27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

'precision' is set to a large value. (Bug 54055)\n\n - An unspecified error exists in the<br />

security enforcement regarding the parsing of the fastcgi protocol with the 'FastCGI<br />

Process Manager' (FPM) SAPI.<br />

Solution: Upgrade to PHP version 5.3.6 or later.<br />

CVE-2011-1471<br />

Asterisk Multiple Denial of Service Vulnerabilities (AST-2011-003/AST-2011-004)<br />

<strong>PVS</strong> ID: 5825 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:52714<br />

Description: Synopsis : \n\nThe remote VoIP server is affected by denial of service<br />

vulnerabilities.\n\nFor your information, the observed version of Asterisk is : \n %L<br />

\n\nThe version of Asterisk running on the remote host may be vulnerable to multiple<br />

denial of service vulnerabilities : \n\n - A resource exhaustion issue exists in the Asterisk<br />

manager interface. (AST-2011-003)\n\n - A NULL pointer dereference issue exists in the<br />

TCP/TLS server. (AST-2011-004)<br />

Solution: Upgrade to Asterisk 1.6.1.24, 1.6.2.17.2, 1.8.3.2, or later.<br />

CVE-2011-1175<br />

Mac OS X 10.6 < 10.6.7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5826 FAMILY: Generic RISK: HIGH NESSUS ID:52754<br />

Description: Synopsis :\n\nThe remote host is missing a Mac OS X update that fixes a security<br />

issue.\n\nFor your information, the observed version of Mac OS X is %L.\n\nVersions of<br />

Mac OS X 10.6 earlier than 10.6.7 are potentially affected by a security issue. Mac OS X<br />

10.6.7 contains a security fix for the following products :\n\n - Airport\n\n - Apache\n\n -<br />

AppleScript\n\n - ATS\n\n - bzip2\n\n - CarbonCore\n\n - ClamAV\n\n - CoreText\n\n -<br />

HFS\n\n - ImageIO\n\n - Image RAW\n\n - Installer\n\n - Kerberos\n\n - Kernel\n\n -<br />

Libinfo\n\n - libxml\n\n - Mailman\n\n - PHP\n\n - QuickLook\n\n - QuickTime\n\n -<br />

Ruby\n\n - Samba\n\n - Subversion\n\n - Terminal\n\n - X11\nIAVB Reference :<br />

2010-B-0083\nIAVB Reference : 2010-B-0106\nSTIG Finding Severity : Category I<br />

Solution: Upgrade to Mac OS X 10.6.7 or later.<br />

CVE-2011-1417<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Flash Player < 10.2.152.33 Unspecified Memory Corruption (APSB11-05)<br />

<strong>PVS</strong> ID: 5827 FAMILY: Web Clients RISK: HIGH NESSUS ID:52673<br />

Description: Synopsis : \n\nThe remote host contains a browser plug-in that is affected by a memory<br />

corruption vulnerability.\n\nThe remote host has Adobe Flash Player installed. For your<br />

information, the observed version of Adobe Flash Player is : \n %L .\n\nVersions of Flash<br />

Player earlier than 10.2.152.33 are potentially affected by an unspecified memory<br />

corruption vulnerability. A remote attacker could exploit this by tricking a user into<br />

Family Internet Services 1582

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!