27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE-2011-1302<br />

Flash Player < 10.2.159.1 Unspecified Memory Corruption (APSB11-07)<br />

<strong>PVS</strong> ID: 5892 FAMILY: Web Clients RISK: HIGH NESSUS ID:53472<br />

Description: Synopsis : \n\nThe remote host contains a browser plug-in that is affected by a memory<br />

corruption vulnerability.\n\nThe remote host has Adobe Flash Player installed. For your<br />

information, the observed version of Adobe Flash Player is : \n %L .\n\nVersions of Flash<br />

Player earlier than 10.2.159.1 are potentially affected by a memory corruption<br />

vulnerability. By tricking a user on the affected system into opening a specially crafted<br />

document with Flash content, such as a SWF file embedded in a Microsoft Word<br />

document, and attacker can potentially leverage this issue to execute arbitrary code<br />

remotely on the system subject to the user's privileges.\n\nNote that there are reports that<br />

this issue is being exploited in the wild as of April 2011.<br />

Solution: Upgrade to Flash Player 10.2.159.1 or later.<br />

CVE-2011-0611<br />

Joomla! 1.6 < 1.6.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5893 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server has an application that is vulnerable to multiple<br />

attack vectors.\n\nThe remote web server is hosting Joomla!, a content management system<br />

written in PHP. For your information, the observed version of Joomla! is : \n %L<br />

.\n\nVersions of Joomla 1.6 earlier than 1.6.2 are potentially affected by multiple<br />

vulnerabilities : \n\n - Multiple inadequate error checking issues could lead to information<br />

disclosure. (20110402, 20110403)\n\n - Unescaped values in the administrative modal<br />

windows causes potential cross-site scripting vulnerabilities. (20110404)\n\n - Multiple<br />

inadequate filtering issues could lead to cross-site scripting attacks. (20110405,<br />

20110406)\n\n - Inadequate permissions checking could allow unauthorised access.<br />

(20110407)\n\n - Unescaped values in a query could lead to a SQL injection vulnerability.<br />

(20110408)\n\n - Inadequate protection could lead to a clickjacking vulnerability.<br />

(20110409)<br />

Solution: Upgrade to Joomla! 1.6.2 or later.<br />

CVE Not available<br />

iTunes < 10.2.2 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5894 FAMILY: Web Clients RISK: HIGH NESSUS ID:53489<br />

Description: Synopsis :\n\nThe remote host contains an application that is vulnerable to multiple attack<br />

vectors.\n\nThe remote host has iTunes installed, a popular media player for Windows and<br />

Mac OS. For your information, the observed version of iTunes is %L.\n\nVersions of<br />

iTunes earlier than 10.2.2 are potentially affected by several issues :\n\n - An integer<br />

Family Internet Services 1601

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!