27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CVE-2010-0393<br />

MyBB < 1.4.12 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5513 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server is running a PHP application that is vulnerable to<br />

multiple attack vectors.\n\nThe remote web server is running a version of MyBB earlier<br />

than 1.4.12. Such versions are potentially affected by multiple issues : \n\n - There is a<br />

weakness in the mechanism for generating random passwords. (Bug 843)\n\n - It is possible<br />

to inject arbitrary headers into email sent to MyBB users.\n\n - An unspecified XSRF issue<br />

exists in the usercp2.php script. (Bug 852)\n\nFor your information, the observed version of<br />

MyBB is: \n %L<br />

Solution: Upgrade to MyBB 1.4.12 or later.<br />

CVE Not available<br />

Memcached < 1.4.3 No Newline Memory Consumption DoS<br />

<strong>PVS</strong> ID: 5514 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:45579<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a denial of service attack.\n\nThe remote<br />

host is running memcached, a distributed memory object caching system. The installed<br />

version of memcached is earlier than 1.4.3. Such versions are potentially affected by a<br />

denial of service vulnerability because the application continues to read in new data,<br />

reallocating its input buffer until a newline character is received which could lead to<br />

excessive memory consumption. An attacker, exploiting this flaw, could crash the affected<br />

service.\nFor your information, the observed version of memcached is: \n %L<br />

Solution: Upgrade to memcached 1.4.3 or later.<br />

CVE-2010-1152<br />

Altiris Deployment Solution < 6.9 SP4 DBManager DoS (SYM10-007)<br />

<strong>PVS</strong> ID: 5515 FAMILY: Generic<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:45592<br />

Description: Synopsis : \n\nThe remote Windows host has a deployment server that is affected by a<br />

denial of service vulnerability.\n\nThe version of Altiris Deployment Solution installed on<br />

the remote host is earlier than 6.9 SP4. Such versions are reportedly affected by a denial of<br />

service vulnerability. The DBManager component has a user-after-free error when<br />

processing specially crafted 'CreateSession' and 'PXEManagerSignOn' requests. A remote<br />

attacker could exploit this to crash the DBManager service.\nFor your information, the<br />

observed version of Altiris Deployment Solution is: \n %L<br />

Solution: Upgrade to Altiris Deployment Solution Server 6.9 SP4 or later.<br />

Family Internet Services 1476

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!