27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

to crash the browser or potentially execute arbitrary code by using a flash object that<br />

presents a slow script dialog. (MFSA 2009-35)\n\n - Glyph rendering libraries are affected<br />

by multiple heap/integer overflows. (MFSA 2009-36)\n\n - A vulnerability involving SVG<br />

element could be exploited to crash the browser or execute arbitrary code on the remote<br />

system. (MFSA 2009-37)\n\n - A vulnerability in 'setTimeout' could allow unsafe access to<br />

the 'this' object from chrome code. An attacker could exploit this flaw to run arbitrary<br />

JavaScript with chrome privileges. (MFSA 2009-39)\n\n - It may be possible for JavaScript<br />

from one website to bypass cross-origin wrapper, and unsafely access properties of an<br />

object from another website. (MFSA 2009-40)<br />

Solution: Upgrade to Firefox 3.0.12 or later.<br />

CVE-2009-2472<br />

Joomla! < 1.5.13 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5102 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors\n\nThe installed<br />

version of Joomla! is earlier than 1.5.13. Such versions are reportedly affected by multiple<br />

vulnerabilities :\n\n - A flaw which affects the TinyMCE editor would allow a remote<br />

attack to upload and execute arbitrary files\n\n - A failure to parse user-supplied input to<br />

'JEXEC' would allow a remote attacker to glean internal path information<br />

Solution: Upgrade to Joomla! 1.5.13 or later.<br />

CVE Not available<br />

RaidenHTTPD workspace.php ulang Parameter Local File Inclusion<br />

<strong>PVS</strong> ID: 5103 FAMILY: Web Servers RISK: HIGH NESSUS ID:29728<br />

Description: Synopsis :\n\nThe remote web server contains a PHP script that is susceptible to a local file<br />

include attack.\n\nThe remote host is running RaidenHTTPD, a web server for Windows.<br />

The version of RaidenHTTPD installed on the remote host fails to sanitize user-supplied<br />

input to the 'ulang' parameter in scripts '/raidenhttpd-admin/workspace.php' and<br />

'/raidenhttpd-admin/menu.php' before using it to include PHP code. Provided the server's<br />

WebAdmin feature has been enabled, an unauthenticated remote attacker can leverage this<br />

issue to view arbitrary files or to execute arbitrary PHP code on the remote host, subject to<br />

the privileges under which the server operates, which is SYSTEM by default.<br />

Solution: Upgrade to RaidenHTTPD Server 2.0.27 or later.<br />

CVE-2007-6453<br />

CommuniGate Pro POP3 < 5.1c2 Buffer Overflow<br />

<strong>PVS</strong> ID: 5104 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 1354

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!