27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack\n\nThe<br />

version of BIND installed on the remote host suggests that it suffers from a denial of<br />

service vulnerability, which may be triggered by sending a malicious dynamic update<br />

message to a zone for which the server is the master, even if that server is not configured to<br />

allow dynamic updates. Note that <strong>PVS</strong> obtained the version by observing the response to a<br />

'version.bind', the value of which can be and sometimes is tweaked by DNS administrators.<br />

Solution: Upgrade to BIND 9.4.3-P3 / 9.5.1-P3 / 9.6.1-P3 or later<br />

CVE-2009-0696<br />

Squid 3.0.STABLE16 / 3.10.11 Remote DoS<br />

<strong>PVS</strong> ID: 5108 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:40420<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS)<br />

attack\n\nAccording to its banner, the version of the Squid proxy caching server installed<br />

on the remote host is older than 3.0.STABLE17 or 3.1.0.12. Such versions reportedly use<br />

incorrect bounds checking when processing some requests or responses. Squid-2.x releases<br />

are not vulnerable.<br />

Solution: Either upgrade to Squid version 3.0.STABLE17 or 3.1.0.12 or later or apply the patch<br />

referenced in the project's advisory above.<br />

CVE-2009-2622<br />

Adobe AIR < 1.5.2 Multiple Vulnerabilities (APSB09-10)<br />

<strong>PVS</strong> ID: 5109 FAMILY: Web Clients RISK: HIGH NESSUS ID:40447<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors\n\nThe remote<br />

Windows host contains a version of Adobe AIR Player that is earlier than 1.5.2. Such<br />

versions are reportedly affected by multiple vulnerabilities :\n\n - A memory corruption<br />

vulnerability that could potentially lead to code execution. (CVE-2009-1862)\n\n - A<br />

privilege escalation vulnerability that could potentially lead to code execution.<br />

(CVE-2009-1863)\n\n - A heap overflow vulnerability that could potentially lead to code<br />

execution. (CVE-2009-1864)\n\n - A null pointer vulnerability that could potentially lead to<br />

code execution. (CVE-2009-1865)\n\n - A stack overflow vulnerability that could<br />

potentially lead to code execution. (CVE-2009-1866)\n\n - A clickjacking vulnerability that<br />

could allow an attacker to lure a web browser user into unknowingly clicking on a link or<br />

dialog. (CVE-2009-1867)\n\n - A URL parsing heap overflow vulnerability that could<br />

potentially lead to code execution. (CVE-2009-1868)\n\n - An integer overflow<br />

vulnerability that could potentially lead to code execution. (CVE-2009-1869)\n\n - A local<br />

sandbox vulnerability that could potentially lead to information disclosure when SWFs are<br />

saved to the hard drive. CVE-2009-1870)<br />

Solution: Upgrade to Adobe AIR version 1.5.2 or later."<br />

CVE-2009-1870<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1356

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!