27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: N/A<br />

CVE Not available<br />

Instagram Upload Activity Detected<br />

<strong>PVS</strong> ID: 6651 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is utilizing an Instagram application to upload a photo. Instagram is a free<br />

photo-sharing application for mobile devices that can publish photos on Facebook, Twitter,<br />

and Tumblr, as well as its native application interface. The user has uploaded the image<br />

using the following username : %L<br />

realtimeonly<br />

Solution: Ensure that such activity is authorized for your network<br />

CVE Not available<br />

Real <strong>Network</strong>s RealPlayer < 16.0.0.282 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6652 FAMILY: Web Clients RISK: HIGH NESSUS ID:63289<br />

Description: Synopsis :\n\nThe remote host is running a multimedia application that is vulnerable to<br />

multiple vulnerabilities.\n\nThe remote host is running RealPlayer application. For your<br />

information, the observed build of RealPlayer is:\n %L .\n\nRealPlayer builds earlier than<br />

16.0.0.282 are potentially affected by multiple vulnerabilities :\n\n - An error exists related<br />

to 'RealAudio' handling and invalid pointers that can allow arbitrary code execution.<br />

(CVE-2012-5690)\n\n - An error exists related to 'RealMedia' handling that can allow a<br />

buffer overflow leading to arbitrary code execution. (CVE-2012-5691)<br />

Solution: Upgrade to RealPlayer 16.0.0.282 or later.<br />

CVE-2012-5691<br />

MySQL Server 5.1 < 5.1.63 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6653 FAMILY: Database<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:61393<br />

Description: Synopsis :\n\nThe remote database server is vulnerable to multiple attack vectors.\n\nFor<br />

your information, the observed version of MySQL Community Server is : \n %L \n\nThe<br />

version of MySQL 5.1 installed on the remote host is earlier than 5.1.63 and is, therefore,<br />

affected by the following vulnerabilities :\n\n - Several errors exist related to 'GIS<br />

Extension' and 'Server Optimizer' components that can allow denial of service attacks.<br />

(CVE-2012-0540, CVE-2012-1689, CVE-2012-1734)\n\n - A security bypass vulnerability<br />

exists that occurs due to improper casting during user login sessions. (Bug #64884 /<br />

CVE-2012-2122)\n\n - An error exists related to key length and sort order index that can<br />

lead to application crashes. (Bug #59387 / CVE-2012-2749)<br />

Solution: Upgrade to MySQL Community Server 5.1.63 later<br />

Family Internet Services 1827

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!