27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Subversion\n - Time Machine\n - WebDAV Sharing\n - Webmail\n - X11\nIAVA<br />

Reference : 2012-A-0020\nIAVA Reference : 2012-A-0085\nIAVB Reference :<br />

2012-B-0006\nSTIG Finding Severity : Category I<br />

Solution: Upgrade to Mac OS X 10.7.3 or later.<br />

CVE-2011-3463<br />

PHP 5.3.9 php_register_variable_ex() Code Execution<br />

<strong>PVS</strong> ID: 6304 FAMILY: Web Servers RISK: HIGH NESSUS ID:58039<br />

Description: Synopsis :\n\nThe remote web server uses a version of PHP that is affected by a code<br />

execution vulnerability.\n\nFor your information, the version of PHP installed on the<br />

remote host is :\n %L \n\nPHP version 5.3.9 is reportedly affected by a code execution<br />

vulnerability. Specifically, the fix for the hash collision denial of service vulnerability<br />

(CVE-2011-4885) itself has introduced a remote code execution vulnerability in the<br />

php_register_variable_ex() in the file php_variables.c. A new configuration variable,<br />

max_input_vars, was added as part of the fix. If the number of input variables exceeds this<br />

value and the variable being processed is an array, code execution can occur.<br />

Solution: Upgrade to PHP version 5.3.10 or later.<br />

CVE-2012-0830<br />

RealWin Management Server HMI Service Detection (SCADA)<br />

<strong>PVS</strong> ID: 6305 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is running the RealWin Management Server. This software server is<br />

used to manage a wide range of SCADA devices. The Server has an HMI service listening<br />

on port 912/tcp. The <strong>PVS</strong> has just observed the following user logging into the Server : %P<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Mozilla Firefox 9.0 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6306 FAMILY: Web Clients RISK: HIGH NESSUS ID:57773<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host has a web browser installed that is vulnerable to<br />

multiple attack vectors.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox 9.0 are potentially affected by the following security issues : \n\n -<br />

A use-after-free error exists related to removed nsDOMAttribute child nodes.<br />

(CVE-2011-3659)\n\n - Various memory safety issues exist. (CVE-2012-0442,<br />

CVE-2012-0443)\n\n - Memory corruption errors exist related to the decoding of Ogg<br />

Vorbis files and processing of malformed XSLT stylesheets. (CVE-2012-0444,<br />

Family Internet Services 1721

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!