27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

RISK:<br />

MEDIUM<br />

Description: Synopsis :\n\nThe remote database server is vulnerable to multiple attack vectors.\n\nFor<br />

your information, the version of PostgreSQL installed on the remote host is:\n %L<br />

\n\nVersions of PostgreSQL 8.3.x earlier than 8.3.18 are potentially affected by the<br />

following vulnerabilities :\n\n - Permissions on a function called by a trigger are not<br />

properly checked. (CVE-2012-0866)\n\n - SSL certificate name checks are truncated to 32<br />

characters, allowing connection spoofing under some circumstances when using third party<br />

certificates. (CVE-2012-0867)\n\n - Line breaks in object names can be exploited to<br />

execute arbitrary SQL when reloading a pg_dump file. (CVE-2012-0868)<br />

Solution: Upgrade to PostgreSQL 8.3.18 or later.<br />

CVE-2012-0868<br />

PostgreSQL < 9.1.3 / 9.0.7 / 8.4.11 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6337 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote database server is vulnerable to multiple attack vectors.\n\nFor<br />

your information, the version of PostgreSQL installed on the remote host is:\n %L<br />

\n\nVersions of PostgreSQL earlier than 9.1.3, 9.0.7, 8.4.11 and are potentially affected by<br />

the following vulnerabilities :\n\n - Permissions on a function called by a trigger are not<br />

properly checked. (CVE-2012-0866)\n\n - SSL certificate name checks are truncated to 32<br />

characters, allowing connection spoofing under some circumstances when using third party<br />

certificates. (CVE-2012-0867)\n\n - Line breaks in object names can be exploited to<br />

execute arbitrary SQL when reloading a pg_dump file. (CVE-2012-0868)<br />

Solution: Upgrade to PostgreSQL 8.4.11, 9.0.7, 9.1.3, or later.<br />

CVE-2012-0868<br />

Dropbear SSH Server Channel Concurrency Use-after-free Remote Code Execution<br />

<strong>PVS</strong> ID: 6338 FAMILY: SSH RISK: HIGH NESSUS ID:58183<br />

Description: Synopsis :\n\nThe remote ssh service is affected by a remote code execution<br />

vulnerability.\n\nDropbear, an SSH server, is installed on the remote host. For your<br />

information, the observed version of Dropbear is:\n %L \n\nVersions of Dropbear SSH<br />

before 2012.55 contain a flaw that might allow an attacker to run arbitrary code on the<br />

remote host with root privileges if they are authenticated using a public key and command<br />

restriction is enforced.<br />

Solution: Upgrade to Dropbear SSH 2012.55 or later.<br />

CVE-2012-0920<br />

Evernote Client Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1732

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!