27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

iHeartRadio Stream Detection<br />

<strong>PVS</strong> ID: 6342 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host was observed accessing an iHeartRadio stream.<br />

realtimeonly<br />

Solution: Ensure that this application is authorized for your network<br />

CVE Not available<br />

Apple's iCloud Service Access Detection<br />

<strong>PVS</strong> ID: 6343 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host has potentially accessed Apple's iCloud service. Ensure that this activity is<br />

in accordance to company policy.<br />

Solution: Ensure that this application is authorized within your network.<br />

CVE Not available<br />

Apple iOS 3.0 through 5.0.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6344 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is an iPhone, iPod Touch, or iPad running iOS. For your information, the observed version<br />

of iOS is : \n %L \n\nVersions of iOS 3.0 through 5.1 are potentially affected by multiple<br />

vulnerabilities. iOS 5.1 contains security fixes for the following products :\n\n -<br />

CF<strong>Network</strong>\n\n - HFS\n\n - Kernel\n\n - libresolv\n\n - Passcode Lock\n\n - Safari\n\n -<br />

Siri\n\n - VPN\n\n - WebKit<br />

Solution: Upgrade to iOS 5.1 or later.<br />

CVE-2012-0646<br />

iTunes < 10.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6345 FAMILY: Web Clients RISK: HIGH NESSUS ID:58320<br />

Description: Synopsis :\n\nThe remote host contains an application that is susceptible to a<br />

man-in-the-middle attack.\n\nThe remote host has iTunes installed, a popular media player<br />

for Windows and Mac OS. For your information, the observed version of iTunes is:\n %L<br />

\n\nVersions of iTunes earlier than 10.6 are reportedly affected by numerous memory<br />

corruption vulnerabilities in its WebKit component. Note that these issues only affect<br />

iTunes on Windows.<br />

Solution: Upgrade to iTunes 10.6 or later.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1734

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!