27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Sybase ASE (Adaptive Server Enterprise) Database Server Default Credentials<br />

<strong>PVS</strong> ID: 5157 FAMILY: Database RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials\n\nThe remote web server is running the Sybase ASE (Adaptive Server<br />

Enterprise) database server with default credentials. That is, the Sybase ASE server ships<br />

with the default administrative credentials of 'sa/NULL'. The <strong>PVS</strong> has just observed a user<br />

logging in using those credentials.<br />

Solution: Change the credentials and require an encrypted login<br />

CVE Not available<br />

Flash Client Version Detection<br />

<strong>PVS</strong> ID: 5158 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Flash client version: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

QuickTime < 7.6.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5159 FAMILY: Web Clients RISK: HIGH NESSUS ID:40929<br />

Description: Synopsis : \n\nThe remote host contains an application that is vulnerable to multiple attack<br />

vectors.\n\nThe version of QuickTime installed on the remote host is older than 7.6.4. Such<br />

versions contain multiple issues : \n\n - A memory corruption issue exists in the handling of<br />

H.264 movie files. (CVE-2009-2202)\n\n - A buffer overflow in the handling of MPEG-4<br />

video files. (CVE-2009-2203)\n\n - A heap buffer overflow exists in the handling of<br />

FlashPix files. (CVE-2009-2798)\n\n - A heap buffer overflow exists in the handling of<br />

H.264 movie files. (CVE-2009-2799)\n\nFor your information, the installed version of<br />

QuickTime is: \n %L<br />

Solution: Upgrade to QuickTime 7.6.4 or later.<br />

CVE-2009-2799<br />

Apple iPhone < 3.1 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5160 FAMILY: Mobile Devices RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is an Apple iPhone with an OS earlier than 3.1. Such versions are potentially affected by<br />

multiple issues: \n\n - An issue in WebKit's handling of the parent and top objects could<br />

result in cross-site scripting attacks. (CVE-2009-1724)\n\n - A memory corruption issue in<br />

WebKits's handling of numeric character references. (CVE-2009-1725)\n\n - The<br />

International Domain Name support and Unicode fonts embedded in Safari could be used<br />

Family Internet Services 1371

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!