27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>PVS</strong> ID: 5649 FAMILY: Web Servers RISK: HIGH NESSUS ID:49646<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials\n\nThe remote host is a wireless access point (WAP). This version of Linksys<br />

shipped with a default userID and password which can be used to gain elevated access to<br />

the device. In this case, the credentials are Gemtek/gemtekswd . Since these credentials are<br />

hard coded into the device image, there is not a way to change them via the administrative<br />

tools.<br />

Solution: obtain a fix from the vendor<br />

CVE-2010-1573<br />

Real <strong>Network</strong>s RealPlayer SP < 1.1.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5650 FAMILY: Web Clients RISK: HIGH NESSUS ID:48907<br />

Description: Synopsis :\n\nThe remote host is running an application that is vulnerable to multiple attack<br />

vectors.\n\nThe remote host is running RealPlayer, a multi-media application. For your<br />

information, the observed build of RealPlayer SP is %L.\n\nRealPlayer SP builds earlier<br />

than 12.0.0.879 are potentially affected by multiple vulnerabilities :\n\n - A RealPlayer<br />

malformed 'IVR' pointer index code execution vulnerability exists. (CVE-2010-2996,<br />

CVE-2010-2998)\n\nA RealPlayerActiveX unauthorized file access vulnerability exists.<br />

(CVE-2010-3002)\n\nA RealPlayer 'QCP' file parsing integer overflow vulnerability exists.<br />

(CVE-2010-0116)\n\nA vulnerability exists in the way RealPlayer processes the<br />

dimensions in the 'YUV420' transformation of 'MP4' content. (CVE-2010-0117)\n\nA<br />

heap-based buffer overflow vulnerability exists in RealPlayer's 'QCP' parsing.<br />

(CVE-20010-0120)\n\nA vulnerability exists in the ActiveX IE plugin relating to the<br />

opening of multiple browser windows. (CVE-2010-3001)\n\n - An uninitialized pointer<br />

vulnerability exists in the CDDA URI ActiveX Control. (CVE-2010-3747) - A remote code<br />

execution vulnerability exists in RJMDSections. (CVE-210-3750) - A RealPlayer 'QCP'<br />

parsing heap-based buffer overflow vulnerability exists. (CVE-2010-2578)\n\n - A remote<br />

code execution issue exists in multiple protocol handlers for the RealPlayer ActiveX<br />

control. (CVE-2010-3751)\n\n - A stack overflow vulnerability exists in the RichFX<br />

component. (CVE-2010-3748)\n\n - A paramenter injection vulnerability exists in the<br />

RecordClip browser extension. (CVE-2010-3749)<br />

Solution: Upgrade to RealPlayer SP 1.1.5 or later.<br />

CVE-2010-3751<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

VLC Media Player < 1.1.4 Patch Subversion Arbitrary DLL Injection Code Execution<br />

<strong>PVS</strong> ID: 5651 FAMILY: Web Clients RISK: HIGH NESSUS ID:48906<br />

Description: Synopsis :\n\nThe remote host contains an application that allows arbitrary code<br />

execution.\n\nThe remote host contains VLC player, a multi-media application. For your<br />

information, the observed version of VLC is %L.\n\nVersions of VLC media player earlier<br />

than 1.1.4 are potentially affected by a code execution vulnerability. The application<br />

insecurely looks in its current working directory when resolving DLL dependencies, such<br />

as for 'wintab32.dll'. If a malicious DLL with the same name as a required DLL is located<br />

Family Internet Services 1521

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!