27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

MS09-061: Vulnerabilities in the Microsoft .NET Framework 3.5.1 Common Language Runtime<br />

Could Allow Remote Code Execution (974378)<br />

<strong>PVS</strong> ID: 5224 FAMILY: Web Servers RISK: HIGH NESSUS ID:42117<br />

Description: Synopsis :\n\nThe remote .NET Framework 3.5.1 is vulnerable to remote code execution<br />

attacks.\n\nThe remote host is running a version of the .NET Framework 3.5.1 which is<br />

potentially affected by multiple vulnerabilities :\n\n - A remote code execution<br />

vulnerability exists in the Microsoft .NET Framework that could allow a malicious<br />

Microsoft .NET Framework application to obtain a managed pointer to stack memory that<br />

is no longer used. (CVE-2009-0090)\n\n - A remote code execution vulnerability exists in<br />

the Microsoft .NET Framework that could allow a malicious Microsoft .NET application to<br />

bypass a type equality check. (CVE-2009-0091)\n\n - A remote code execution<br />

vulnerability exists in the Microsoft .NET Framework that can allow a malicious Microsoft<br />

.NET application to modify memory of the attacker's choice. (CVE-2009-2497)\n\nFor<br />

your information, the observed version of Microsoft .NET is\n%L<br />

Solution: Apply the patches referenced in Microsoft's security bulletin.<br />

CVE-2009-0091<br />

Google Chrome < 3.0.195.32 Remote Code Execution<br />

<strong>PVS</strong> ID: 5225 FAMILY: Web Clients RISK: HIGH NESSUS ID:42413<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is vulnerable to remote code<br />

execution attacks.\n\nThe version of Google Chrome installed on the remote host is earlier<br />

than 3.0.195.32. Such versions are potentially affected by multiple vulnerabilities : \n\n -<br />

The user is not warned about certain possibly dangerous file types such as 'SVG', 'MHT',<br />

and 'XML' files. In some browsers, JavaScript can execute within these types of files.<br />

(23979)\n\n - A malicious site could use the Gears SQL API to put SQL metadata into a<br />

bad statement which could cause a subsequent memory corruption. This could lead to a<br />

Gears plugin crash or possibly arbitrary code execution. (26179)\n\nFor your information,<br />

the observed version of Google Chrome is: \n %L<br />

Solution: Upgrade to Google Chrome 3.0.195.32 or later.<br />

CVE-2009-3934<br />

eDirectory < 8.8.5 ftf1/8.7.3.10 ftf2 NULL Base DN DoS<br />

<strong>PVS</strong> ID: 5226 FAMILY: Generic<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:42412<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a denial of service attack.\n\nThe remote<br />

host is running eDirectory, a directory service from Novell. The installed version is earlier<br />

than 8.8 SP5 ftf1, or 8.7.3.10 ftf2. Such versions are affected by a denial of service<br />

vulnerability when handling search requests with an undefined BaseDN. For your<br />

information, the observed version of Novell eDirectory is: \n %L<br />

Solution: Upgrade to eDirectory 8.8 SP5 ftf1 / 8.7.3.10 ftf2 or later.<br />

Family Internet Services 1393

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!