27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: The remote host is running GoToMyPC, a remote administration tool that allows access to<br />

a PC. This software uses a backchannel (viewed as an outgoing connection by your<br />

firewall) to communicate with the vendor's computers that then broker a connection back to<br />

the remote client accessing this computer.<br />

realtimeonly<br />

Solution: Verify that this conforms to your security policy.<br />

CVE Not available<br />

Winamp < 5.622 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6056 FAMILY: Generic RISK: HIGH NESSUS ID:56681<br />

Description: Synopsis : \n\nThe remote host has a media player installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running Winamp, a media player for Windows. For<br />

your information, the observed version of Winamp is : \n %L \n\nVersions of Winamp<br />

earlier than 5.622 are potentially affected by the following overflow vulnerabilities : \n\n -<br />

A heap-based buffer overflow exists in the plugin in_midi.dll when processing the<br />

iOffsetMusic value in the Creative Music Format (CMF) header.\n\n - A heap-based buffer<br />

overflow exists in the plugin in_mod.dll when processing the channels value in the<br />

Advanced Module Format (AMF) header.\n\n - A heap-based buffer overflow exists in the<br />

plugin in_nsv.dll when processing the toc_alloc value in the Nullsoft Streaming Video<br />

(NSF) header.\n\n - Integer overflow errors exist in the TSCC RGB and YUV decoders.<br />

Solution: Upgrade to Winamp 5.622 or later.<br />

CVE Not available<br />

Novell Messenger Server < 2.2.1 Memory Information Disclosure<br />

<strong>PVS</strong> ID: 6057 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:56691<br />

Description: Synopsis : \n\nThe remote host has an instant messaging server product installed that is<br />

affected by an information disclosure vulnerability.\n\nThe remote host is running Novell<br />

Messenger Server, formerly Groupwise Messenger, an instant messaging server<br />

application. For your information, the observed version of Novell Messenger Server is : \n<br />

%L \n\nVersions of Novell Messenger Server earlier than 2.2.1 are potentially affected by<br />

an information disclosure vulnerability whereby a remote, unauthenticated attacker could<br />

send commands that would force the Messenger server process to return the contents of<br />

arbitrary memory locations. This data could potentially include strings containing the<br />

credentials used by Messenger to authenticate to directory services.<br />

Solution: Upgrade to Novell Messenger 2.2.1 or later.<br />

CVE-2011-3179<br />

TimThumb Application Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1655

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!