27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Opera < 10.62 Path Subversion Arbitrary DLL Injection Code Execution<br />

<strong>PVS</strong> ID: 5661 FAMILY: Web Clients RISK: HIGH NESSUS ID:49174<br />

Description: Synopsis :\n\nThe remote host has a web browser that is affected by an arbitrary code<br />

execution vulnerability.\n\nThe remote host is running the Opera web browser. For your<br />

information, the observed version of Opera is %L.\n\nVersions of Opera earlier than 10.62<br />

may unintentionally load malicious DLL files and execute arbitrary code due to Opera's<br />

DLL search methods. (970)<br />

Solution: Upgrade to Opera 10.62 or later.<br />

CVE Not available<br />

Squid < 3.1.8 / 3.2.0.2 NULL Pointer Dereference Denial of Service Vulnerability<br />

<strong>PVS</strong> ID: 5662 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:49693<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running Squid, a web proxy application. For your information, the observed<br />

version of Squid is %L.\n\nVersions of Squid earlier than 3.1.8 / 3.2.0.2 are potentially<br />

affected by a denial of service vulnerability caused by an internal error in its string<br />

handling. A remote attacker, exploiting this flaw, could crash the affected service.<br />

Solution: Upgrade to Squid version 3.1.8, 3.2.0.2, or later.<br />

CVE-2010-3072<br />

Samba 3.x < 3.5.5 / 3.4.9 / 3.3.14 sid_parse Buffer Overflow<br />

<strong>PVS</strong> ID: 5663 FAMILY: Samba RISK: HIGH NESSUS ID:49228<br />

Description: Synopsis :\n\nThe remote Samba server is affected by a buffer overflow<br />

vulnerability.\n\nFor your information, the observed version of Samba is<br />

%L.\n\nAccording to its banner, the version of Samba 3.x running on the remote host is<br />

earlier than 3.5.5. The 'sid_parse()' and related 'dom_sid_parse()' functions in such versions<br />

fail to correctly check their input lengths when reading a binary representation of a<br />

Windows SID (<strong>Security</strong> ID). An attacker who is able to get a connection to a file share,<br />

either authenticated or via a guest connection, can leverage this issue to launch a stack<br />

buffer overflow attack against the affected smbd service and possibly execute arbitrary<br />

code.<br />

Solution: Either apply one of the patches referenced in the project's advisory or upgrade to 3.5.5 /<br />

3.4.9 / 3.3.14 or later.<br />

CVE-2010-3069<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Google Chrome < 6.0.472.59 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5664 FAMILY: Web Clients RISK: HIGH NESSUS ID:49237<br />

Family Internet Services 1527

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!