27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Real<strong>Network</strong> RealPlayer Unspecified Remote Vulnerability<br />

<strong>PVS</strong> ID: 1777 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running a vulnerable version of RealPlayer. An attacker may execute<br />

arbitrary code on a computer running the player.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-1437<br />

Neon < 0.23.8 Status Response Control Character Inclusion Vulnerability<br />

<strong>PVS</strong> ID: 1778 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is using software based on a vulnerable version of the Neon Library, an<br />

open-source HTTP and WebDAV client library. Applications that use this version of the<br />

Neon library may disclose sensitive information to an attacker.<br />

Solution: Upgrade to Neon library 0.23.8 or higher.<br />

CVE Not available<br />

Neon < 0.24.5 WebDAV Client Library Format String Vulnerabilities<br />

<strong>PVS</strong> ID: 1779 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host is using software based on a vulnerable version of the Neon Library, an<br />

open-source HTTP and WebDAV client library. An attacker running a malicious WebDAV<br />

server may execute arbitrary code on the host.<br />

Solution: Upgrade to Neon library 0.24.5 or higher.<br />

CVE-2004-0179<br />

Neon < 0.24.6 WebDAV Client Library ne_rfc1036_parse Function Heap Overflow<br />

<strong>PVS</strong> ID: 1780 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using software based on a vulnerable version of the Neon Library, an open-source HTTP<br />

and WebDAV client library. Depending of the application using the library, an attacker<br />

running a malicious WebDAV server may execute arbitrary code on the host or create a<br />

denial of service.<br />

Solution: Upgrade to Neon library 0.24.6 or higher.<br />

CVE-2004-0398<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Neon < 0.24.7 WebDAV Client Library Unspecified Vulnerability<br />

Family Internet Services 452

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!