27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

use-after-free vulnerabilities exist that could lead to remote code execution.<br />

(CVE-2013-0649, CVE-2013-1374, CVE-2013-0644)\n\n - Two unspecified issues exist<br />

that could lead to memory corruption and arbitrary code execution. (CVE-2013-0638,<br />

CVE-2013-0647)\n\n - An unspecified information disclosure vulnerability exists.<br />

(CVE-2013-0637)\n\n - An unspecified integer overflow vulnerability<br />

exists.(CVE-2013-0639)<br />

Solution: Upgrade to Flash Player 10.3.183.63 / 11.6.602.168 or later.<br />

CVE-2013-1374<br />

Siemens SIMATIC RF-MANAGER Detection (SCADA)<br />

<strong>PVS</strong> ID: 6689 FAMILY: SCADA RISK: INFO NESSUS ID:64682<br />

Description: The remote host has been identified as a Siemens SIMATIC RF-MANAGER. It is an RFID<br />

management system.<br />

Solution: Ensure that access to this server is restricted to only trusted hosts/networks<br />

CVE Not available<br />

Asterisk Peer Multiple Vulnerabilities (AST-2012-014 / AST-2012-015)<br />

<strong>PVS</strong> ID: 6690 FAMILY: Generic RISK: HIGH NESSUS ID:64717<br />

Description: Synopsis :\n\nThe remote VoIP server is affected by multiple vulnerabilities.\n\nFor your<br />

information, the observed version of Asterisk is : \n %L \n\nAccording to the version in its<br />

SIP banner, the version of Asterisk running on the remote host is potentially affected by the<br />

following vulnerabilities :\n\n - A stack-based buffer overflow error exists related to SIP,<br />

HTTP and XMPP handling over TCP. Note that in the case of 'Certified Asterisk', SIP is<br />

not affected. Further note that in the case of XMPP, an attacker must establish an<br />

authenticated session first. (CVE-2012-5976)\n\n - An error exists related to device state<br />

cache and anonymous calls that could allow system resources to be exhausted. Note this<br />

vulnerability only affects systems configured to allow anonymous calls. (CVE-2012-5977)<br />

Solution: Upgrade to Asterisk 1.8.19.1 / 10.11.1 / 11.1.2, Certified Asterisk 1.8.11-cert10 or apply<br />

the patches listed in the Asterisk advisory<br />

Mozilla Firefox 18.x <<br />

CVE-2012-5977<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6691 FAMILY: Web Clients RISK: HIGH NESSUS ID:64723<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox 18.x and older are potentially affected by the following security<br />

issues :\n\n - Numerous memory safety errors exist. (CVE-2013-0783,<br />

CVE-2013-0784)\n\n - An out-of-bounds read error exists related to the handling of GIF<br />

images. (CVE-2013-0772)\n\n - An error exists related to 'WebIDL' object wrapping that<br />

Family Internet Services 1841

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!