27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE Not available<br />

Mac OS X 10.6 < 10.6.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5739 FAMILY: Generic RISK: HIGH NESSUS ID:51423<br />

Description: Synopsis :\n\nThe remote host is missing a Mac OS X update that fixes a security<br />

issue.\n\nFor your information, the observed version of Mac OS X is %L.\n\nVersions of<br />

Mac OS X 10.6 earlier than 10.6.6 are potentially affected by a security issue. Mac OS X<br />

10.6.6 contains a security fix for the following product :\n\n - PackageKit<br />

Solution: Upgrade to Mac OS X 10.6.6 or later.<br />

CVE-2010-4013<br />

PHP 5.2 < 5.2.17 / 5.3 < 5.3.5 String To Double Conversion DoS<br />

<strong>PVS</strong> ID: 5740 FAMILY: Web Servers RISK: LOW NESSUS ID:51439<br />

Description: Synopsis :\n\nThe remote web server uses a version of PHP that is affected by a denial of<br />

service vulnerability.\n\nAccording to its banner the version of PHP installed on the remote<br />

host is either 5.2 earlier than 5.2.17 or 5.3 earlier than 5.3.5. Such versions may experience<br />

a crash while performing string to double conversion for certain numeric values. Only x86<br />

32-bit PHP processes are known to be affected by this issue regardless of whether the<br />

system running PHP is 32-bit or 64-bit.<br />

Solution: Upgrade to PHP version 5.2.17/5.3.5 or later.<br />

CVE-2010-4645<br />

Rocket Software UniVerse < 10.3.9 Remote Code Execution Vulnerability<br />

<strong>PVS</strong> ID: 5741 FAMILY: Generic RISK: HIGH NESSUS ID:51575<br />

Description: Synopsis :\n\nThe remote host contains a database application that is affected by a remote<br />

code execution vulnerability.\n\nThe remote host has Rocket Software UniVerse installed.<br />

For your information, the installed version of UniVerse is %L.\n\nVersions of UniVerse<br />

earlier than 10.3.9 are potentially affected by a remote code execution vulnerability because<br />

the application fails to properly validate a size value in a RPC packet header before using it<br />

to determine the number of bytes to receive. A remote unauthenticated attacker, exploiting<br />

this flaw, could execute arbitrary code on the remote host with SYSTEM level privileges.<br />

Solution: Upgrade to UniVerse 10.3.9 or later.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Google Chrome < 8.0.552.237 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5742 FAMILY: Web Clients RISK: HIGH NESSUS ID:51511<br />

Family Internet Services 1555

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!