27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>PVS</strong> ID: 5669 FAMILY: Web Clients RISK: HIGH NESSUS ID:49285<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Google Chrome is<br />

%L.\n\nVersions of Google chrome earlier than 6.0.472.62 are potentially affected by<br />

multiple vulnerabilities :\n\n - It is possible to execute arbitrary code via the Adobe Flash<br />

Player plugin. (CVE-2010-2884)\n\n - There is a bad cast wit malformed SVGs.<br />

(55114)\n\n - The buffer is mismanaged in the SDPY protocol. (55119)\n\n - A cross-origin<br />

property pollution issue exists. (55350)<br />

Solution: Upgrade to Google Chrome 6.0.472.62 or later.<br />

CVE-2010-3730<br />

Flash Player Unspecified Code Execution (APSB10-22)<br />

<strong>PVS</strong> ID: 5670 FAMILY: Web Clients RISK: HIGH NESSUS ID:49307<br />

Description: Synopsis :\n\nThe remote host contains a browser plug-in that is vulnerable to a code<br />

execution attack.\n\nThe remote host has Adobe Flash Player installed. For your<br />

information, the observed version of Adobe Flash Player is %L.\nVersions of Flash Player<br />

9.x earlier than 9.0.283 and 10.x earlier than 10.1.85.3 are potentially affected by an<br />

unspecified code execution vulnerability.<br />

Solution: Upgrade to Flash Player 10.1.85.3 / 9.0.283 or later.<br />

CVE-2010-2884<br />

Syncrify < 2.1 Build 420 Multiple <strong>Security</strong> Bypass Vulnerabilities<br />

<strong>PVS</strong> ID: 5671 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:49659<br />

Description: Synopsis :\n\nThe remote web server is hosting a web application that is affected by<br />

multiple security bypass vulnerabilities.\n\nThe remote web server is hosting Syncrify, a<br />

web-based incremental backup application.\n\nFor your information, the observed version<br />

of Syncrify is %L.\n\nVersions of Syncrify earlier than 2.1 Build 420 are potentially<br />

affected by multiple security bypass vulnerabilities :\n\n - The application fails to restrict<br />

access to the password management page and allows users to change the administrator's<br />

password by directly accessing that page.\n\n - It is possible for users to browse and<br />

download unauthorized files by accessing them directly.<br />

Solution: Upgrade to Syncrify 2.1 Build 420 or later.<br />

CVE Not available<br />

ClamAV < 0.96.3 Denial-of-Service Vulnerability<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5672 FAMILY: Web Clients RISK: HIGH NESSUS ID:49712<br />

Family Internet Services 1530

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!