27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

RISK:<br />

MEDIUM<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Pidgin < 2.6.1. Such versions are potentially affected by multiple issues : \n\n -<br />

A denial-of-service vulnerability because it fails to properly handle malformed links sent<br />

via the Yahoo Instant Messenger protocol. (CVE-2009-3025)\n\n - A man-in-the-middle<br />

vulnerability exists because the application does not require the TLS/SSL preference to be<br />

enabled when connecting to older Jabber servers. (CVE-2009-3026)\n\nFor your<br />

information, the reported version of Pidgin is: \n %L<br />

Solution: Upgrade to Pidgin 2.6.1 or later.<br />

CVE-2009-3026<br />

Bugzilla < 3.0.9/3.2.5/3.4.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5169 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Bugzilla, a bug-tracking software with a web interface. The version of Bugzilla<br />

on the remote host is potentially affected by multiple flaws : \n\n - A SQL injection<br />

vulnerability in the 'Bug.search' WebService function. (CVE-2009-3125)\n\n - A SQL<br />

injection vulnerability in the 'Bug.create WebService function. (CVE-2009-3165)\n\n -<br />

When a user reset their password and then logged in immediately afterward, their password<br />

would appear in the URL of their browser. (CVE-2009-3166)\n\nFor your information, the<br />

installed version of Bugzilla is: \n %L<br />

Solution: Upgrade to Bugzilla 3.0.9, 3.2.5, or 3.4.2.<br />

CVE-2009-3166<br />

PostgreSQL Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5170 FAMILY: Database<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:40947<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running PostgreSQL, a database application. The version of PostgreSQL is potentially<br />

affected by multiple issues : \n\n - Authenticated non-superusers can shut down the<br />

backend server by re-LOAD-ing libraries in $libdir/plugins, if any libraries are present<br />

there.\n\n - A privilege escalation issue allows some actions to be performed with superuser<br />

privileges instead of table owner privileges. This is related to the fix for CVE-2007-6600<br />

which failed to include protection against misuse of 'RESET SESSION<br />

AUTHORIZATION'.\n\n - If PostgreSQL is configured with LDAP authentication, and<br />

your LDAP configuration allows anonymous binds, it is possible for a user to authenticate<br />

themselves with an empty password.\n\nFor your information, the installed version of<br />

PostgreSQL is: \n %L<br />

Solution: Upgrade to PostgreSQL 8.0.22, 8.1.18, 8.2.14, 8.3.8, or 8.4.1.<br />

Family Internet Services 1375

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!