27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis : \n\nThe remote web server is vulnerable to a remote denial of service<br />

attack.\n\nThe remote web server is hosting McAfee Common Management Agent, a<br />

management related component for various McAfee products. The installed version of<br />

McAfee Common Management Agent is earlier than 3.6.0.603. Such versions are<br />

potentially affected by a remote denial of service vulnerability in the<br />

'FrameworkService.exe' component when handling multiple large HTTP requests. For your<br />

information, the observed version of McAfee Common Management Agent is: \n %L<br />

Solution: Upgrade to Common Management Agent 3.6.0 Patch 3 with HotFix 10 or later.<br />

CVE-2007-6584<br />

MySQL < 5.1.41 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5240 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:42900<br />

Description: Synopsis : \n\nThe remote database server is vulnerable to multiple attack vectors.\n\nThe<br />

remote host is running MySQL Community server < 5.1.41. Such versions are potentially<br />

affected by multiple issues : \n\n - The application fails to correctly handle the data<br />

directory path name if it contains symlinked directories in its path which could lead to a<br />

local privilege escalation. (Bug 32167)\n\n - MySQL clients linked against OpenSSL did<br />

not check server certificates presented by a server linked against yaSSL. (Bug 47320)\n\n -<br />

An error related to the handling of certain SELECT statements containing subqueries.\n\n -<br />

A failure to preserve unspecified 'null_value' flags when executing statements that use the<br />

'GeomFromWKB' function.\n\nFor your information, the observed version of MySQL is: \n<br />

%L<br />

Solution: Upgrade to MySQL Community server 5.1.41 or later.<br />

CVE-2009-4019<br />

Opera < 10.10 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5241 FAMILY: Web Clients RISK: HIGH NESSUS ID:42892<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

Opera installed on the remote host is earlier than 10.01. Such versions are potentially<br />

affected by multiple vulnerabilities : \n\n - Error messages can leak onto unrelated sites,<br />

potentially leading to cross-site scripting attacks. (941)\n\n - A heap buffer overflow in<br />

string to number conversion. (942)\n\nFor your information, the observed version of Opera<br />

is: \n %L<br />

Solution: Upgrade to Opera 10.10 or later.<br />

CVE-2009-0689<br />

PHP 5.3.x < 5.3.1 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5242 FAMILY: Web Servers NESSUS ID:42862<br />

Family Internet Services 1398

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!