27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: The remote web server is hosting .pptx files. These are Microsoft Office 2007<br />

document files. As an example, consider the following file %P\nThe webmaster<br />

should make sure that they do not contain confidential data.<br />

Solution: N/A<br />

CVE Not available<br />

Firefox < 3.0.7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4950 FAMILY: Web Clients RISK: HIGH NESSUS ID:35778<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe installed<br />

version of Firefox is earlier than 3.0.7. Such versions are potentially affected by the<br />

following security issues : \n\n - By exploiting stability bugs in the browser engine, it might<br />

be possible for an attacker to execute arbitrary code on the remote system under certain<br />

conditions. (MFSA 2009-07)\n\n - A vulnerability in Mozilla's garbage collection process<br />

could be exploited to run arbitrary code on the remote system. (MFSA 2009-08)\n\n - It<br />

may be possible for a website to read arbitrary XML data from another domain by using<br />

nsIRDFService and a cross-domain redirect. (MFSA 2009-09)\n\n - Vulnerabilities in the<br />

PNG libraries used by Mozilla could be exploited to execute arbitrary code on the remote<br />

system. (MFSA 2009-10)\n\n - Certain invisible characters are decoded before being<br />

displayed on the location bar. An attacker may be able to exploit this flaw to spoof the<br />

location bar and display a link to a malicious URL. (MFSA 2009-11).\n\nThe reported<br />

version of Firefox is: \n %L<br />

Solution: Upgrade to version 3.0.7 or higher.<br />

CVE-2009-0777<br />

ZABBIX < 1.6.3 Web Interface locales.php extlang[] Remote Code Execution<br />

<strong>PVS</strong> ID: 4951 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:35787<br />

Description: Synopsis : \n\nThe remote host contains a PHP application that is prone to a remote<br />

command execution attack.\n\nThe remote host is running a version of the ZABBIX web<br />

interface that is affected by a remote code execution vulnerability. The vulnerability exists<br />

in the 'extlang[]' parameter of the 'locales.php' script. Provided PHP's 'magic_quotes_gpc'<br />

setting is disabled, an unauthenticated remote attacker can exploit this to execute arbitrary<br />

code on the remote host subject to the privileges of the web server user ID. Note that this<br />

version of the ZABBIX web interface is also likely affected by a local file inclusion<br />

vulnerability and a cross-site request forgery vulnerability. The reported version of<br />

ZABBIX is: \n %L \n<br />

Solution: Upgrade to version 1.6.3 or higher.<br />

CVE Not available<br />

FileZilla < 0.9.31 SSL/TLS Packet Overflow DoS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1307

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!