27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis : \n\nThe remote host is running a web application that is affected by a cross-site<br />

scripting vulnerability.\n\nAccording to its banner, the version of CUPS installed on the<br />

remote host is earlier than 1.4.2. Such versions are potentially affected by a cross-site<br />

scripting vulnerability because the application fails to properly sanitize the 'kerberos'<br />

parameter. For your information, the observed version of CUPS is: \n %L<br />

Solution: Upgrade to CUPS version 1.4.2 or later.<br />

CVE-2009-2820<br />

Ingenico Point of Sales (POS) Device Detection<br />

<strong>PVS</strong> ID: 5231 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is an Ingenico Point of Sales device.<br />

Solution: N/A<br />

CVE Not available<br />

Safari < 4.0.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5232 FAMILY: Web Clients RISK: HIGH NESSUS ID:42478<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

Safari installed on the remote host is earlier than 4.0.4. Such versions are potentially<br />

affected by multiple issues : \n\n - An integer overflow exists in the handling of images<br />

with an embedded color profile, which may lead to a heap buffer overflow.<br />

(CVE-2009-2804)\n\n - Multiple use-after-free issues exist in libxml2, the most serious of<br />

which may lead to an unexpected application termination. (CVE-2009-2414,<br />

CVE-2009-2416)\n\n - An issue exists in Safari's handling of navigations initiated via the<br />

"Open Image in New Tab", "Open Image in New Window", or "Open Link in New Tab"<br />

shortcut menu options. Using these options within a maliciously crafted website could load<br />

a local HTML file, leading to the disclosure of sensitive information. (CVE-2009-2842)\n\n<br />

- An issue exists in WebKit's implementation of Cross-Origin Resource Sharing which<br />

could lead to cross-site request forger attacks. (CVE-2009-2816)\n\n - Multiple<br />

vulnerabilities exist in WebKit's handling of FTP directory listings. Accessing a<br />

maliciously crafted FTP server may lead to information disclosure, unexpected application<br />

termination, or execution of arbitrary code. (CVE-2009-3384)\n\n - When WebKit<br />

encounters an HTML 5 Media Element pointing to an external resource, it does not issue a<br />

resource load callback to determine if the resource should be loaded. This may result in<br />

undesired requests to remote servers. (CVE-2009-2841)\n\nFor your information, the<br />

observed version of Safari is: \n %L \nIAVT Reference : 2009-T-0049\nSTIG Finding<br />

Severity : Category I<br />

Solution: Upgrade to Safari 4.0.4 or later.<br />

CVE-2009-3384<br />

WordPress < 2.8.6 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1395

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!