27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: The remote host is running an application that is vulnerable to multiple attack<br />

vectors.\n\nThe remote host is running RealPlayer, a multi-media application. For your<br />

information, the observed build of RealPlayer is:\n%L.\n\nRealPlayer builds earlier than<br />

12.0.1.666 are potentially affected by multiple code execution vulnerabilities :\n\n - A heap<br />

based buffer overflow vulnerability exits within qcpfformat.dll file, which only creates a<br />

static 256 byte allocation on the heap. This can be abused by a remote attacker to execute<br />

arbitrary code running in the context of the web browser. (CVE-2011-2950)\n\n - A flaw<br />

exists due to RealPlayer allowing users to run local HTML files with scripting enabled<br />

without any warning. Attackers can exploit this issue to execute arbitrary code within the<br />

context of the application(typically Internet Explorer) that uses the ActiveX control.<br />

(CVE-2011-2947)\n\n - A memory-corruption vulnerability exist due to an use-after-free<br />

condition that affects "Embedded AutoUpdate." Successful exploit will allow remote<br />

attackers to execute arbitrary code within the context of the affected application.<br />

(CVE-2011-2954)\n\n - A remote buffer-overflow vulnerability exists due to the software<br />

failing to perform adequate boundary-checks on user-supplied data. Successful exploit<br />

allow attackers to execute arbitrary code in the context of the vulnerable applications.<br />

(CVE-2011-2951)\n\n - A remote code-execution vulnerability exists when handling<br />

'DEFINEFONT' fields in Flash files. Successful exploit will allow remote attackers to<br />

execute arbitrary code within the context of the affected application. (CVE-2011-2948)\n\n<br />

- A remote code-execution vulnerability exist in the way the application uses<br />

'WideCharToMultiByte' call, resulting in a heap-based buffer overflow. Successful exploit<br />

will allow remote attackers to execute arbitrary code within the context of the affected<br />

application. (CVE-2011-2949)\n\n - A memory-corruption vulnerability exists due to an<br />

use-after-free condition, particularly affects the dialogue box. Successful exploit will allow<br />

remote attackers to execute arbitrary code within the context of the affected application.<br />

(CVE-2011-2952)\n\n\ - A memory-corruption vulnerability exists due to an use-after-free<br />

condition, particularly affects the Embedded Modal Dialog. Successful exploit will allow<br />

remote attackers to execute arbitrary code within the context of the affected application.<br />

(CVE-2011-2955)\n\n - A cross-zone scripting vulnerability exists due to the fact that the<br />

RealPlayer ActiveX control allows users to run local HTML files with scripting enabled<br />

without providing any warning. Attackers can exploit this issue to execute arbitrary code<br />

within the context of the application(typically Internet Explorer) that uses the ActiveX<br />

Control. (CVE-2011-121)\n<br />

Solution: Upgrade to RealPlayer 14.0.6 (Build 12.0.1.666) or later.<br />

CVE-2011-1221<br />

nginx < 1.0.10 DNS Resolver Remote Heap Buffer Overflow<br />

<strong>PVS</strong> ID: 6456 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis:\n\nThe remote web server is affected by a buffer-overflow vulnerability.\n\nThe<br />

remote host is running a nginx HTTP server. For your information, the observed version of<br />

nginx is:\n %L \n\nVersions earlier than 1.0.10 are vulnerable to a remote heap-based<br />

buffer-overflow vulnerability due to a failure to properly bounds check user-supplied input<br />

to the DNS resolver. The issue occurs specifically when the DNS resolver processes<br />

messages more than 255 bytes. Successfully exploiting this issue allows attackers to<br />

execute arbitrary code in the context of the application. (CVE-2011-4314)\n<br />

Family Internet Services 1762

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!