27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Microsoft Media Player Version Detection<br />

<strong>PVS</strong> ID: 2601 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running %L<br />

Solution: Ensure that you are running the latest version of Microsoft Windows Media Player.<br />

CVE Not available<br />

Microsoft Media Player Version 9 PNG Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2602 FAMILY: Generic RISK: HIGH NESSUS ID:16328<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

running Microsoft Media Player Version 9. There is a flaw in this version of Media Player<br />

that would allow a remote attacker to potentially execute code on the target host. Exploiting<br />

this flaw would require that the attacker be able to convince a local user to open an email or<br />

browse to a malicious URL.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-1244<br />

MSN Messenger < 6.2.0205 PNG File Remote Overflow<br />

<strong>PVS</strong> ID: 2603 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:16328<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote<br />

host is running Microsoft MSN Messenger. There is a flaw in this version of MSN<br />

Messenger that would allow a remote attacker to potentially execute code on the<br />

target host. The reported version number is: \n %L<br />

Solution: Upgrade to MSN Messenger 6.2.0205 or higher.<br />

CVE-2004-1244<br />

ArGoSoft FTP Server < 1.4.2.8 Shortcut File Extension Filter Bypass<br />

<strong>PVS</strong> ID: 2604 FAMILY: FTP Servers RISK: HIGH NESSUS ID:16334<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the ArGoSoft FTP Server.\n\nIt is reported that ArGoSoft FTP Server is prone to<br />

a vulnerability that\nallows a user to bypass a filter forbidding link upload. An attacker<br />

\nexploiting this flaw may be able to have read and write access to any\nfiles and<br />

directories on the FTP server.<br />

Solution: Upgrade to ArGoSoft FTP 1.4.2.8 or higher.<br />

CVE-2005-0520<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 664

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!