27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2010-A-0066\nIAVB Reference : 2009-B-0050\nSTIG Finding Severity : Category I<br />

Solution: Upgrade to Mac OS X 10.6.3 or later.<br />

CVE-2010-0537<br />

Trac < 0.11.7 <strong>Security</strong> Bypass Vulnerability<br />

<strong>PVS</strong> ID: 5490 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server is hosting an application that is vulnerable to a<br />

security bypass attack.\n\nThe remote web server is hosting Trac, a web-based software<br />

management application. The installed version of Trac is earlier than 0.11.7. Such versions<br />

are potentially affected by a security bypass flaw which allows unauthorized users to<br />

modify the status and resolution of a ticket.\nFor your information, the observed version of<br />

Trac is: \n %L<br />

Solution: Upgrade to Trac 0.11.7 or later.<br />

CVE Not available<br />

iTunes < 9.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5491 FAMILY: Web Clients RISK: HIGH NESSUS ID:45391<br />

Description: Synopsis : \n\nThe remote host contains an application that is vulnerable to multiple attack<br />

vectors.\n\nThe remote version of iTunes is older than 9.1. Such versions may be affected<br />

by multiple vulnerabilities : \n\n - A buffer underflow in ImageIO's handling of TIFF<br />

images may lead to an application crash or arbitrary code execution. (CVE-2009-2285)\n\n<br />

- An integer overflow in the application's handling of images with an embedded color<br />

profile may lead to an application crash or arbitrary code execution. (CVE-2010-0040)\n\n<br />

- An uninitialized memory access issue in ImageIO's handling of BMP images may result<br />

in sending data from Safari's memory to a website under an attacker's control.<br />

(CVE-2010-0041)\n\n - An uninitialized memory access issue in ImageIO's handling of<br />

TIFF images may result in sending data from Safari's memory to a website under an<br />

attacker's control. (CVE-2010-0042)\n\n - A memory corruption issue in the application's<br />

handling of TIFF images may lead to an application crash or arbitrary code execution.<br />

(CVE-2010-0043)\n\n - An infinite loop in the application's handling of imported MP4<br />

podcast files may lead to an application crash and prevent subsequent operation.<br />

(CVE-2010-0531)\n\n - A race condition during the installation process may allow a local<br />

user modify a file that is then executed with SYSTEM privileges. (CVE-2010-0532)\n\n -<br />

A path searching issue may allow code execution if an attacker can place a specially crafted<br />

DLL in a directory and have a user open anothe file using iTunes in that directory.<br />

(CVE-2010-1795)\n\n - Syncing a mobile device may allow a local user to gain the<br />

priviliges of the console user due to an insecure file operation in the handling of log files.<br />

(CVE-2010-1768)\n\nFor your information, the observed version of iTunes is: \n %L<br />

Solution: Upgrade to iTunes 9.1 or later.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1467

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!