27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Apple iPhone OS < 3.1.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5337 FAMILY: Mobile Devices RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is an iPhone with an OS version earlier than 3.1.3. Such versions are potentially affected by<br />

multiple vulnerabilities : \n\n - A buffer overflow exists in the handling of mp4 audio files.<br />

(CVE-2010-0036)\n\n - A buffer underflow exists in ImageIO's handling of TIFF images.<br />

(CVE-2009-2285)\n\n - A memory corruption issue exists in the handling of a certain USB<br />

control message. (CVE-2010-0038)\n\n - Multiple input validation issues exist in WebKit's<br />

handling of FTP directory listings. (CVE-2009-3384)\n\n - When WebKit encounters an<br />

HTML 5 Media Element pointing to an external resource, it does not issue a resource load<br />

callback to determine if the resource should be loaded. (CVE-2009-2841)\n\nFor your<br />

information, the observed version of iPhone OS is: \n %L<br />

Solution: Upgrade to iPhone OS 3.1.3 or later.<br />

CVE-2010-0038<br />

Flash Player < 10.0.45.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5338 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:44596<br />

Description: Synopsis : \n\nThe remote host contains a browser plug-in that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host conatains a version of Adobe Flash Player that is earlier<br />

than 10.0.45.2. Such versions are potentially affected by multiple vulnerabilities : \n\n - An<br />

issue which could subvert the domain sandbox and make unauthorized cross-domain<br />

requests. (CVE-2010-0186)\n\n - An unspecified denial of service.<br />

(CVE-2010-0187)\n\nFor your information, the observed version of Flash player is: \n %L<br />

Solution: Upgrade to Adobe Flash Player 10.0.45.2 or later.<br />

CVE-2010-0187<br />

OpenOffice < 3.2 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5339 FAMILY: Generic RISK: HIGH NESSUS ID:44597<br />

Description: Synopsis : \n\nThe remote host has a program that is vulnerable to multiple attack<br />

vectors.\n\nThe version of OpenOffice installed on the remote host is earlier than 3.2. Such<br />

versions are potentially affected by several issues : \n\n - <strong>Signatures</strong> may not be handled<br />

properly due to a vulnerability in the libxml2 library. (CVE-2006-4339)\n\n - There is an<br />

HMAC truncation authentication bypass vulnerability in the libxmlsec library.<br />

(CVE-2009-0217)\n\n - The application is bundled with a vulnerable version of the<br />

Microsoft VC++ runtime. (CVE-2009-2493)\n\n - Specially crafted XPM files are not<br />

processed properly, which could lead to arbitrary code execution. (CVE-2009-2949)\n\n -<br />

Specially crafted GIF files are not processed properly, which could lead to arbitrary code<br />

execution. (CVE-2009-2950)\n\n - Specially crafted Microsoft Word documents are not<br />

processed properly, which could lead to arbitrary code execution. (CVE-2009-3301 /<br />

CVE-2009-3302)\n\nFor your information, the observed version of OpenOffice is: \n %L<br />

Family Internet Services 1429

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!