27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

JavaScript Usage on Web Server Detection<br />

<strong>PVS</strong> ID: 5724 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server utilizes JavaScript within the following file : %P<br />

realtimeonly<br />

Solution: Ensure that JavaScript is authorized and is part of your <strong>Security</strong> Development Lifecycle<br />

(SDL)<br />

CVE Not available<br />

QuickTime < 7.6.9 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5725 FAMILY: Web Clients RISK: HIGH NESSUS ID:51062<br />

Description: Synopsis :\n\nThe remote host contains an application that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of QuickTime is %L.\n\nVersions<br />

of QuickTime earlier than 7.6.9 are potentially affected by multiple vulnerabilities :\n\n - A<br />

filesystem permission issue may allow a local user on a Windows system to access the<br />

contents of the 'Apple Computer' directory in the user's profile. (CVE-2010-0530)\n\n - A<br />

heap buffer overflow in QuickTime's handling of Track Header (tkhd) atoms may lead to<br />

an application crash or arbitrary code execution on Windows systems.<br />

(CVE-2010-1508)\n\n - A heap buffer overflow in Quicktime's handling of JP2 images may<br />

lead to an application crash or arbitrary code execution. (CVE-2010-3787)\n\n -<br />

Uninitialized memory access issue in QuickTime's handling of JP2, FlashPix, and GIF<br />

images may lead to an application crash or arbitrary code execution. (CVE-2010-3788,<br />

CVE-2010-3794, CVE-2010-3795)\n\n - Memory corruption issues in QuickTime's<br />

handling of AVI files, movie files, Sorenson encoded movie files, PICT files, FlashPix<br />

images, and panorama atoms in QTVR (QuickTime Virtual Reality) movie files may lead<br />

to an application crash or arbitrary code execution. (CVE-2010-3789, CVE-2010-3790,<br />

CVE-2010-3793, CVE-2010-3800, CVE-2010-3801, CVE-2010-3802)\n\n - A buffer<br />

overflow in QuickTime's handling of MPEG-encoded movie files may lead to an<br />

application crash or arbitrary code execution. (CVE-2010-3791)\n\n - A signedness issue in<br />

QuickTime's handling of MPEG-encoded movie files may lead to an application crash or<br />

arbitrary code execution. (CVE-2010-3792)\n\n - An integer overflow in QuickTime's<br />

handling of movie files may lead to an application crash or arbitrary code execution.<br />

(CVE-2010-4009)<br />

Solution: Upgrade to QuickTime 7.6.9 or later.<br />

CVE-2010-4009<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Winamp < 5.601 MIDI Timestamp Stack Buffer Overflow<br />

<strong>PVS</strong> ID: 5726 FAMILY: Generic RISK: HIGH NESSUS ID:51091<br />

Description: Synopsis :\n\nThe remote host has a media player installed that is vulnerable to a buffer<br />

overflow attack.\n\nThe remote host is running Winamp, a media player for Windows. For<br />

your information, the observed version of Winamp is %L.\n\nVersions of Winamp earlier<br />

Family Internet Services 1549

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!