27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is running an application that is vulnerable to multiple<br />

vulnerabilities.\n\nThe remote host is running RealPlayer, a multi-media application. For<br />

your information, the observed build of RealPlayer is:\n %L .\n\nRealPlayer builds earlier<br />

than 15.0.6.14 are potentially affected by multiple vulnerabilities :\n\n - A buffer overflow<br />

error exists related to 'AAC' handling, specifically unpacking of the stream data.<br />

(CVE-2012-2407)\n\n - A heap-corruption error exists related to the 'AAC SDK' decoding.<br />

(CVE-2012-2408)\n\n - Two unspecified buffer overflow errors exist related to<br />

'RealMedia'. (CVE-2012-2409, CVE-2012-2410)\n\n - A divide-by-zero error exists related<br />

to 'RealAudio' and codec frame size. (CVE-2012-3234)<br />

Solution: Upgrade to RealPlayer 15.0.6.14 or later.<br />

CVE-2012-3234<br />

iTunes < 10.7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6575 FAMILY: Web Clients RISK: HIGH NESSUS ID:62077<br />

Description: Synopsis :\n\nThe remote host contains a multimedia application that has multiple<br />

vulnerabilities.\n\nThe remote host has iTunes installed, a popular media player for<br />

Windows and Mac OS. For your information, the observed version of iTunes is:\n %L<br />

\n\nVersions of iTunes earlier than 10.7 are reportedly affected by multiple memory<br />

corruption vulnerabilities in WebKit.<br />

Solution: Upgrade to iTunes 10.7 or later.<br />

CVE-2012-3712<br />

Apache 2.2 < 2.2.23 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6576 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:62101<br />

Description: Synopsis :\n\nThe remote web server uses a version of Apache that is affected by multiple<br />

vulnerabilities.\n\nFor your information, the version of Apache installed on the remote host<br />

is :\n %L \n\nApache versions earlier than 2.2.23 are affected by the following<br />

vulnerabilities.\n\n - The utility 'apachectl' can receive a zero-length directory name in the<br />

LD_LIBRARY_PATH via the 'envvars' file. A local attacker with access to that utility<br />

could exploit this to load a malicious Dynamic Shared Object (DSO), leading to arbitrary<br />

code execution. (CVE-2012-0883)\n\n - An input validation error exists related to<br />

'mod_negotiation', 'Multiviews' and untrusted uploads that can allow cross-site scripting<br />

attacks. (CVE-2012-2687)<br />

Solution: Upgrade to Apache version 2.2.23 or later.<br />

CVE-2012-2687<br />

JustCloud 'Cloud' Backup Service Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6577 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1799

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!