27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

version of ClamAV is: \n %L<br />

Solution: Upgrade to version 0.94 or higher.<br />

CVE-2008-3914<br />

Moodle < 1.9.4 filter/tex/texed.php pathname Parameter Remote Command Execution<br />

<strong>PVS</strong> ID: 4788 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:35090<br />

Description: Synopsis : \n\nThe remote web server contains a PHP application that allows arbitrary<br />

command execution.\n\nThe version of Moodle installed on the remote host fails to sanitize<br />

user-supplied input to the 'pathname' parameter before using it in the 'filter/tex/texed.php'<br />

script in a commandline that is passed to the shell. Provided PHP's 'register_globals' setting<br />

and the TeX Notation filter has both been enabled and PHP's 'magic_quotes_gpc' setting is<br />

disabled, an unauthenticated attacker can leverage these issues to execute arbitrary code on<br />

the remote host subject to the privileges of the web server user ID. The reported version of<br />

Moodle is: \n %L<br />

Solution: Disable PHP's 'register_globals' or upgrade to version 1.9.4 or higher.<br />

CVE Not available<br />

Mac OS X < 10.5.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4789 FAMILY: Generic RISK: HIGH NESSUS ID:35111<br />

Description: Synopsis : \n\nThe remote host is missing a Mac OS X update that fixes various security<br />

issues.\n\nThe remote host is running a version of Mac OS X 10.5 that is older than version<br />

10.5.6. Mac OS X 10.5.6 contains security fixes for the following products : \n\n - ATS\n -<br />

BOM\n - CoreGraphics\n - CoreServices\n - CoreTypes\n - Flash Player Plug-in\n -<br />

Kernel\n - Libsystem\n - Managed Client\n - network_cmds\n - Podcast Producer\n -<br />

UDF\n\nThe reported version of Mac OS X is: \n %L<br />

Solution: Upgrade to version 10.5.6 or higher.<br />

CVE-2008-4824<br />

Mac OS X < 10.5.6 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4790 FAMILY: Generic RISK: HIGH NESSUS ID:35111<br />

Description: Synopsis : \n\nThe remote host is missing a Mac OS X update that fixes various security<br />

issues.\n\nThe remote host is running a version of Mac OS X 10.5 that is older than version<br />

10.5.6. Mac OS X 10.5.6 contains security fixes for the following products : \n\n - ATS\n -<br />

BOM\n - CoreGraphics\n - CoreServices\n - CoreTypes\n - Flash Player Plug-in\n -<br />

Kernel\n - Libsystem\n - Managed Client\n - network_cmds\n - Podcast Producer\n -<br />

UDF\n\nThe reported version of Mac OS X is: \n %L<br />

Family Internet Services 1262

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!