27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE-2012-5276, CVE-2012-5277, CVE-2012-5280)\n\n - An unspecified security bypass<br />

issue exists that can lead to arbitrary code execution. (CVE-2012-5278)\n\n - An<br />

unspecified issue exists that can lead to memory corruption and arbitrary code execution.<br />

(CVE-2012-5279)<br />

Solution: Upgrade to Flash Player 10.3.183.43 / 11.5.502.110 or later.<br />

CVE-2012-5280<br />

Apache Tomcat 6.0.x < 6.0.36 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6657 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:62987<br />

Description: Synopsis :\n\nThe remote web server is affected by multiple vunerabilities.\n\nFor your<br />

information, the observed version of Apache Tomcat 6.0 installed on the remote host is : \n<br />

%L \n\nVersions earlier than Apache Tomcat 6.0.36 are potentially affected by multiple<br />

vulnerabilities :\n\n - A flaw exists within the parseHeaders() function that could allow for<br />

a crafted header to cause a remote denial of service. (CVE-2012-2733)\n\n - An error exists<br />

related to FORM authentication that can allow security bypass if 'j_security_check' is<br />

appended to the request. (CVE-2012-3546)\n\n - An error exists in the file<br />

'filters/CsrfPreventionFilter.java' that can allow cross-site request forgery (CSRF) attacks to<br />

bypass the filtering. This can allow access to protected resources without a session<br />

identifier. (CVE-2012-4431)\n\n - An error exists related to the 'NIO' connector when<br />

HTTPS and 'sendfile' are enabled that can force the application into an infinite loop.<br />

(CVE-2012-4534)\n\n - Replay-countermeasure functionality in HTTP Digest Access<br />

Authentication tracks cnonce values instead of nonce values, which makes it easier for<br />

attackers to bypass access restrictions by sniffing the network for valid requests.<br />

(CVE-2012-5885)\n\n - HTTP Digest Access Authentication implementation caches<br />

information about the authenticated user, which could potentially allow an attacker to<br />

bypass authentication via session ID. (CVE-2012-5886)\n\n - HTTP Digest Access<br />

Authentication implementation does not properly check for stale nonce values with<br />

enforcement of proper credentials, which allows an attacker to bypass restrictions by<br />

sniffing requests. (CVE-2012-5887)<br />

Solution: Upgrade to Apache Tomcat 6.0.36 or later.<br />

CVE-2012-5887<br />

VLC Media Player < 2.0.5 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6658 FAMILY: Web Clients RISK: HIGH NESSUS ID:63381<br />

Description: Synopsis :\n\nThe remote host contains an application that is affected by multiple<br />

vulnerabilities\n\nThe remote host contains VLC player, a multi-media application. For<br />

your information, the observed version of VLC is : \n %L .\n\nVersions of VLC media<br />

player earlier than 2.0.5 are potentially affected by the following vulnerabilities :\n\n - An<br />

error exists in the file 'modules/codec/subsdec.c' ('libsubsdec_plugin.dll') that does not<br />

properly validate input and can allow a buffer overflow. Opening a specially crafted file<br />

can result in the execution of arbitrary code. Note that the subtitles feature must be enabled<br />

Family Internet Services 1829

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!