27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Upgrade to IMail 8.13.0 or higher.<br />

CVE-2004-2422<br />

Winamp ActiveX Control Remote Buffer Overflow<br />

<strong>PVS</strong> ID: 2258 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote client is<br />

running a version of the Nullsoft Winamp media player that may be vulnerable to a remote<br />

code execution issue. This vulnerability may be used to remotely execute arbitrary code on<br />

the host by invoking an ActiveX component installed by Winamp in a malicious manner.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Opera < 7.54.0 Empty CCCC Object JavaScript-based DoS<br />

<strong>PVS</strong> ID: 2259 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is using a version of Opera that is affected by a security weakness that may<br />

permit an attacker to crash the remote web browser by using JavaScript. Specifically,<br />

processing an empty 'CCCC' object generated using JavaScript causes Opera to crash.<br />

Solution: Install Opera 7.54.0 or higher.<br />

CVE Not available<br />

phpMyBackupPro < 1.0.0 Multiple Input Sanitization Vulnerabilities<br />

<strong>PVS</strong> ID: 2260 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

appears to be using phpMyBackupPro. It is reported that this version is prone to multiple<br />

security weaknesses via input validation. An attacker may use these issues to gain access to<br />

the application or to access the underlying database.<br />

Solution: Upgrade to version 1.0.0 or higher.<br />

CVE Not available<br />

Keene Digital Media Server Multiple XSS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2261 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running Keene Digital Media Server, a web application for Microsoft<br />

Windows designed to share media files on the Internet. This version of the software has<br />

Family Internet Services 567

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!