27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

(CVE-2009-1467)\n\n - A cross site-scripting vulnerability exists because the applciation<br />

fails to properly sanitize RSS feeds. An attacker can exploit this flaw through the<br />

'cleanHTML()' function of the 'html/webmail/server/inc/rss/rss.php' script.<br />

(CVE-2009-1467)\n\n - An input validation flaw in the 'Forgot Password' function on the<br />

login page. (CVE-2009-1469)\n\nAn attacker could exploit these flaws to steal sensitive<br />

information, upload files, or possibly execute arbitrary code subject to the privileges of the<br />

affected application.\n\nFor your information, the version of IceWarp installed is : \n %L<br />

Solution: Upgrading to IceWarp Merak WebMail Server version 9.4.2 or later reportedly resolves the<br />

issues.<br />

CVE-2009-1469<br />

Google Chrome < 1.0.154.64 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5020 FAMILY: Web Clients RISK: HIGH NESSUS ID:38699<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nThe version of Google Chrome installed on the remote host is earlier than<br />

1.0.154.64. Such versions are reportedly affected by multiple vulnerabilities : \n\n - A<br />

failure to properly validate input from a renderer (tab) process could allow an attacker to<br />

crash the browser and possibly run arbitrary code with the privileges of the logged on user.<br />

(CVE-2009-1441)\n\n - A failure to check the result of integer multiplication when<br />

computing image sizes could allow a specially-crafted image or canvas to cause a tab to<br />

crash and possibly allow an attacker to execute arbitrary code inside the (sandboxed)<br />

renderer process. (CVE-2009-1442)\n\nFor your information, the exact browser version is:<br />

\n %L<br />

Solution: Upgrade to Google Chrome 1.0.154.64 or newer.<br />

CVE-2009-1442<br />

AVG Scanning Engine UPX Parsing Denial of Service Vulnerability<br />

<strong>PVS</strong> ID: 5021 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a flaw which allows malcode to be<br />

passed\n\nAVG Anti-Virus is installed on the remote Windows host. The version of AVG<br />

Anti-Virus installed on the remote host is affected by a flaw wherein remote attackers can<br />

bypass the scanning engine by sending specially formatted 'rar' and 'zip' archive files. An<br />

attacker, exploiting this flaw, would only need the ability to send email to valid recipients<br />

on the target server. Successful exploitation would result in the attacker being able to pass<br />

malware through the AVG server. For your information, the reported version, build, and<br />

license key is: \n %L \n<br />

Solution: Upgrade to AVG 8.5 323 or later.<br />

CVE-2009-1784<br />

A-A-S Server Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1329

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!