27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Upgrade to version 1.2.4 or higher.<br />

CVE-2006-1505<br />

Mac OS X < 10.4.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3502 FAMILY: Operating System Detection RISK:<br />

MEDIUM<br />

NESSUS ID:21175<br />

Description: Synopsis :\n\nThe remote host is missing a Mac OS X update that fixes a security<br />

issue.\n\nThe remote host is running a version of Mac OS X 10.4 that is older than version<br />

10.4.6. Mac OS X 10.4.5 contains several security fixes for a local authentication bypass<br />

vulnerability. A malicious local user may exploit this vulnerability to bypass the firmware<br />

password and gain access to Single User mode.<br />

Solution: Upgrade to version 10.4.6 or higher.<br />

CVE-2006-0401<br />

NOD32 < 2.51.26 Antivirus Local File Overwrite<br />

<strong>PVS</strong> ID: 3503 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote antivirus software can be tricked by local users into replacing<br />

system files.\n\nThe remote host is running the NOD32 antivirus software. This software is<br />

vulnerable to a flaw where local users can execute arbitrary code by quarantining a file and<br />

then 'restoring' the file in such a manner that, when next executed, the file is run with<br />

SYSTEM privileges.<br />

Solution: Upgrade to version 2.51.26 or higher.<br />

CVE-2006-1649<br />

McAfee WebShield < 4.5 MR2 Bounced Emails Format String<br />

<strong>PVS</strong> ID: 3504 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote 'format string' flaw.\n\nThe remote<br />

host is running the McAfee WebShield SMTP server. This version of WebShield is<br />

vulnerable to a flaw in the way that it processes 'bounced' emails. An attacker can send a<br />

malformed email that, upon being bounced, will overflow the remote mail server.<br />

Solution: Upgrade to version 4.5 MR2 or higher.<br />

CVE-2006-0559<br />

ClamAV < 0.88.1 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3505 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 903

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!