: Upgrade to Flash Player version 10.0.12.36 / 9.0.151.0 or higher.<br />

CVE-2008-4823<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

VLC Media Player 0.5.0 to 0.9.5 Stack-Based Buffer Overflows<br />

<strong>PVS</strong> ID: 4747 FAMILY: Web Clients RISK: HIGH NESSUS ID:34730<br />

Family Internet Services 1247

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!