27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

decoding. (CVE-2013-0894)\n\n - Memory management errors exist related to plugin<br />

message handling. (CVE-2013-0896)\n\n - An off-by-one read error exists related to PDF<br />

handling. (CVE-2013-0897)\n\nNote that the vendor states that WebKit's MathML<br />

implementation has been disabled in this release. This is due to several unspecified, high<br />

severity security issues. Successful exploitation of some of these issues could lead to an<br />

application crash or even allow arbitrary code execution, subject to the user's privileges.<br />

Solution: Upgrade to Google Chrome 25.0.1364.97 or later.<br />

mDNS Client Queries<br />

CVE-2013-2268<br />

<strong>PVS</strong> ID: 6695 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client has issued a response query for the following resource name.<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

MAC change detection (SNMP)<br />

<strong>PVS</strong> ID: 6696 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client has just issued a trap which indicates a change of MAC Address<br />

realtimeonly<br />

Solution: Solution Not Available<br />

CVE Not available<br />

Ecava IntegraXor < 4.00.4283 ActiveX Remote Buffer Overflow (SCADA)<br />

<strong>PVS</strong> ID: 6697 FAMILY: SCADA RISK: HIGH NESSUS ID:64630<br />

Description: Synopsis :\n\nThe remote Windows host contains a SCADA application that is affected by<br />

a buffer overflow vulnerability.\n\nFor you information, the observed version of the server<br />

is : \n %L \n\nThe IntegraXor server installed on the remote host is earlier than 4.00 Build<br />

4283. As such, it is reportedly affected by a buffer overflow vulnerability in the ActiveX<br />

file 'PE3DO32A.ocx'. If an attacker can trick a user on the affected host into visiting a<br />

specially crafted web page, they may be able to leverage this issue to conduct a denial of<br />

service (DoS) or execute arbitrary code on the host subject to user's privileges.<br />

Solution: Upgrade to version 4.00.4283 or later<br />

CVE-2012-4700<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1844

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!