27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

XMPP Client Detection<br />

<strong>PVS</strong> ID: 5687 FAMILY: Generic RISK: NONE NESSUS ID:Not Available<br />

Description: The following host is an XMPP client. The client application which is using XMPP is:\n<br />

%L<br />

Solution: N/A<br />

LDAP Server Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 5688 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is an LDAP server<br />

Solution: Ensure that this server is authorized with respect to Corporate standards and policies.<br />

CVE Not available<br />

Winamp < 5.59 Build 3033 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5689 FAMILY: Generic RISK: HIGH NESSUS ID:50379<br />

Description: Synopsis :\n\nThe remote host has a media player installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running Winamp, a media player for Windows. For<br />

your information, the observed version of Winamp is %L.\n\nVersions of Winamp earlier<br />

than 5.59 build 3033 are potentially affected by multiple vulnerabilities :\n\n - Winamp<br />

loads libraries in an insecure manner. (CVE-2010-3137)\n\n - An integer overflow<br />

vulnerability exists in the 'in_mkv.dll' plugin when parsing MKV content.\n\n - A<br />

heap-based buffer overflow vulnerability exists in the 'in_midi.dll' plugin when parsing<br />

MIDI content.\n\n - A stack-based buffer overflow vulnerability exists in the 'in_mod.dll'<br />

plugin when parsing Multitracker Module files.\n\n - A heap-based buffer overflow<br />

vulnerability exists in the 'in_nsv.dll' plugin when parsing NSV content.\n\n - A heap-based<br />

buffer overflow vulnerability exists when parsing VP6 video content.<br />

Solution: Upgrade to Winamp 5.59 build 3033 or later.<br />

CVE-2010-3137<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Firefox 3.5.x < 3.5.15 Buffer Overflow Vulnerability<br />

<strong>PVS</strong> ID: 5690 FAMILY: Web Clients RISK: HIGH NESSUS ID:50382<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to a buffer<br />

overflow attack.\n\nFor your information, the observed version of Firefox is<br />

:%L.\n\nVersions of Firefox 3.5.x earlier than 3.5.15 are potentially affected by a buffer<br />

overflow vulnerability when mixing 'document.write()' and DOM insertions. (MFSA<br />

2010-73)<br />

Family Internet Services 1537

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!