27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

that can allow cross-site request forgery (CSRF) attacks to bypass the filtering. This can<br />

allow access to protected resources without a session identifier.<br />

Solution: Upgrade to Apache Tomcat 7.0.32 or later.<br />

Flash Player <<br />

CVE-2012-4431<br />

<strong>PVS</strong> ID: 6645 FAMILY: Web Clients RISK: HIGH NESSUS ID:63242<br />

Description: Synopsis :\n\nThe remote host contains a browser plug-in that is affected by multiple<br />

vulnerabilities.\n\nThe remote host has Adobe Flash Player installed. For your information,<br />

the observed version of Adobe Flash Player is : \n %L \n\nVersions of Flash Player 11.x<br />

equal to or earlier than 11.5.502.110, or 10.x equal to or earlier than 10.3.183.43 are<br />

affected by multiple vulnerabilities:\n\n - An unspecified error exists that can allow a buffer<br />

overflow and arbitrary code execution. (CVE-2012-5676)\n\n - An unspecified error exists<br />

that can allow an integer overflow and arbitrary code execution. (CVE-2012-5677)\n\n - An<br />

unspecified error exists that can lead to memory corruption and arbitrary code execution.<br />

(CVE-2012-5678)<br />

Solution: Upgrade to Flash Player 10.3.183.48 / 11.5.502.135 or later.<br />

Flash Player <<br />

CVE-2012-5678<br />

<strong>PVS</strong> ID: 6646 FAMILY: Web Clients RISK: HIGH NESSUS ID:63242<br />

Description: Synopsis :\n\nThe remote host contains a browser plug-in that is affected by multiple<br />

vulnerabilities.\n\nThe remote host has Adobe Flash Player installed. For your information,<br />

the observed version of Adobe Flash Player is : \n %L \n\nVersions of Flash Player 11.x<br />

equal to or earlier than 11.5.502.110, or 10.x equal to or earlier than 10.3.183.43 are<br />

affected by multiple vulnerabilities:\n\n - An unspecified error exists that can allow a buffer<br />

overflow and arbitrary code execution. (CVE-2012-5676)\n\n - An unspecified error exists<br />

that can allow an integer overflow and arbitrary code execution. (CVE-2012-5677)\n\n - An<br />

unspecified error exists that can lead to memory corruption and arbitrary code execution.<br />

(CVE-2012-5678)<br />

Solution: Upgrade to Flash Player 10.3.183.48 / 11.5.502.135 or later.<br />

Flash Player <<br />

CVE-2012-5678<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6647 FAMILY: Web Clients RISK: HIGH NESSUS ID:63242<br />

Description: Synopsis :\n\nThe remote host contains a browser plug-in that is affected by multiple<br />

vulnerabilities.\n\nThe remote host has Adobe Flash Player installed. For your information,<br />

the observed version of Adobe Flash Player is : \n %L \n\nVersions of Flash Player 11.x<br />

equal to or earlier than 11.5.502.110, or 10.x equal to or earlier than 10.3.183.43 are<br />

Family Internet Services 1825

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!