27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

potentially affected by multiple vulnerabilities :\n\n - A weakness could allow a user to<br />

gain unauthorized access to another Bugzilla account.\n\n - A weakness in the Perl CGI.pm<br />

module allows injecting HTTP headers and content to users via several pages.\n\n - It is<br />

possible to insert harmful 'javascript:' or 'data:' URLs into Bugzilla's 'URL' field which in<br />

some cases Buzilla will make clickable.\n\n - Various pages lack protection against<br />

cross-site request forgeries.<br />

Solution: Upgrade to Bugzilla 3.2.10, 3.4.10, 3.6.4 or later.<br />

CVE-2011-0048<br />

OpenOffice < 3.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5745 FAMILY: Generic RISK: HIGH NESSUS ID:51773<br />

Description: Synopsis :\n\nThe remote host has a program that is affected by multiple<br />

vulnerabilities.\n\nFor your information, the observed version of OpenOffice is<br />

%L.\n\nVersions of OpenOffice earlier than 3.3 are potentially affected by several issues<br />

:\n\n - Issues exist relating to PowerPoint document parsing that may lead to arbitrary code<br />

execution. (CVE-2010-2935, CVE-2010-2936)\n\n - A directory traversal vulnerability<br />

exists in zip / jar package extraction. (CVE-2010-3450)\n\n - Issues exist relating to RTF<br />

document processing that may lead to arbitrary code execution. (CVE-2010-3451,<br />

CVE-2010-3452)\n\n - Issues exist relating to Word document processing that may lead to<br />

arbitrary code execution. (CVE-2010-3453, CVE-2010-3454)\n\n - The OpenOffice.org<br />

start script and other shell scripts expand the LD_LIBRARY_PATH in a way that the<br />

current directory might be searched for libraries before /lib and /usr/lib.<br />

(CVE-2010-3689)\n\n - Issues exist in the third party XPDF library relating to PDf<br />

processing that may allow arbitrary code execution. (CVE-2010-3702,<br />

CVE-2010-3704)\n\n - OpenOffice.org includes a version of LIBXML2 that is affected by<br />

multiple vulnerabilities. (CVE-2010-4008, CVE-2010-4494)\n\n - An issue exists with<br />

PNG file processing that may allow arbitrary code execution. (CVE-2010-4253)\n\n - An<br />

issue exists with TGA file processing that may allow arbitrary code execution.<br />

(CVE-2010-4643)<br />

Solution: Upgrade to OpenOffice version 3.3 or later.<br />

CVE-2010-4643<br />

VLC Media Player < 1.1.6 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5746 FAMILY: Web Clients RISK: HIGH NESSUS ID:51772<br />

Description: Synopsis :\n\nThe remote host contains an application that allows arbitrary code<br />

execution.\n\nThe remote host contains VLC player, a multi-media application. For your<br />

information, the observed version of VLC is %L.\n\nVersions of VLC media player earlier<br />

than 1.1.6 are potentially affected by multiple vulnerabilities :\n\n - An integer overflow<br />

vulnerability exists due to a failure to properly parse the header of a Real Media, which<br />

could then trigger a heap-based buffer overflow. It is not yet known if this issue can be<br />

exploited to execute arbitrary code. (CVE-2010-3907)\n\n - There are two heap corruption<br />

vulnerabilities in the CDG decoders that arise because of a failure to validate indices into<br />

Family Internet Services 1557

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!