27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: N/A<br />

CVE Not available<br />

Winamp < 5.58 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5597 FAMILY: Generic RISK: HIGH NESSUS ID:47717<br />

Description: Synopsis :\n\nThe remote host has a media player installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running Winamp, a media player for Windows. For<br />

your information, the observed version of Winamp is %L.\n\nVersions of Winamp earlier<br />

than 5.58 are potentially affected by multiple vulnerabilities :\n\n - A stack-based buffer<br />

overflow when loading a malformed whatsnew.txt file.\n\n - A stack-based buffer overflow<br />

when parsing VP6 video content.\n\nAn attacker, exploiting these flaws, can execute<br />

arbitrary code in the context of the affected application.<br />

Solution: Upgrade to Winamp version 5.58 or later.<br />

CVE Not available<br />

CMS Made Simple < 1.8.1 Local File Include Vulnerability<br />

<strong>PVS</strong> ID: 5598 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server is running a PHP application that is affected by a<br />

local file include vulnerability.\n\nThe remote host is running CMS Made Simple, a<br />

web-based content-management application written in PHP. For your information, the<br />

observed version of CMS Made Simple is %L.\n\nVersions of CMS Made Simple earlier<br />

than 1.8.1 are potentially affected by a local file include vulnerability because the<br />

application fails to properly sanitize user supplied input to the 'default_lang' parameter of<br />

the 'translation.functions.php' script. A remote, authenticated attacker, exploiting this flaw<br />

could execute arbitrary code subject to the privileges of the user running the affected web<br />

server.<br />

Solution: Upgrade to CMS Made Simple 1.8.1 or later.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

IBM Solid Database < 6.5 Service Pack 2 Handshake Request Username Field Remote Code<br />

Execution<br />

<strong>PVS</strong> ID: 5599 FAMILY: Database RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote database server is vulnerable to a remote code execution<br />

attack.\n\nThe remote host is running IBM SolidDB. For your information, the observed<br />

version of SolidDB is :%L.\n\nVersions of SolidDB earlier than 6.5.0.2 are potentially<br />

affected by a remote code execution vulnerability because the application fails to properly<br />

validate the length of the username field. An attacker, exploiting this flaw, could execute<br />

arbitrary code subject to the privileges of the user running the affected application.<br />

Family Internet Services 1503

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!