27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

statically-sized arrays on the heap, which could allow for arbitrary code execution.<br />

(CVE-2011-0021)\n\n - A heap-based memory corruption vulnerability exists i the<br />

StripTags function in the USF decoder. (CVE-20111-0522)<br />

Solution: Upgrade to VLC Media Player version 1.1.6 or later.<br />

CVE-2011-0522<br />

Opera < 11.01 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5747 FAMILY: Web Clients RISK: HIGH NESSUS ID:51774<br />

Description: Synopsis :\n\nThe remote host has a web browser that is vulnerable to multiple attack<br />

vectors.\n\nThe remote host is running the Opera web browser. For your information, the<br />

observed version of Opera is %L.\n\nVersions of Opera earlier than 11.01 are potentially<br />

affected by multiple vulnerabilities :\n\n - When certain large form inputs appear on a web<br />

page, they can lead to memory corruption which could be used to execute arbitrary code.<br />

(982)\n\n - It is possible to bypass restrictions on 'opera:' URLs to launch clickjacking<br />

attacks. (983)\n\n - Certain types of HTTP responses and redirections can cause Opera to<br />

mistakenly give elevated privileges to remote web pages. (984)\n\n - When using 'Delete<br />

Private Data' and selecting the option to 'Clear all email account passwords', the passwords<br />

are not deleted immediately and continue to be available until the browser is restarted.<br />

(986)\n\n - In certain cases, the wrong executable is used to display a downloaded file in its<br />

folder. (985)<br />

Solution: Upgrade to Opera 11.01 or later.<br />

CVE-2011-0687<br />

Real <strong>Network</strong>s RealPlayer < 14.0.2.633 (Build 12.0.1.633) Multiple Remote Code Execution<br />

Vulnerabilities<br />

<strong>PVS</strong> ID: 5748 FAMILY: Web Clients RISK: HIGH NESSUS ID:51814<br />

Description: Synopsis :\n\nThe remote host is running an application that is vulnerable to multiple attack<br />

vectors.\n\nThe remote host is running RealPlayer, a multi-media application. For your<br />

information, the observed build of RealPlayer is %L.\n\nRealPlayer builds earlier than<br />

12.0.1.633 are potentially affected by multiple code execution vulnerabilities : - A heap<br />

corruption vulnerability when handling specially crafted AVI headers.<br />

(CVE-2010-4393)\n\n - A flaw exists in the temporary file naming scheme used for storage<br />

which can be combined with the OpenURLinPlayerBrowser function to execute arbitrary<br />

code. (CVE-2011-0694)<br />

Solution: Upgrade to RealPlayer 14.0.2.633 (Build 12.0.1.633) or later.<br />

CVE-2011-0694<br />

DB2 9.1 < Fix Pack 10 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5749 FAMILY: Database RISK: HIGH NESSUS ID:51840<br />

Family Internet Services 1558

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!