27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Google Chrome < 5.0.375.127 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5644 FAMILY: Web Clients RISK: HIGH NESSUS ID:48383<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Google Chrome installed on the<br />

remote host is %L.\n\nVersions of Google Chrome earlier than 5.0.375.127 are potentially<br />

affected by multiple vulnerabilities :\n\nA memory corruption issue with file dialog. (Bug<br />

45400)\n\nA memory corruption issue with SVGs. (Bug 49596)\n\nAn issue relating to a<br />

bad cast with text editing. (Bug 49268)\n\n - A possible address bar spoofing vulnerability<br />

caused by a history bug. (Bug 49964)\n\n - A memory corruption issue in MIME type<br />

handling. (Bugs 50515, 51835)\n\nA crash on shutdown due to a notifications bug. (Bug<br />

50553)\n\nOmnibox autosuggest is enabled when a user might be typing a password. (Bug<br />

51146)\n\nA memory corruption issue in Ruby support. (Bug 51654)\n\nA memory<br />

corruption issue in Geolocation support. (51670)<br />

Solution: Upgrade to Google Chrome 5.0.375.127 or later.<br />

CVE-2010-3120<br />

Database TDS Failed Login Detection<br />

<strong>PVS</strong> ID: 5645 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The following UserID just failed a SQL login<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

MySQL Community Server 5.1 < 5.1.49 Multiple Denial of Service Vulnerabilities<br />

<strong>PVS</strong> ID: 5646 FAMILY: Database<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:48759<br />

Description: Synopsis :\n\nThe remote database server is vulnerable to multiple denial of service<br />

attacks.\n\nFor your information, the observed version of MySQL Community Server is<br />

%L.\n\nVersions of MySQL Community Server 5.1 earlier than 5.1.49 are potentially<br />

affected by multiple vulnerabilities :\n\n - After changing the values of the<br />

'innodb_file_format' or 'innodb_file_per_table' configuration parameters, DDL statements<br />

could cause a server crash. (Bug #55039)\n\nJoins involving a table with a unique SET<br />

column could cause a server crash. (Bug #54575)\n\nIncorrect handling of NULL<br />

arguments could lead to a crash for IN() or CASE operations when ULL arguments were<br />

either passed explicitly as arguments (for IN()) or implicitly generated by the WITH<br />

ROLLUP modifier which could lead to a crash. (Bug #54477)\n\n - A malformed argument<br />

to the BINLOG statement could result in Valgrind warnings or a server crash. (Bug<br />

#54393)\n\n - Use of TEMPORARY InnoDB tables with nullabale columns could cause a<br />

server crash. (Bug #54044)\n\n - The server could crash if there were alternate reads from<br />

two indexes on a table using the HANDLER interface. (Bug #54007)\n\n - Using<br />

Family Internet Services 1519

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!