27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis : \n\nThe remote host is affected by a buffer overflow vulnerability.\n\nThe<br />

remote host is running Pidgin 2.5.9. Such versions reportedly trigger an memcpy to an<br />

invalid location in memory when receiving two consecutive specially crafted SLP message.<br />

For your information, the reported version of Pidgin is: \n %L<br />

Solution: Upgrade to Pidgin 2.5.9 or later.<br />

CVE-2009-2694<br />

Buildbot < 0.7.11p3 Multiple Cross-site Scripting Vulnerabilities<br />

<strong>PVS</strong> ID: 5138 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Buildbot, a software project to automate the compile test cycle for software<br />

projects. The installed version is earlier than 0.7.11p3. Such versions are potentially<br />

affected by multiple cross-site scripting vulnerabilities. For your information, the reported<br />

version of Buildbot was: \n %L<br />

Solution: Upgrade to Buildbot 0.7.11p3 or later.<br />

CVE-2009-2967<br />

TortoiseSVN < 1.5.6 / 1.6.0-1.6.3 Multiple Integer Overflows<br />

<strong>PVS</strong> ID: 5139 FAMILY: Generic RISK: HIGH NESSUS ID:40620<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe installed<br />

version of the TortoiseSVN is affected by multiple heap overflow issues. Specifically, the<br />

'libsvn_delta' library fails to perform sufficient boundary checks before processing certain<br />

svndiff streams. An attacker with commit access to a vulnerable Subversion server could<br />

exploit this vulnerability from a Subversion client to trigger a heap overflow on the server.<br />

Typically such an attack would result in a denial of service condition or arbitrary code<br />

execution. An attacker could also trigger this issue from a rogue Subversion server on a<br />

Subversion client in response to a checkout or update request. For your information, the<br />

reported version of TortoiseSVN is: \n %L<br />

Solution: Upgrade to TortoiseSVN 1.5.7/1.6.4 or later.<br />

CVE-2009-2411<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

SVN < 1.5.6 / 1.6.0-1.6.3 Multiple Integer Overflows<br />

<strong>PVS</strong> ID: 5140 FAMILY: Generic RISK: HIGH NESSUS ID:40620<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe installed<br />

version of SVN is affected by multiple heap overflow issues. Specifically, the 'libsvn_delta'<br />

library fails to perform sufficient boundary checks before processing certain svndiff<br />

streams. An attacker with commit access to a vulnerable Subversion server could exploit<br />

this vulnerability from a Subversion client to trigger a heap overflow on the server.<br />

Family Internet Services 1365

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!