27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running iTunes - an application for managing and listening to music media files. The<br />

version of iTunes client is %L. \nThis version of iTunes is vulnerable to a buffer overflow.<br />

An attacker exploiting this flaw would need to be able to entice an iTunes user into opening<br />

a malformed file. Successful exploitation would result in the attacker executing arbitrary<br />

code on the remote system.<br />

Solution: Upgrade to version 4.8 or higher.<br />

CVE-2005-1248<br />

GeoVision Digital Surveillance System Detection<br />

<strong>PVS</strong> ID: 2890 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18220<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running GeoVision Digital Surveillance System, a<br />

web-based surveillance system that allows remote operators to control and manage data<br />

streams from multiple cameras. This version of GeoVision is vulnerable to a remote flaw<br />

that allows attackers to view images without authentication. An attacker can query any of<br />

the controlled cameras for the current image stored. Successful exploitation could lead to<br />

the compromise of confidential data.<br />

Solution: Upgrade to version 7.0 or higher.<br />

CVE-2005-1552<br />

GeoVision Digital Surveillance System Detection<br />

<strong>PVS</strong> ID: 2891 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running GeoVision Digital Surveillance System, a web-based<br />

surveillance system that allows remote operators to control and manage data streams from<br />

multiple cameras.<br />

Solution: Ensure that the existence of the surveillance system is explicitly allowed with respect to<br />

corporate policies and guidelines.<br />

CVE Not available<br />

myServer Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2892 FAMILY: Web Servers RISK: LOW NESSUS ID:18218<br />

Description: The remote host is running myServer 0.8.0 or older. There is a flaw in the remote version<br />

of this software that may allow an attacker to list directories or execute a Cross-Site<br />

Scripting (XSS) attack. The first flaw would allow an attacker access to potentially<br />

confidential data via a directory listing. The second flaw would require the attacker to be<br />

able to convince a user to browse a malicious URI. Successful exploitation would result in<br />

the attacker being able to retrieve potentially confidential data (such as authentication<br />

Family Internet Services 748

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!