27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is running a gaming console.\n\nThe remote host is running<br />

the Steam Valve Client. Steam Valve is an entertainment platform used for gaming, chat,<br />

and more. The remote version is %L<br />

Solution: Ensure that such usage is authorized with respect to existing policies and guidelines<br />

CVE Not available<br />

Opera < 12.10 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6618 FAMILY: Web Clients RISK: HIGH NESSUS ID:62821<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable by multiple<br />

vulnerabilities.\n\nThe remote host is running the Opera web browser. For your<br />

information, the observed version of Opera is : \n %L \n\nVersions of Opera earlier than<br />

12.10 are potentially affected by the following vulnerabilities :\n\n - An error exists related<br />

to certificate revocation checking that can allow the application to indicate that a site is<br />

secure even though the check has not completed. (1029)\n\n - An error exists related to<br />

Cross-Origin Resource Sharing (CORS) handling that can allow specially crafted requests<br />

to aid in disclosing sensitive data. (1030)\n\n - An error exists related to data URIs that<br />

allows bypassing of the 'Same Origin Policy' and cross-site scripting attacks. (1031)\n\n -<br />

An error exists related to SVG image handling that can result in arbitrary code execution.<br />

(1033)\n\n - Two unspecified errors exist having unspecified impact.<br />

Solution: Upgrade to Opera 12.10 or later.<br />

2012-6467<br />

Microsoft Office365 Access<br />

<strong>PVS</strong> ID: 6619 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client has initiated an SSL session to the Microsoft office365 portal<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

QuickTime < 7.7.3 Multiple Vulnerabilities (Windows)<br />

<strong>PVS</strong> ID: 6620 FAMILY: Web Clients RISK: HIGH NESSUS ID:62890<br />

Description: Synopsis :\n\nThe remote host contains an application that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of QuickTime is %L.\n\nVersions<br />

of QuickTime earlier thanolder than 7.7.3 are affected by the following vulnerabilities :\n\n<br />

- A buffer overflow exists in the handling of REGION records in PICT files.<br />

(CVE-2011-1374)\n\n - A memory corruption issue exists in the handling of PICT files.<br />

(CVE-2012-3757)\n\n - A use-after-free issue exists in the QuickTime plugin's handling of<br />

'_qtactivex_' parameters within an HTML object element. (CVE-2012-3751)\n\n - A buffer<br />

overflow exists in the handling of the transform attribute in text3GTrack elements in<br />

TeXML files. (CVE-2012-3758)\n\n - Multiple buffer overflows exist in the handling of<br />

Family Internet Services 1816

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!