27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host contains a browser plug-in that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host has Adobe Flash Player installed. For your information,<br />

the observed version of Adobe Flash Player is %L.\nVersions of Flash Player earlier than<br />

10.2.152.26 are potentially affected by multiple vulnerabilities :\n\n - An integer overflow<br />

vulnerability exisst that could lead to code execution. (CVE-2011-0558)\n\n - Multiple<br />

memory corruption vulnerabilities exist that could lead to code execution.<br />

(CVE-2011-0559, CVE-2011-0560, CVE-2011-0561, CVE-2011-0571, CVE-2011-0572,<br />

CVE-2011-0573, CVE-2011-0574, CVE-2011-0578, CVE-2011-0607,<br />

CVE-2011-0608)\n\n - A library-loading vulnerability exists that could lead to code<br />

execution. (CVE-2011-0575)\n\n - A font-parsing vulnerabiity exists that could lead to<br />

code execution. (CVE-2011-0577)<br />

Solution: Upgrade to Flash Player 10.2.152.26 or later.<br />

CVE-2011-0608<br />

OpenSSL < 0.9.8r / 1.0.0d OCSP Stapling Denial of Service<br />

<strong>PVS</strong> ID: 5782 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:51919<br />

Description: Synopsis :\n\nThe remote web server is vulnerable to multiple attack vectors.\n\nFor your<br />

information, the observed version of OpenSSL is %L.\n\nVersions of OpenSSL earlier than<br />

0.9.8r and 1.0.0d are potentially affected by a vulnerability wherein an incorrectly<br />

formatted ClientHello handshake message could cause OpenSSL to parse past the end of<br />

the message which could cause the web server to crash. There is also the potential for<br />

information disclosure if OCSP nonce extensions are used.<br />

Solution: Upgrade to OpenSSL 0.9.8r, 1.0.0d, or later.<br />

CVE-2011-0014<br />

Flash Player Unsupported Version Detection<br />

<strong>PVS</strong> ID: 5783 FAMILY: Web Clients RISK: HIGH NESSUS ID:51937<br />

Description: Synopsis :\n\nThe remote host contains an unsupported version of Flash Player.\n\nThe<br />

remote host has Adobe Flash Player installed. For your information, the observed version<br />

of Adobe Flash Player is %L.\nOne or more versions of Flash Player earlier than 10.x are<br />

installed on the remote host. Such versions are no longer supported by Adobe and are likely<br />

to contain security vulnerabilities.<br />

Solution: Upgrade to an actively maintained version of Flash player.<br />

CVE Not available<br />

OpenSSH Legacy Certificate Signing Information Disclosure<br />

<strong>PVS</strong> ID: 5784 FAMILY: SSH<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:51920<br />

Family Internet Services 1567

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!