27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>PVS</strong> ID: 4980 FAMILY: Web Clients RISK: HIGH NESSUS ID:36045<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe installed<br />

version of Firefox is earlier than 3.0.8. Such versions are potentially affected by the<br />

following security issues : \n\n - An XSL transformation vulnerability can be leveraged<br />

with a specially crafted stylesheet to crash the browser or to execute arbitrary code. (MFSA<br />

2009-12)\n\n - An error in the XUL tree method '_moveToEdgeShift()' can be leveraged to<br />

trigger garbage collection routines on objects that are still in use, leading to a browser crash<br />

and possibly execution of arbitrary code. (MFSA 2009-13) \n\nThe reported version of<br />

Firefox is: \n %L<br />

Solution: Upgrade to version 3.0.8 or higher.<br />

CVE-2009-1169<br />

Xlight FTP Server Authentication SQL Injection<br />

<strong>PVS</strong> ID: 4981 FAMILY: FTP Servers RISK: HIGH NESSUS ID:36051<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe version of<br />

Xlight FTP installed on the remote host is vulnerable to a SQL injection attack during<br />

login. This allows an attacker to execute arbitrary SQL commands in the context of the FTP<br />

server. Installations that are not using external ODBC authentication are not affected by<br />

this vulnerability. The reported version of Xlight is: \n %L<br />

Solution: Upgrade to version 3.2.1 or higher.<br />

CVE-2009-4795<br />

ClamAV < 0.95 Scan Evasion<br />

<strong>PVS</strong> ID: 4982 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:36075<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nAccording<br />

to its version, the clamd antivirus daemon on the remote host is earlier than 0.95. Such<br />

versions fail to handle certain malformed 'RAR' archive files, and hence it may be possible<br />

for certain archive files to evade detection from the scan engine.<br />

Solution: Upgrade to version 0.95 or higher.<br />

CVE-2009-1241<br />

Atlassian JIRA < 3.13.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4983 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 1316

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!