27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>PVS</strong> ID: 4769 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Apple iPhone web utility.<br />

Solution: N/A<br />

CVE Not available<br />

NetWitness Version Detection<br />

<strong>PVS</strong> ID: 4770 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the NetWitness network investigator tool version: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

CUPS < 1.3.10 Multiple Overflows<br />

<strong>PVS</strong> ID: 4771 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to an integer overflow.\n\nAccording to its<br />

banner, the version of CUPS installed on the remote host is earlier than 1.3.10. Such<br />

versions are affected by multiple integer overflow vulnerabilities : \n\n - A potential integer<br />

overflow in the PNG image validation code in '_cupsImageReadPNG()'. (STR #2974)\n\n -<br />

A heap-based integer overflow in '_cupsImageReadTIFF()'. (STR #3031)\n\n - The web<br />

interface may be vulnerable to DNS rebinding attacks due to a failure to validate the HTTP<br />

Host header in incoming requests. (STR #3118)\n\n - A heap-based buffer overflow in<br />

pdftops. (CVE-2009-0195)\n\n - Flawed 'ip' structure initialization in the function<br />

'ippReadIO()' could allow an attacker to crash the application.\n\n The reported version of<br />

CUPS is: \n %L \n<br />

Solution: Upgrade to version 1.3.10 or higher.<br />

CVE-2009-0195<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Altiris Deployment Solution Server < 6.9.355 Password Disclosure (SYM08-020)<br />

<strong>PVS</strong> ID: 4772 FAMILY: Generic RISK: LOW NESSUS ID:34964<br />

Description: Synopsis : \n\nThe remote Windows host has a program that is affected by a password<br />

disclosure vulnerability.\n\nThe version of the Altiris Deployment Solution installed on the<br />

remote host is reportedly affected by a password disclosure vulnerability. Altiris<br />

Deployment Solution Server reportedly stores 'Application Identity Account password' in<br />

the system memory in plaintext. It may be possible for an authorized non-privileged user to<br />

retrieve this password and make unauthorized modifications to the client systems. The level<br />

of unauthorized access depends on the user group under which Application Identity<br />

Account was registered during installation. The reported version number is: \n %L<br />

Family Internet Services 1256

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!