27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

of WordPress is: \n %L<br />

Solution: Upgrade to version 2.6.5 or higher.<br />

CVE-2008-5278<br />

ClamAV < 0.94.2 cli_check_jpeg_exploit() Malformed JPEG File DoS<br />

<strong>PVS</strong> ID: 4776 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:35009<br />

Description: Synopsis : \n\nThe remote antivirus service is vulnerable to a denial of service<br />

attack.\n\nAccording to its version, the clamd antivirus daemon on the remote host is earlier<br />

than 0.94.2. There is a recursive stack overflow involving the JPEG parsing code in such<br />

versions. A remote attacker may be able to leverage this issue to cause the application to<br />

recursively scan a specially crafted JPEG, which will eventually cause it to crash. The<br />

remote version of ClamAV is: \n %L<br />

Solution: Upgrade to version 0.94.2 or higher.<br />

CVE-2008-5314<br />

PowerDNS Version Detection<br />

<strong>PVS</strong> ID: 4777 FAMILY: DNS Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running PowerDNS version: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Trillian < 3.1.12.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4778 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:35042<br />

Description: Synopsis : \n\nThe remote host contains an instant messaging application that is affected by<br />

several vulnerabilities.\n\nThe version of Trillian installed on the remote host reportedly<br />

contains several vulnerabilities : \n\n - A stack buffer overflow in the tool tip processing<br />

code could allow an unauthenticated attacker to execute arbitrary code with client<br />

privileges on the remote system. (ZDI-08-077)\n\n - A vulnerability in the XML processing<br />

code responsible for handling specially formulated XML could lead to arbitrary code<br />

execution on the remote system. (ZDI-08-078)\n\n - A vulnerability in XML processing<br />

code responsible for handling malformed XML tags could lead to arbitrary code execution<br />

on the remote system. (ZDI-08-079)\n\n The reported version of Trillian is: \n %L<br />

Solution: Upgrade to version 3.1.12.0 or higher.<br />

CVE-2008-5403<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1258

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!