27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Epiphany Browser Version Detection<br />

<strong>PVS</strong> ID: 6480 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Epiphany browser version: %L<br />

Solution: N/A<br />

CVE Not available<br />

Apple iOS 3.0 through 5.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6481 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is an iPhone, iPod Touch, or iPad running iOS. For your information, the observed version<br />

of iOS is : \n %L \n\nVersions of iOS 3.0 through 5.1 are potentially affected by multiple<br />

vulnerabilities. iOS 5.1.1 contains security fixes for the following products :\n\n - Safari\n\n<br />

- WebKit<br />

Solution: Upgrade to iOS 5.1.1 or later.<br />

CVE-2012-0672<br />

Mac OS X 10.7 < 10.7.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6482 FAMILY: Generic RISK: HIGH NESSUS ID:59066<br />

Description: Synopsis :\n\nThe remote host is missing a Mac OS X update that fixes a security<br />

issue.\n\nFor your information, the observed version of Mac OS X is : \n %L \n\nThe<br />

remote host is running a version of Mac OS X 10.7 that is older than version 10.7.4. The<br />

newer version contains numerous security-related fixes for the following components :\n\n<br />

- Login Windows\n - Bluetooth\n - curl\n - HFS\n - Kernel\n - libarchive\n - libsecurity\n -<br />

libxml\n - LoginUIFramework\n - PHP\n - Quartz Composer\n - QuickTime\n - Ruby\n -<br />

<strong>Security</strong> Framework\n - Time Machine\n - X11\nIAVB Reference : 2012-B-0006\nSTIG<br />

Finding Severity : Category I<br />

Solution: Upgrade to Mac OS X 10.7.4 or later.<br />

CVE-2012-0830<br />

Safari < 5.1.7 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6483 FAMILY: Web Clients RISK: HIGH NESSUS ID:59069<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nThe remote host has Safari installed. For your information, the observed version<br />

of Safari is: \n %L \n\nVersions of Safari earlier than 5.1.7 are reportedly affected by<br />

several issues :\n\n - Two unspecified errors that can allow malicious sites to perform<br />

cross-site scripting attacks. (CVE-2011-3046, CVE-2011-3056)\n\n - An unspecified<br />

memory corruption error exists that can allows malicious sites to crash the application or<br />

Family Internet Services 1769

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!