27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

of WebSphere is: \n %L<br />

Solution: Apply Fix Pack 5 (7.0.0.5) or later.<br />

CVE-2009-2092<br />

Altiris Deployment Solution < 6.9.430 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5143 FAMILY: Generic RISK: HIGH NESSUS ID:43828<br />

Description: Synopsis : \n\nThe remote Windows host is vulnerable to multiple attack vectors.\n\nThe<br />

version of Altiris Deployment Solution installed on the remote host is earlier than 6.9 SP3<br />

Build 430. Such versions are potentially affected by multiple issues : \n\n - An<br />

authentication bypass vulnerability when 'DBManager' authentication is used.\n\n - An<br />

authentication-bypass vulnerability caused by a race condition when files are transfered<br />

from the server to a client.\n\n A local privilege escalation vulnerability in the 'Aclient'<br />

client GUI. \n\n - A race-condition exists in the 'AClient' client application that an attacker<br />

can exploit to execute malicious commands with SYSTEM-level privileges. \n\nFor your<br />

information, the reported version of Altiris Deployment Solution is: \n %L<br />

Solution: Upgrade to Altiris Deployment Solution 6.9 SP3 Build 430<br />

CVE-2009-3109<br />

FlexCMS < 3.0 'CookieUsername' Parameter SQL Injection<br />

<strong>PVS</strong> ID: 5144 FAMILY: CGI RISK: HIGH NESSUS ID:40824<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a SQL injection attack.\n\nThe remote host<br />

is running FlexCMS, a content management system written in PHP. The installed version<br />

of FlexCMS is earlier than 3.0. Such versions are potentially affected by a SQL injection<br />

vulnerability in the 'CookieUsername' cookie parameter. An attacker, exploiting this flaw,<br />

may be able to compromise the application. Note, that this requires magic_quotes_gpc to be<br />

turned off.\n\nFor your information, the reported version of FlexCMS was: \n %L<br />

Solution: Upgrade to FlexCMS 3.0 or later.<br />

CVE Not available<br />

OpenOffice < 3.1.1 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5145 FAMILY: Generic RISK: HIGH NESSUS ID:40826<br />

Description: Synopsis : \n\nThe remote host has a program that is vulnerable to multiple attack<br />

vectors.\n\nThe version of OpenOffice is earlier than 3.1.1. Such versions are potentially<br />

affected by several issues : \n\n - A boundary error when parsing certain records can be<br />

exploited to cause a heap-based buffer overflow via a specially crafted document.<br />

(CVE-2009-0201)\n\n - An integer underflow error when parsing certain records in the<br />

document table. (CVE-2009-0200)\n\n - A vulnerability in the parser of EMFS files can<br />

lead to the execution of arbitrary commands. (CVE-2009-2139)\n\nFor your information,<br />

the reported version of OpenOffice is: \n %L<br />

Family Internet Services 1367

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!