27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

EXPLAIN with specially crafted queries could lead to a crash. (Bug #52711)\n\n - 'LOAD<br />

DATA INFILE' did not check for SQL errors and sent an OK packet even when errors were<br />

already reported. (Bug #52512)<br />

Solution: Upgrade to MySQL Community Server 5.1.49 or later.<br />

CVE-2010-3683<br />

Novell iPrint Client < 5.42 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5647 FAMILY: Web Clients RISK: HIGH NESSUS ID:48364<br />

Description: Synopsis :\n\nThe remote host contains an application that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Novell iPrint Client is<br />

%L\n\nVersions of Novell iPrint Client earlier than 5.42 are potentially affected by<br />

multiple vulnerabilities :\n\n - Due to a flaw in the nipplib.dll module, it may be possible<br />

for a remote attacker to delete arbitrary files from the remote system via the<br />

'CleanUploadFiles' method provided by an ActiveX control. (TPTI-10-05)\n\n - By passing<br />

a specially crafted value to the 'debug' parameter in the ActiveX control ienipp.ocx, it may<br />

be possible for an attacker to trigger a stack-based buffer overflow, potentially resulting in<br />

arbitrary code execution within the context of the user running the browser.<br />

(TPTI-10-06)\n\n - Due to improper validation of plugin parameters, it may be possible for<br />

an attacker to trigger a buffer overflow condition resulting in arbitrary code execution<br />

within the context of the user running the browser. (ZDI-10-139)\n\nDue to improper<br />

validation of plugin parameters it may be possible for an attacker to trigger a stack-based<br />

buffer overflow, potentially resulting in arbitrary code execution within the context of the<br />

user running the browser. (ZDI-10-140)<br />

Solution: Upgrade to Novell iPrint Client 5.42 or later.<br />

CVE-2010-3109<br />

Novell iPrint Client < 5.44 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5648 FAMILY: Web Clients RISK: HIGH NESSUS ID:48407<br />

Description: Synopsis :\n\nThe remote host contains an application that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Novell iPrint Client is<br />

%L.\n\nVersions of Novell iPrint Client earlier than 5.44 are potentially affected by<br />

multiple vulnerabilities :\n\n - A buffer overflow was discovered in how iPrint client<br />

handles the 'call-back-url' parameter value for a 'op-client-interface-version' operation<br />

where the 'result-type' parameter is set to 'url'.\n\n - An uninitialized pointer vulnerability in<br />

ienipp.ocx was discovered and allows an attacker to exploit an issue where the uninitialized<br />

pointer is called and the process jumps to an address space controllable by the attacker.<br />

Solution: Upgrade to Novell iPrint Client 5.44 or later.<br />

CVE-2010-3105<br />

Linksys WAP Default Credentials Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1520

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!