27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

the observed version of ViewVC is: \n %L<br />

Solution: Upgrade to ViewVC 1.0.11, 1.1.5, or later.<br />

CVE-2010-0132<br />

Firefox < 3.6.3 Remote Code Execution Vulnerability<br />

<strong>PVS</strong> ID: 5502 FAMILY: Web Clients RISK: HIGH NESSUS ID:45403<br />

Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to a remote<br />

code execution attack.\n\nThe remote host is running a version of Mozilla Firefox 3.6.x<br />

earlier than 3.6.3. Such versions are potentially affected by a memory corruption flaw<br />

caused by the re-use of a freed object when moving DOM nodes between documents. A<br />

remote attacker, exploiting this flaw, could execute arbitrary code on the remote host<br />

subject to the privileges of the user running the affected application.\nFor your information,<br />

the observed version of Firefox is: \n %L<br />

Solution: Upgrade to Firefox 3.6.3 or later.<br />

CVE-2010-1121<br />

CouchDB < 0.11.0 Timing Attack Vulnerability<br />

<strong>PVS</strong> ID: 5503 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:45435<br />

Description: Synopsis : \n\nThe remote host is affected by an information disclosure<br />

vulnerability.\n\nThe remote host is running CouchDB, a document-oriented database. The<br />

installed version of CouchDB is earlier than 0.11.0. Such versions are potentially affected<br />

by an information disclosure vulnerability via a timing attack caused by a break-on-equality<br />

string comparison when verifying hashes or passwords.\nFor your information, the<br />

observed version of CouchDB is: \n %L<br />

Solution: Upgrade to CouchDB 0.11.0 or later.<br />

CVE-2010-0009<br />

Moodle < 1.8.12 / 1.9.8 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5504 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

Moodle installed on the remote host is potentially vulnerable to multiple flaws.\n\n -<br />

Multiple unspecified cross-site scripting vulnerabilities in the KSES text cleaning library.<br />

(MSA-10-0001)\n\n - A cross-site scripting vulnerability exists in the PHP CAS client<br />

library. Note that this only affects Moodle installations that use CAS authentication.<br />

(MSA-10-0002)\n\n - An issue exists in the course profile page which allows ordinary users<br />

to find out the names of other users. (MSA-10-0003)\n\n - The restoring of courses<br />

sometimes results in creation of new roles. (MSA-10-0004)\n\n - A SQL injection<br />

vulnerability exists in several forms. (MSA-10-0005)\n\n - Data passed to the 'add_to_log()'<br />

Family Internet Services 1472

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!