27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

emote host.<br />

Solution: Upgrade to version 5.0.7 or higher.<br />

CVE-2006-0468<br />

Ximian Evolution < 2.3.8 Inline XML Content-parsing Overflow<br />

<strong>PVS</strong> ID: 3388 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of the Ximian Evolution email client that does not properly parse<br />

user-supplied data. Specifically, this version of Evolution is reported to be vulnerable to a<br />

flaw in the way that it handles inline XML attachments. A remote attacker can craft an<br />

email message such that, upon opening, Evolution crashes or executes arbitrary code.<br />

Solution: Upgrade to version 2.3.8 or higher.<br />

HTTP Proxy Detection<br />

CVE-2006-0040<br />

<strong>PVS</strong> ID: 3389 FAMILY: Web Servers RISK: NONE NESSUS ID:Not Available<br />

Description: The remote host is a proxy server. <strong>PVS</strong> has determined this due to the format of the HTTP<br />

request. <strong>PVS</strong> observed a client issuing this request: \n%P\n\nThe server replied with: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Winamp < 5.13 Malformed Playlist File Handling Overflow<br />

<strong>PVS</strong> ID: 3390 FAMILY: Generic RISK: HIGH NESSUS ID:20826<br />

Description: Synopsis :\n\nA multimedia application that is affected by a buffer overflow vulnerability<br />

is installed on the remote Windows host.\n\nThe remote host is using Winamp, a popular<br />

media player for Windows. It's possible that a remote attacker using a specially-crafted<br />

playlist can cause a buffer overflow in the version of Winamp installed on the remote host<br />

resulting in a crash of the application or even execution of arbitrary code remotely subject<br />

to the user's privileges. This flaw can reportedly be exploited without user interaction by<br />

linking to a '.pls' file in an IFRAME tag.<br />

Solution: Upgrade to version 5.13 or higher.<br />

PmWiki <<br />

CVE-2005-3188<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3391 FAMILY: CGI NESSUS ID:Not Available<br />

Family Internet Services 871

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!