27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: N/A<br />

CVE Not available<br />

PHP < 5.2.9 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4943 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:35750<br />

Description: Synopsis :\n\nThe remote web server uses a version of PHP that is affected by multiple<br />

flaws.\n\nAccording to its banner, the version of PHP installed on the remote host is older<br />

than 5.2.9. Such versions may be affected by several security issues :\n\n - Background<br />

color is not correctly validated with a non-true color image in function 'imagerotate()'.<br />

(CVE-2008-5498)\n\n - A denial of service condition can be triggered by trying to extract<br />

zip files that contain files with relative paths in file or directory names.\n\n - Function<br />

'explode()' is affected by an unspecified vulnerability.\n\n - It may be possible to trigger a<br />

segfault by passing a specially crafted string to function 'json_decode()'.\n\n - Function<br />

'xml_error_string()' is affected by a flaw that results in messages being off by one." );<br />

Solution: Upgrade to version 5.2.9 or higher.<br />

CVE-2008-5498<br />

eDirectory < 8.8 SP3 FTF3 iMonitor Crafted HTTP Request Overflow<br />

<strong>PVS</strong> ID: 4944 FAMILY: Generic RISK: HIGH NESSUS ID:35760<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running eDirectory, a directory service software from Novell. The iMonitor component<br />

included with the installed version is affected by a buffer overflow vulnerability. By<br />

sending a specially crafted HTTP request to the iMonitor component with a malformed<br />

'Accept-Language' header, it may be possible for a remote attacker to execute arbitrary<br />

code on the remote system. \n\nNOTE: The iMonitor service is an optional package. <strong>PVS</strong><br />

has determined this vulnerability by looking at the vendor version number within LDAP<br />

queries. Given this, if the iMonitor service is not running, then the system is not vulnerable.<br />

The reported version of eDirectory was: %L<br />

Solution: Upgrade to version 8.8 SP3 with FTF3 or higher.<br />

CVE Not available<br />

Opera < 9.64 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4945 FAMILY: Web Clients RISK: HIGH NESSUS ID:35761<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

Opera installed on the remote host is earlier than 9.64 and is reportedly affected by multiple<br />

issues :\n\n - A memory corruption vulnerability when processing specially crafted JPEG<br />

files could allow an attacker to execute arbitrary code with the privileges of the affected<br />

application. (926)\n\n - It may be possible for certain plugins to execute arbitrary code in<br />

Family Internet Services 1305

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!