27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis : \n\nThe remote host is vulnerable to a buffer overflow\n\nAccording to it's<br />

banner, the remote Sendmail server is running a version less than 8.13.2. There is a flaw in<br />

versions of Sendmail less than 8.13.2 which would allow a remote attacker to execute<br />

arbitrary code on the Sendmail system through the use of malfored X headers. The reported<br />

version of Sendmail is: \n %L \n<br />

Solution: Upgrade to Sendmail 8.13.2 or newer.<br />

CVE-2009-1490<br />

Google Chrome < 1.0.154.65 Remote Code Execution<br />

<strong>PVS</strong> ID: 5026 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nThe version of Google Chrome installed on the remote host is earlier than<br />

1.0.154.65. Such versions are reportedly affected by a memory corruption issue. An<br />

attacker could exploit this flaw in order to run arbitrary code inside the Google Chrome<br />

sandbox.\n\nFor your information, the exact browser version is: \n %L<br />

Solution: Upgrade to Google Chrome 1.0.154.65 or newer.<br />

CVE-2009-0945<br />

Avira Anti-Virus PDF File Scan Evasion<br />

<strong>PVS</strong> ID: 5027 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote client is running the Avira Anti-Virus engine. The version information of the<br />

signature database and the core engine are: \n %L \n\nThis version of the Avira scan engine<br />

is vulnerable to a flaw wherein attackers can bypass the scan engine by submitting specially<br />

formatted 'PDF' files. An attacker, exploiting this flaw, would be able to pass malicious<br />

code through the scan engine.<br />

Solution: Upgrade to Avira scan engine 8.2.0.168/7.9.0.168<br />

CVE Not available<br />

Coppermine < 1.4.23 injection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5028 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a SQL Injection attack\n\nThe remote host<br />

is running Coppermine version: \n %L \n\nCoppermine is a web-based photo album written<br />

in PHP. This version of Coppermine is vulnerable to a SQL injection vulnerability when<br />

handling malformed data sent to the 'thumbnails.php', 'db_input.php', and<br />

'displayecard.php'. An attacker, exploiting this flaw, would be able to execute arbitrary<br />

SQL commands on the database server used by Coppermine.<br />

Family Internet Services 1331

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!