27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Update to JDK / JRE 7 Update 13 or later and, if necessary, remove any affected versions.<br />

CVE-2013-1489<br />

Samba 3.x < 3.5.21 / 3.6.12 and 4.x < 4.0.2 SWAT Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6686 FAMILY: Samba<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:64459<br />

Description: Synopsis :\n\nThe remote Samba server is affected by multiple vulnerabilities.\n\nFor your<br />

information, the observed version of Samba is :\n %L \n\nAccording to its banner, the<br />

version of Samba 3.x or 4.x running on the remote host is earlier than 3.5.21 / 3.6.12 or<br />

4.0.2. It is, therefore, affected by the following vulnerabilities :\n\n - An error exists in the<br />

SWAT interface that could allow 'clickjacking' attacks. (CVE-2013-0213, Issue #9576)\n\n<br />

- An error exists in the SWAT interface that could allow cross-site request forgery (XSRF)<br />

attacks. (CVE-2013-0214, Issue #9577)\n\nNote that these issues are only exploitable when<br />

SWAT is enabled and it is not enabled by default.<br />

Solution: Either install the appropriate patch referenced in the project's advisory or upgrade to 3.5.21<br />

/ 3.6.12 / 4.0.2 or later<br />

Flash Player <<br />

CVE-2013-0214<br />

<strong>PVS</strong> ID: 6687 FAMILY: Web Clients RISK: HIGH NESSUS ID:64506<br />

Description: Synopsis :\n\nThe remote host contains a browser plug-in that is affected by multiple<br />

vulnerabilities.\n\nThe remote host has Adobe Flash Player installed. For your information,<br />

the observed version of Adobe Flash Player is : \n %L \n\nVersions of Flash Player 11.x<br />

equal to or earlier than 11.5.502.146, or 10.x equal to or earlier than 10.3.183.50 are<br />

affected by multiple vulnerabilities:\n\n - An unspecified error exists that could allow a<br />

buffer overflow leading to code execution. (CVE-2013-0633)\n\n - An unspecified error<br />

exists that could allow memory corruption leading to code execution. (CVE-2013-0634)<br />

Solution: Upgrade to Flash Player 10.3.183.51 / 11.5.502.149 or later.<br />

Flash Player <<br />

CVE-2013-0634<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6688 FAMILY: Web Clients RISK: HIGH NESSUS ID:64584<br />

Description: Synopsis :\n\nThe remote host contains a browser plug-in that is affected by multiple<br />

vulnerabilities.\n\nThe remote host has Adobe Flash Player installed. For your information,<br />

the observed version of Adobe Flash Player is : \n %L \n\nVersions of Flash Player 11.x<br />

equal to or earlier than 11.5.502.149, or 10.x equal to or earlier than 10.3.183.51 are<br />

affected by multiple vulnerabilities:\n\n - Several unspecified issues exist that could lead to<br />

buffer overflows and arbitrary code execution. (CVE-2013-1372, CVE-2013-0645,<br />

CVE-2013-1373, CVE-2013-1369, CVE-2013-1370, CVE-2013-1366, CVE-2013-1365,<br />

CVE-2013-1368, CVE-2013-0642, CVE-2013-1367)\n\n - Several unspecified<br />

Family Internet Services 1840

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!