27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: When available, upgrade to version 1.4.23 or higher.<br />

CVE Not available<br />

Sun GlassFish Enterprise Server Detection<br />

<strong>PVS</strong> ID: 5029 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Sun GlassFish Enterprise Server. The version is:\n '%L'<br />

Solution: N/A<br />

CVE Not available<br />

Sun GlassFish Enterprise Server Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5030 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the Sun GlassFish Enterprise Server earlier than 2.1 Patch02. Such versions are<br />

reportedly affected by multiple vulnerabilities : \n\n - There are multiple input validation<br />

flaws that could lead to cross-site scripting attacks.\n\n - A local denial of service<br />

vulnerability in the HTTP engine.\n\n For your information, the installed version is: \n %L<br />

Solution: Sun has release a fix for this version of their server. Apply the referenced patches.<br />

CVE-2009-1553<br />

Winamp < 5.552 Buffer Overflow<br />

<strong>PVS</strong> ID: 5031 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

running Winamp, a media player for Windows. The version of Winamp installed on the<br />

remote host is earlier than 5.552. Such versions reportedly contain a flaw in the way that it<br />

handles malformed '.maki' files. A malfored file will cause a buffer overflow within the<br />

'gen_ff.dll' library. Successful exploitation will result in the attacker executing arbitrary<br />

code. An attacker, exploiting this flaw, would need to be able to entice a user into opening<br />

a malformed '.maki' file. For your information, the reported version of Winamp is: \n %L \n<br />

Solution: Upgrade to Winamp version 5.552 or later.<br />

CVE-2009-1831<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Pidgin < 2.5.6 Multiple Buffer Overflow Vulnerabilities<br />

<strong>PVS</strong> ID: 5032 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1332

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!