27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

RISK:<br />

MEDIUM<br />

Description: Synopsis : \n\nThe remote database server is vulnerable to multiple attack<br />

vectors.\n\nAccording to its version, the installation of DB2 9.1 on the remote host is<br />

affected by one or more of the following issues : \n\n - MODIFIED SQL DATA table<br />

function is not dropped when definer loses required privileges to maintain the objects.<br />

(IZ46773/IZ46774)\n\n - A user without sufficient privileges could insert, update, or delete<br />

rows in a table. (IZ50078/IZ50079)\n\n - A user can perform 'SET SESSION<br />

AUTHORIZATION' without 'SETSESSIONUSER' privilege. (IZ55883)\n\nFor your<br />

information, the observed version of DB was : \n %L<br />

Solution: Upgrade to DB2 9.1 Fix Pack 8<br />

CVE-2009-3474<br />

Informix Dynamic Server Long Password Remote Denial of Service<br />

<strong>PVS</strong> ID: 5191 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable a remote denial of service attack.\n\nThe<br />

remote host is running the Informix Dynamic server. According to its banner, the installed<br />

version is vulnerable to a remote denial of service attack when the application processes<br />

passwords of length greater than 512 bytes through a JDBC connection. For your<br />

information, the observed version of Informix Dynamic Server is: \n %L \n<br />

Solution: Upgrade to Informix Dynamic Server 10.00.xC11, 11.10.xC4, or 11.50.xC5<br />

CVE-2009-3470<br />

Websense Proxy Detection<br />

<strong>PVS</strong> ID: 5192 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Websense proxy. The detected version is: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Google Chrome < 3.0.195.24 Remote Code Execution<br />

<strong>PVS</strong> ID: 5193 FAMILY: Web Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:41958<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is vulnerable to remote code<br />

execution attacks.\n\nThe version of Google Chrome installed on the remote host is earlier<br />

than 3.0.195.24. Such versions are potentially affected by a remote code execution<br />

vulnerability. The 'v8' engine usees a common 'dtoa()' implementation to parse strings into<br />

floating point numbers. An attacker, exploiting this flaw, can execute arbitrary code in the<br />

Family Internet Services 1382

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!