27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote web server is hosting an application that is vulnerable to multiple<br />

attack vectors.\n\nThe remote web server is hosting Bugzilla, a web-based bug tracking<br />

application. For your information, the observed version of Bugzilla is %L.\n\nVersions of<br />

Bugzilla 3.2.x earlier than 3.2.8, 3.4.x earlier than 3.4.8, 3.6.x earlier than 3.6.2, and 3.7.x<br />

earlier than 3.7.3 are potentially affected by multiple vulnerabilities :\n\n - It is possible to<br />

(at least partially) determine the membership of any group using the Search interface.<br />

(CVE-2010-2756).\n\n - It is possible to use the 'sudo' feature without sending a<br />

notification to the user being impersonated. (CVE-2010-2757)\n\n - The 'Reports' and<br />

'Duplicates' pages let you guess the name of products you can't see, due to the error<br />

message that is thrown. (CVE-2010-2758)\n\n - For installations using PostgreSQL,<br />

specifying "bug X" or "Attachment X" in a comment can deny access to the bug if X is<br />

larger than the maximum 32-bit signed integer size. (CVE-2010-2759)<br />

Solution: Upgrade to Bugzilla 3.2.8, 3.4.8, 3.6.2, 3.7.3, or later.<br />

CVE-2010-2759<br />

QuickTime < 7.6.7 QuickTimeStreaming.qtx SMIL File Debug Logging Overflow (Windows)<br />

<strong>PVS</strong> ID: 5628 FAMILY: Web Clients RISK: HIGH NESSUS ID:48323<br />

Description: Synopsis :\n\nThe remote host contains an application that is affected by a stack overflow<br />

vulnerability.\n\nFor your information, the observed version of QuickTime is<br />

%L.\n\nVersions of QuickTime earlier than 7.6.7 are potentially affected by a stack<br />

overflow in the application's error logging when debug logging is enabled. If an attacker<br />

can trick a user on the host into viewing a specially crafted movie file, he may be able to<br />

cause an application crash or even execute arbitrary code subject to the user's privileges.<br />

Note that this issue only affects QuickTime on Windows.<br />

Solution: Upgrade to QuickTime 7.6.7 or later.<br />

CVE-2010-1799<br />

SquirrelMail < 1.4.21 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5629 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server if vulnerable to a denial-of-service attack.\n\nThe<br />

remote host is running SquirrelMail, a web-based email client. For your information, the<br />

observed version of SquirrelMail is %L.\n\nVersions of SquirrelMail earlier than 1.4.21 are<br />

potentially affected by a denial-of-service vulnerability. By submitting a random login with<br />

8-bit characters in the password, it is possible to cause SquirrelMail to create a preferences<br />

file even if the login is not valid. An attacker, exploiting this flaw, could create enough files<br />

to cause the server to run out of disk space.<br />

Solution: Upgrade to SquirrelMail 1.4.21 or later.<br />

CVE-2010-2813<br />

Zoiper < 2.24 SIP INVITE Request Remote DoS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1514

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!