27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of PostgreSQL that is earelir than 8.4.2, 8.3.9, 8.2.15, 8.1.19, 8.0.23, or<br />

7.4.27. Such versions are potentially affected by multiple vulnerabilities : \n\n - NULL<br />

Bytes in SSL Certificates can be used to falsify client or server authentication.<br />

(CVE-2009-4034)\n\n - Privilege escalation via changing session state in an index function.<br />

(CVE-2009-4136) - An integer overflow in the 'ExecChooseHashTableSize()' function of<br />

the 'backend/executor/nodeHash.c' source file which could lead to a denial of service.<br />

(CVE-2010-0733)\n\nFor your information, the observed version of PostgreSQL is: \n %L<br />

Solution: Upgrade to PostgreSQL 7.4.27, 8.0.23, 8.1.19, 8.2.15, 8.3.9, 8.4.2, or later.<br />

CVE-2010-0733<br />

DB2 9.5 < Fix Pack 5 Unspecified Vulnerabilities<br />

<strong>PVS</strong> ID: 5262 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:43172<br />

Description: Synopsis : \n\nThe remote database server is vulnerable to multiple attack<br />

vectors.\n\nAccording to its version, the installation of DB2 9.5 is earlier than Fix Pack 5.<br />

Such versions are potentially affected by multiple unspecified vulnerabilities. For your<br />

information, the observed version of DB2 is: \n %L<br />

Solution: Upgrade to IBM DB2 9.5 Fix Pack 5<br />

CVE-2009-4335<br />

Piwik < 0.5 unserialize() PHP Code Execution Vulnerability<br />

<strong>PVS</strong> ID: 5263 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server is hosting a PHP application that is vulnerable to a<br />

remote code execution vulnerability.\n\nThe remote web server is hosting Piwik, a web<br />

analytics application written in PHP. The installed version is earlier than 0.5. Such versions<br />

are potentially affected by a remote PHP code execution vulnerability because the<br />

application unserializes data from user supplied cookies. An attacker could send a specially<br />

crafted cookie which, when unserialized, could be used to upload arbitrary files or possibly<br />

execute arbitrary PHP code. For your information, the observed version of Piwik is: \n %L<br />

Solution: Upgrade to Piwik 0.5 or later.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Firefox < 3.0.16 / 3.5.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5264 FAMILY: Web Clients RISK: HIGH NESSUS ID:43174<br />

Description: Synopsis : \n\nThe remote host has a web browser installed that is affected by multiple<br />

attack vectors.\n\nThe remote host is running a version of Mozilla Firefox earlier than<br />

3.0.16 or 3.5.6. Such versions are potentially affected by multiple vulnerabilities : \n\n -<br />

Multiple crashes that could result in arbitrary code execution. (MFSA 2009-65)\n\n -<br />

Family Internet Services 1405

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!