27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

code execution vulnerability in the 'iNOdeMngChecker.exe' component which listens by<br />

default on TCP port 9090 because the application fails to validate user supplied data when<br />

handling a '0x0A0BF007' packet type. A remote unauthenticated attacker, exploiting this<br />

flaw, could potentially execute arbitrary code on the remote host subject to the privileges of<br />

the user running the affected application.<br />

Solution: Upgrade to HP Intelligent Management Center Endpoint Admission Defense 5.0 E0101P03<br />

or later.<br />

CVE-2011-1867<br />

phpMyAdmin 3.3.x < 3.3.10.2 / 3.4.x < 3.4.3.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5985 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server contains a PHP application that is vulnerable to<br />

multiple attack vectors.\n\nFor your information, the observed version of phpMyAdmin is :<br />

\n %L \n\nVersions of phpMyAdmin 3.3.x earlier than 3.3.10.2 and 3.4.x earlier than<br />

3.4.3.1 are potentially affected by multiple vulnerabilities : \n\n - It is possible to<br />

manipulate the PHP session superglobal usig some of the Swekey authentication code.<br />

(PMASA-2011-5)\n\n - An unsanitized key from the Servers array is written in a comment<br />

of the generated config, which could allow an attacker to close the comment and inject<br />

code. (PMASA-2011-6)\n\n - It is possible to use a null byte to truncate the pattern string<br />

which would allow an attacker to inject the /e modifier causing the pre_replace function to<br />

execute its second argument as PHP code. (PMASA-2011-7)\n\n - An issue exists in the<br />

MIME-type transformation code, which allows for directory traversal. (PMASA-2011-8)<br />

Solution: Upgrade to phpMyAdmin 3.3.10.2, 3.4.3.1, or later.<br />

CVE-2011-2508<br />

Apple iPhone/iPad iOS < 4.3.4 and iOS 4.2.5 through 4.2.9 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5986 FAMILY: Mobile Devices RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is an iPhone, iPod Touch, or iPad running iOS. For your information, the observed version<br />

of iOS is %L.\n\nVersions of iOS 4.2.5 through 4.2.9 and 3.0 through 4.3.4 are potentially<br />

affected by multiple vulnerabilities. iOS 4.2.9 and 4.3.4 contain security fixes for the<br />

following products :\n\n - CoreGraphics\n\n - IOMobileFrameBuffer<br />

Solution: Upgrade to iOS 4.2.9, 4.3.4, or later.<br />

CVE-2011-0227<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

VLC Media Player > 0.5.0 and < 1.1.11 Multiple Code Execution Vulnerabilities<br />

<strong>PVS</strong> ID: 5987 FAMILY: Web Clients RISK: HIGH NESSUS ID:55608<br />

Family Internet Services 1630

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!