27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE-2010-1975<br />

MySQL Community Server 5.1 < 5.1.46 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5547 FAMILY: Database RISK: LOW NESSUS ID:46328<br />

Description: Synopsis :\n\nThe remote database server is vulnerable to multiple attack vectors.\n\nThe<br />

reported version of MySQL Community Sever 5.1 on the remote host is %L.\n\nVersions<br />

of MySQL Community Server 5.1 earlier than 5.1.46 are potentially affected by the<br />

following vulnerabilities :\n\n - A local user may be able to issue a 'DROP TABLE'<br />

command for one MyISAM table and remove the data and index files of a different<br />

MyISAM table. (Bug #40980)\n\n - The application does not correct check privileges in<br />

calls to 'UNINSTALL PLUGIN', which could be abused by an unprivileged user to<br />

uninstall plugins loaded dynamically. (BUG #51770)<br />

Solution: Upgrade to MySQL Community Server 5.1.46 or later.<br />

CVE-2010-1626<br />

ClamAV < 0.96.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5548 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:46706<br />

Description: Synopsis :\n\nThe remote host is running an anti-virus application that is vulnerable to<br />

multiple attack vectors.\n\nThe reported version of ClamAV on the remote host is %L.<br />

Versions of ClamAV earlier than 0.96.1 are potentially affected by multiple vulnerabilities<br />

:\n\n - An error exists within the 'cli_pdf()' function in 'libclamav/pdf.c' when processing<br />

certain PDF files. (2016)\n\n - An error exists within the 'parseicon()' function in<br />

'libclamav/pe_icons.c' when processing PE icons. This can be exploited to trigger an<br />

out-of-bounds access when reading data and potentially cause a crash via a specially crafted<br />

PE file. (2031)<br />

Solution: Upgrade to ClamAV 0.96.1 or later.<br />

CVE-2010-1640<br />

Trojan/Backdoor - Warbot Detection<br />

<strong>PVS</strong> ID: 5549 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'Backdoor'<br />

program\n\nA host is making HTTP requests that are formatted as a Warbot command<br />

would be. This is indicitive of an infection by the Warbot trojan. The Warbot trojan allows<br />

for arbitrary code to be executed on the system, as well as enables it to be used in various<br />

DDoS attacks.<br />

realtime<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Solution: Update your Antivirus and perform a full scan of the remote operating system.<br />

Family Internet Services 1486

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!