27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

user into opening a specially crafted MP3 file, which could lead to arbitrary code<br />

execution. (CVE-2009-2499)\n\nNote that this patch is not available for unsupported<br />

Service Packs. For your information, the installed version of Windows Media Format<br />

Runtime is: \n %L \nIAVA Reference : 2009-A-0076\nSTIG Finding Severity : Category II<br />

Solution: Apply the patches in the Microsoft bulletin.<br />

CVE-2009-2499<br />

MS09-047: Vulnerabilities in Windows Media Format (Windows XP 64-bit)<br />

<strong>PVS</strong> ID: 5166 FAMILY: Generic RISK: HIGH NESSUS ID:40890<br />

Description: Synopsis : \n\nThe remote Windows host is affected by multiple attack vectors.\n\nThe<br />

remote Windows host contains a version of the Windows Media Format Runtime that is<br />

affected by multiple issues : \n\n - The ASF parser has an invalid free vulnerability. A<br />

remote attacker could exploit this by tricking a user into opening a specially crafted ASF<br />

file, which could lead to arbitrary code execution. (CVE-2009-2498)\n\n - The MP3 parser<br />

has a memory corruption vulnerability. A remote attacker could exploit this by tricking a<br />

user into opening a specially crafted MP3 file, which could lead to arbitrary code<br />

execution. (CVE-2009-2499)\n\nNote that this patch is not available for unsupported<br />

Service Packs. For your information, the installed version of Windows Media Format<br />

Runtime is: \n %L \nIAVA Reference : 2009-A-0076\nSTIG Finding Severity : Category II<br />

Solution: Apply the patches in the Microsoft bulletin.<br />

CVE-2009-2499<br />

MS09-047: Vulnerabilities in Windows Media Format (Windows Vista / Server 2008)<br />

<strong>PVS</strong> ID: 5167 FAMILY: Generic RISK: HIGH NESSUS ID:40890<br />

Description: Synopsis : \n\nThe remote Windows host is affected by multiple attack vectors.\n\nThe<br />

remote Windows host contains a version of the Windows Media Format Runtime that is<br />

affected by multiple issues : \n\n - The ASF parser has an invalid free vulnerability. A<br />

remote attacker could exploit this by tricking a user into opening a specially crafted ASF<br />

file, which could lead to arbitrary code execution. (CVE-2009-2498)\n\n - The MP3 parser<br />

has a memory corruption vulnerability. A remote attacker could exploit this by tricking a<br />

user into opening a specially crafted MP3 file, which could lead to arbitrary code<br />

execution. (CVE-2009-2499)\n\nFor your information, the installed version of Windows<br />

Media Format Runtime is: \n %L \nIAVA Reference : 2009-A-0076\nSTIG Finding<br />

Severity : Category II<br />

Solution: Apply the patches in the Microsoft bulletin.<br />

CVE-2009-2499<br />

Pidgin < 2.6.1 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5168 FAMILY: Internet Messengers NESSUS ID:40986<br />

Family Internet Services 1374

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!