27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote database server is vulnerable to a cross-site attack.\n\nThe<br />

remote host is running CouchDB, a document-oriented database. For your information, the<br />

observed version of CouchDB is %L.\n\nVersions of CouchDB earlier than 1.0.2 are<br />

potentially affected by a cross-site scripting vulnerability. The application fails to properly<br />

sanitize user-supplied input before it is used in the Futon administrative interface. A remote<br />

attacker could exploit this to execute arbitrary script code in the security context of<br />

CouchDB's admin interface.<br />

Solution: Upgrade to CouchDB 1.0.2 or later.<br />

CVE-2010-3854<br />

VLC Media Player < 1.1.7 Code Execution Vulnerability<br />

<strong>PVS</strong> ID: 5756 FAMILY: Web Clients RISK: HIGH NESSUS ID:51851<br />

Description: Synopsis :\n\nThe remote host contains an application that allows arbitrary code<br />

execution.\n\nThe remote host contains VLC player, a multi-media application. For your<br />

information, the observed version of VLC is %L.\n\nVersions of VLC media player earlier<br />

than 1.1.7 are potentially affected by a code execution vulnerability due to insufficient<br />

input validation when parsing a specially crafted Matroska or WebM (MKV) file.<br />

Solution: Upgrade to VLC Media Player version 1.1.7 or later.<br />

CVE-2011-0531<br />

PostgreSQL < 9.0.3 / 8.4.7 / 8.3.14 / 8.2.20 Code Execution Vulnerability<br />

<strong>PVS</strong> ID: 5757 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote database server is affected by a buffer overflow<br />

vulnerability.\n\nFor your information, the version of PostgreSQL installed on the remote<br />

host is %L.\n\n Versions of PostgreSQL earlier than 9.0.3, 8.4.7, 8.3.14, or 8.2.20 are<br />

potentially affected by a buffer overflow vulnerability in the contrib module intarray's input<br />

function for the query_int type. An attacker, exploiting this flaw, could potentially execute<br />

arbitrary code on the remote host subject to the privileges of the user running the affected<br />

application.<br />

Solution: Upgrade to PostgreSQL 9.0.3, 8.4.7, 8.3.14, 8.2.20, or later.<br />

CVE-2010-4015<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Google Chrome < 9.0.597.84 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5758 FAMILY: Web Clients RISK: HIGH NESSUS ID:51872<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Google Chrome is<br />

%L.\n\nVersions of Google Chrome earlier than 9.0.597.84 are potentially affected by<br />

multiple vulnerabilities :\n\n - A minor sandbox leak exists in stat(). Note this issue only<br />

Family Internet Services 1561

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!