27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Upgrade to version 0.88.0 or higher.<br />

CVE-2006-0162<br />

PostgreSQL postmaster Connection Saturation DoS<br />

<strong>PVS</strong> ID: 3363 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running PostgreSQL, an open source relational database. This version is<br />

vulnerable to a Denial of Service (DoS) flaw. Specifically, an attacker initiating multiple<br />

connections to the 'postmaster' service may be able to cause the service to fail. This can<br />

lead to a loss of availability.<br />

Solution: Upgrade to version 8.0.6, 8.1.2 or higher.<br />

CVE-2006-0105<br />

Quicktime < 7.0.4 (Windows) Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3364 FAMILY: Web Clients RISK: HIGH NESSUS ID:20395<br />

Description: Synopsis :\n\nThe remote version of QuickTime is affected by multiple code execution<br />

vulnerabilities.\n\nThe remote version of Quicktime is vulnerable to various buffer<br />

overflows involving specially crafted images and media files. An attacker may be able to<br />

leverage these issues to execute arbitrary code on the remote host by sending a malformed<br />

file to a victim and having him/her open it using QuickTime player.<br />

Solution: Upgrade to version 7.0.4 or higher.<br />

CVE-2005-4092<br />

Microsoft Outlook / Exchange TNEF Decoding Arbitrary Code Execution<br />

<strong>PVS</strong> ID: 3365 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:20390<br />

Description: Arbitrary code can be executed on the remote host through the email client or the email<br />

server. The remote host is running a version of Outlook that is vulnerable to a bug in the<br />

Transport Neutral Encapsulation Format (TNEF) MIME attachment handling routine that<br />

may allow an attacker execute arbitrary code on the remote host by sending a specially<br />

crafted email.<br />

Solution: Microsoft has released a set of patches for Office 2000, 2002, XP, and 2003.<br />

CVE-2006-0002<br />

Microsoft Outlook Email Client Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3366 FAMILY: SMTP Clients RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 866

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!