27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

handling of PICT files. (CVE-2011-3247)\n\n - A signedness issue exists in the handling of<br />

font tables embedded n QuickTime movie files.\n\n - A buffer overflow issue exists in the<br />

handling of FLC encoded movie files. (CVE-2011-3249)\n\n - An integer overflow issue<br />

exists in the handling of JPEG2000 encoded movie files. (CVE-2011-3250)\n\n - A<br />

memory corruption issue exists in the handling of TKHD atoms in QuickTime movie files.<br />

(CVE-2011-3251)<br />

Solution: Upgrade to QuickTime 7.7.1 or later.<br />

CVE-2011-3251<br />

Opera < 11.52 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6053 FAMILY: Web Clients RISK: HIGH NESSUS ID:56585<br />

Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running the Opera web browser. For your<br />

information, the observed version of Opera is : \n %L \n\nVersions of Opera earlier than<br />

11.52 are potentially affected by multiple vulnerabilities : \n\n - An error exists in the<br />

handling of certain font manipulations inside dynamically added or specifically embedded<br />

SVG images or SVG content in nested frames. This error can cause the application to crash<br />

and can possibly allow arbitrary code execution. (Issue 1002)\n\n - Several unspecified<br />

error exist that can allow stack overflows leading to browser crashes.<br />

Solution: Upgrade to Opera 11.52 or later.<br />

CVE Not available<br />

Novell iPrint Client < 5.72 Code Execution Vulnerability<br />

<strong>PVS</strong> ID: 6054 FAMILY: Web Clients RISK: HIGH NESSUS ID:56682<br />

Description: Synopsis :\n\nThe remote host contains an application that is affected by a code execution<br />

vulnerability.\n\nThe remote host has the Novell iPrint client installed. For your<br />

information, the observed version of Novell iPrint Client is : \n %L .\n\nVersions of Novell<br />

iPrint Client earlier than 5.72 are potentially affected by a buffer overflow vulnerability in<br />

the GetDriverSettings method of the nipplib.dll component. A remote, unauthenticated<br />

attacker, exploiting this flaw, could execute arbitrary code on the remote host subject to the<br />

privileges of the user running the affected application.<br />

Solution: Upgrade to Novell iPrint Client 5.72 or later.<br />

GoToMyPC Detection<br />

CVE-2011-3173<br />

<strong>PVS</strong> ID: 6055 FAMILY: Policy<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 1654

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!