27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

memory corruption vulnerability in the RealAudio codec. (CVE-2010-4387)\n\n - A<br />

cross-zone scripting vulnerability in the ActiveX HandleAction Method.<br />

(CVE-2010-4396)\n\n - A cross domain scripting vulnerability is exploitable via local<br />

HTML files. (CVE-2010-4388)\n\n - A heap overflow vulnerability exists in the Cook<br />

codec initialization buffer index.(CVE-2010-4389)\n\n - A heap overflow vulnerability<br />

exists in the IVR file header. (CVE-2010-4390)\n\n - A heap overflow vulnerability exists<br />

in the RMX header. (CVE-2010-4391)\n\n - A heap overflow vulnerability exists in<br />

ImageMap. (CVE-2010-4392)\n\n - A heap overflow vulnerability exists in RealPix server<br />

header. (CVE-2010-4394)\n\n - A heap overflow exists in the Advanced audio coding.<br />

(CVE-2010-4395)<br />

Solution: Upgrade to RealPlayer 14.0.1.609 (Build 12.0.1.609) or later.<br />

CVE-2010-4397<br />

VLC Media Player < 1.1.5 Samba Share Access Module Code Execution<br />

<strong>PVS</strong> ID: 5710 FAMILY: Web Clients RISK: HIGH NESSUS ID:50650<br />

Description: Synopsis :\n\nThe remote host contains an application that allows arbitrary code<br />

execution.\n\nThe remote host contains VLC player, a multi-media application. For your<br />

information, the observed version of VLC is %L.\n\nVersions of VLC media player earlier<br />

than 1.1.5 are potentially affected by a code execution vulnerability. Due to an error in the<br />

declaration of code calling conventions, VLC suffers from a stack smashing attack in the<br />

Samba network share access module which could lead to arbitrary code execution. Note<br />

that this issue only affects VLC for Windows.<br />

Solution: Upgrade to VLC Media Player version 1.1.5 or later.<br />

CVE Not available<br />

Safari < 4.1.3 / 5.0.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5711 FAMILY: Web Clients RISK: HIGH NESSUS ID:50654<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Safari is %L.\n\nThe remote host<br />

has Safari installed. For your information, the observed version of Safari is<br />

%L.\n\nVersions of Safari earlier than 4.1.3 / 5.0.3 are potentially affected by several issues<br />

in the following component :\n\n - Safari\n\n - Webkit<br />

Solution: Upgrade to Safari 4.1.3, 5.0.3, or later.<br />

CVE-2010-3826<br />

Serv-U < 10.3.0.1 SFTP Server Authentication Bypass Vulnerability<br />

<strong>PVS</strong> ID: 5712 FAMILY: SSH<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:50659<br />

Family Internet Services 1544

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!