27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote<br />

Windows host contains a version of Adobe AIR player that is earlier than 1.5.3. Such<br />

versions are reportedly affected by multiple vulnerabilities : \n\n - A vulnerability in the<br />

parsing of JPEG data that could potentially lead to code execution. (CVE-2009-3794)\n\n -<br />

A data injection vulnerability that could potentially lead to code execution.<br />

(CVE-2009-3796)\n\n - A memory corruption vulnerability that could potentially lead to<br />

code execution. (CVE-2009-3797)\n\n - A memory corruption vulnerability that could<br />

potentially lead to code execution. (CVE-2009-3798)\n\n - An integer overflow<br />

vulnerability that could potentially lead to code execution. (CVE-2009-3799)\n\n - Multiple<br />

crash vulnerabilities that could potentially lead to code execution. (CVE-2009-3800)\n\n -<br />

A Windows-only local file name access vulnerability in the Flash Player ActiveX control<br />

that could potentially lead to information disclosure. (CVE-2009-3951)\n\nFor you<br />

information, the observed version of Adobe AIR is: \n %L<br />

Solution: Upgrade to Adobe AIR 1.5.3 or later.<br />

CVE-2009-3951<br />

Moodle < 1.8.11 / 1.9.7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5257 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

Moodle installed on the remote host is potentially vulnerable to multiple flaws.\n\n -<br />

Multiple cross-site request forger issues. (MSA-09-0022)\n\n - User account disclosure in<br />

LAMS module. (MSA-09-0023)\n\n - Insufficient access control may allow unauthorized<br />

users to view glossary entries. (MSA-09-0024)\n\n - Invalid application access control in<br />

MNET interface could allow execution of any MNET function from all registered remote<br />

servers. (MSA-09-0026)\n\n - Login information can be sent unsecured even when a site is<br />

configured to use SSL for logins. (MSA-09-0027)\n\n - A SQL injection issue in the<br />

SCORM module. (MSA-09-0031)\n\nFor your information, the observed version of<br />

Moodle is: \n %L<br />

Solution: Upgrade to Moodle version 1.8.11, 1.9.7, or later.<br />

CVE-2009-4305<br />

TestLink < 1.8.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5258 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:43101<br />

Description: Synopsis : \n\nThe remote web server is vulnerable to multiple attack vectors.\n\nThe<br />

remote web server is hosting TestLink, a PHP-based testing suite. The installed version of<br />

TestLink is earlier than 1.8.5. Such versions are potentially affected by multiple<br />

vulnerabilities.\n\n - A cross-site scripting vulnerability in the 'req' parameter of the<br />

'login.php' script which does not require credentials to exploit.\n\n - Cross-site scripting<br />

vulnerabilities in the 'key' parameter of the '/lib/general/staticPage.php script, the<br />

'tableName' parameter of the '/lib/attachments/attachmentupload.php' script, and the<br />

'startDate', 'endDate', and 'logLevel' parameters of the '/lib/events/eventviewer.php' script. -<br />

Family Internet Services 1403

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!