27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Ability Mail Server < 2.70 Remote Denial of Service<br />

<strong>PVS</strong> ID: 5187 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:41644<br />

Description: Synopsis : \n\nThe remote mail server is affected by a denial of service<br />

vulnerability.\n\nThe remote host appears to be running Ability Mail Server < 2.70. Such<br />

versions are potentially affected by an issue caused by an unspecified error when handling<br />

IMAP version 4 FETCH commands. An attacker could exploit this flaw to crash the<br />

affected service. For your information, the reported version of Ability Mail Server is: \n<br />

%L<br />

Solution: Upgrade to Ability Mail Server 2.70 or later.<br />

CVE-2009-3445<br />

VLC Media Player < 1.0.2 Multiple Buffer Overflows<br />

<strong>PVS</strong> ID: 5188 FAMILY: Web Clients RISK: HIGH NESSUS ID:41626<br />

Description: Synopsis : \n\nThe remote host contains an application that is vulnerable to multiple attack<br />

vectors.\n\nThe version of VLC media player installed on the remote host that is earlier<br />

than 1.0.2. Such versions are potentially vulnerable to a stack overflow when parsing a<br />

MPF, ASF, or AVI file with an overly deep box structure. If an attacker can trick a user<br />

into opening a specially crafted MP4, ASF, or AVI file with the affected application, he<br />

may be able to execute arbitrary code subject to the user's privileges. For your information,<br />

the reported version of VLC is: \n %L<br />

Solution: Upgrade to VLC Media Player 1.0.2 or later.<br />

CVE Not available<br />

BlackBerry Dialog Box Certificate Mismatch<br />

<strong>PVS</strong> ID: 5189 FAMILY: Mobile Devices<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is affected by a certificate mismatch vulnerability.\n\nThe<br />

remote host is running the BlackBerry Browser. The installed version of the browser is<br />

potentially affected by an issue wherein a malicious user could create a web site that<br />

includes a certificate that is purposely altered using null characters in the certificate's<br />

Common Name (CN) field to deceive a user into believing they are accessing a trusted site.<br />

For your information, the reported version of the BlackBerry browser is: \n %L<br />

Solution: Upgrade the browser to 4.5.0.173, 4.6.0.303, 4.6.1.309, 4.7.0.179, or 4.7.1.57<br />

CVE-2009-3477<br />

DB2 9.1 < Fix Pack 8 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5190 FAMILY: Database NESSUS ID:42044<br />

Family Internet Services 1381

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!