27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

(CVE-2010-2068)<br />

Solution: Either ensure the affected module is not in use or upgrade to Apache version 2.2.16 or later.<br />

CVE-2010-2068<br />

PHP < 5.3.3 / 5.2.14 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5616 FAMILY: Web Servers RISK: HIGH NESSUS ID:48245<br />

Description: Synopsis :\n\nThe remote web server uses a version of PHP that is affected by multiple<br />

vulnerabilities.\n\nAccording to its banner the version of PHP installed on the remote host<br />

is earlier than 5.3.3 / 5.2.14. Such version are potentially affected by multiple<br />

vulnerabilities :\n\n - An information disclosure vulnerability in var_export() when a fatal<br />

error occurs.\n\n - A resource destruction issue in shm_put_var().\n\n - A possible<br />

information leak because of an interruption of XOR operator.\n\n - A memory corruption<br />

issue caused by an unexpected call-time pass by reference and the following memory<br />

clobbering through callbacks.\n\n - A memory corruption issue in<br />

ArrayObject::uasort().\n\n - A memory corruption issue in parse_str().\n\n - A memory<br />

corruption issue in pack().\n\n - A memory corruption issue in substr_replace().\n\n - A<br />

memory corruption issue in addcslashes().\n\n - A stack exhaustion issue in fnmatch().\n\n -<br />

A buffer overflow vulnerability in the dechunking filter.\n\n - An arbitrary memory access<br />

issue in the sqlite extension.\n\n - A string format validation issue in the phar extension.\n\n<br />

- An unspecified issue relating to the handling of session variable serialization on certain<br />

prefix characters.\n\n - A NULL pointer dereference issue when processing invalid<br />

XML-RPC requests.\n\n - An unserialization issue in SplObjectStorage.\n\n - Buffer<br />

overflow vulnerabilities in mysqlnd_list_fields and mysqlnd_change_user.\n\n - Buffer<br />

overflows when handling error packets in mysqlnd.<br />

Solution: Upgrade to PHP version 5.2.14, 5.3.3, or later.<br />

CVE-2010-2531<br />

Safari < 4.1.1 / 5.0.1 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5617 FAMILY: Web Clients RISK: HIGH NESSUS ID:47888<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Safari is %L.\n\nThe remote host<br />

has Safari installed. For your information, the observed version of Safari is<br />

%L.\n\nVersions of Safari earlier than 4.1.1 / 5.0.1 are potentially affected by multiple<br />

vulnerabilities :\n\n - Safari's AutoFill feature may disclose information to websites without<br />

user interaction. (CVE-2010-1796)\n\n - A use after free issue exists in WebKit's handling<br />

of element focus may lead to an application crash or arbitrary code execution.<br />

(CVE-2010-1780)\n\n - A memory corruption issue exists in WebKit's rendering of inline<br />

elements . (CVE-2010-1782)\n\n - A memory corruption issue exists in WebKit's handling<br />

of dynamic modifications to text nodes .\n\n - A memory corruption issue exists in<br />

WebKit's handling of CSS counters . (CVE-2010-1784)\n\n - An uninitialized memory<br />

access issue exists in WebKit's handling of the ':first-letter' and ':first-line' pseudo-elements<br />

in SVG text elements . (CVE-2010-1785)\n\n - A use after free issue exists in WebKit's<br />

Family Internet Services 1510

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!