27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: Upgrade to SmartFTP 4.0.1142 or later.<br />

CVE Not available<br />

Adobe Flash Media server < 3.0.7 / 3.5.5 / 4.0.1 Multiple Vulnerabilities (APSB10-27)<br />

<strong>PVS</strong> ID: 5704 FAMILY: Web Servers RISK: HIGH NESSUS ID:50562<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Adobe Flash Media Server. For your information, the observed version of Adobe<br />

Flash Media Server is %L.\n\nVersions of Adobe Flash Media Server earlier than 3.0.7,<br />

3.5.5, or 4.0.1 are potentially affected by multiple vulnerabilities :\n\n - The server is<br />

vulnerable to a denial of service attack due to an unspecified memory leak error.<br />

(CVE-2010-3633)\n\n - The server is vulnerable to a denial of service attack due to an<br />

unspecified error in the server's 'edge process'. (CVE-2010-3634)\n\n - An unspecified error<br />

exists which can allow an attacker to cause a segmentation fault and may lead to arbitrary<br />

code execution. (CVE-2010-3635)<br />

Solution: Upgrade to Flash Media Server 3.0.7, 3.5.5, 4.0.1, or later.<br />

CVE-2010-3635<br />

Mac OS X 10.6 < 10.6.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5705 FAMILY: Generic RISK: HIGH NESSUS ID:50549<br />

Description: Synopsis :\n\nThe remote host is missing a Mac OS X update that fixes various security<br />

issues.\n\nFor your information, the observed version of Mac OS X is %L.\n\nVersions of<br />

Mac OS X 10.6 earlier than 10.6.5 are potentially affected by multiple vulnerabilities. Mac<br />

OS X 10.6.5 contains security fixes for the following products :\n\n - AFP Server\n\n -<br />

Apache mod_perl\n\n - Apache\n\n - AppKit\n\n - ATS\n\n - CF<strong>Network</strong>\n\n -<br />

CoreGraphics\n\n - CoreText\n\n - CUPS\n\n - Directory Services\n\n -<br />

diskdev_cmds\n\nDisk Images\n\n - Flash Player plug-in\n\n - gzip\n\n - Image Capture\n\n<br />

- ImageIO\n\n - Image RAW\n\n - Kernel\n\n - MySQL\n\n - neon\n\n - <strong>Network</strong>ing\n\n -<br />

OpenLDAP\n\n - OpenSSL\n\n - Password Server\n\n - PHP\n\n - Printing\n\n - python\n\n<br />

- QuickLook\n\n - QuickTime\n\n - Safari RSS\n\n - Time Machine\n\n - Wiki Server\n\n -<br />

X11\n\n - xar<br />

Solution: Upgrade to Mac OS X 10.6.5 or later.<br />

CVE-2010-3976<br />

Microsoft Executable in Transit Detection (Client)<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5706 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may be compromised\n\nThis client connected to a server<br />

and immediately downloaded an executable. This may be evidence of some malware which<br />

are known to propagate in this manner<br />

Family Internet Services 1542

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!