27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Apple iPhone < 3.0.1 Overflow<br />

<strong>PVS</strong> ID: 5110 FAMILY: Mobile Devices RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is an<br />

iPhone version 3.x mobile phone. The observed banner was: \n %L \n\nThis version of<br />

iPhone is vulnerable to a flaw in the way that it handles malformed SMS text messages. An<br />

attacker, exploiting this flaw, would be able to execute arbitrary code on the remote system.<br />

Solution: Upgrade to iPhone version 3.0.1 or higher<br />

CVE-2009-2204<br />

Apache < 2.2.12 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5111 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server may be affected by several issues.\n\nAccording to<br />

its banner, the version of Apache 2.2 installed on the remote host is older than 2.2.12. Such<br />

versions may be affected by several issues : \n\n - A denial-of-service vulnerability in the<br />

'mod_proxy' module could be exploited to cause the process to consume large amounts of<br />

CPU resources. (CVE-2009-1890)\n\n - The 'mod_deflate' module is prone to a remote<br />

denial-of-service vulnerability when large file downloads are terminated before completing.<br />

(CVE-2009-1891)\n\n<strong>PVS</strong> cannot determine whether the affected modules are in use. The<br />

installed version of Apache is: \n %L<br />

Solution: Either ensure that the affected modules are not in use or upgrade to Apache version 2.2.12<br />

or later.<br />

CVE-2009-1891<br />

VLC Media Player < 1.0.1 Remote Integer Underflow<br />

<strong>PVS</strong> ID: 5112 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host contains an application that is affected by an integer<br />

underflow vulnerability.\n\nThe version of VLC media player installed on the remote host<br />

is earlier than 1.0.1. Such versions contain a flaw in the 'modules/access/rtsp/real.c' file of<br />

VLC Player. If an attacker can trick a user into opening a specially crafted RDT data<br />

stream, he may be able to execute arbitrary code within the context of the affected<br />

application. The reported version of VLC is: \n %L<br />

Solution: Upgrade to VLC Media Player 1.0.1 or later.<br />

CVE Not available<br />

Firefox < 3.0.13/3.5.0 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5113 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1357

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!