27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nIt is possible to execute code on the remote backup client.\n\nAccording to<br />

its version number, the installed instance of Retrospect client is vulnerable to a buffer<br />

overflow when it receives a packet starting with a specially-crafted sequence of bytes. An<br />

unauthenticated remote attacker may be able to exploit this flaw to execute code on the<br />

remote host.<br />

Solution: Upgrade to version 6.5.140 ,7.0.112, 7.5.116 or higher.<br />

CVE-2006-2391<br />

Quicktime < 7.1 on Mac OS X Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3616 FAMILY: Web Clients RISK: HIGH NESSUS ID:21554<br />

Description: Synopsis :\n\nThe remote version of QuickTime is affected by multiple overflow<br />

vulnerabilities.\n\nThe remote Mac OS X host is running a version of Quicktime prior to<br />

7.1. The remote version of Quicktime is vulnerable to various integer and buffer overflows<br />

involving specially-crafted image and media files. An attacker may be able to leverage<br />

these issues to execute arbitrary code on the remote host by sending a malformed file to a<br />

victim and having it opened using QuickTime player.<br />

Solution: Install version 7.1 or higher.<br />

CVE-2006-1460<br />

Mac OS X Multiple Vulnerabilities (<strong>Security</strong> Update 2006-003)<br />

<strong>PVS</strong> ID: 3617 FAMILY: Operating System Detection RISK: HIGH NESSUS ID:21341<br />

Description: Synopsis :\n\nThe remote operating system is missing vendor supplied patches.\n\nThe<br />

remote host is running Apple Mac OS X, but lacks <strong>Security</strong> Update 2006-003. This security<br />

update contains fixes for the following applications<br />

:\nAppKit\nImageIO\nBOM\nCF<strong>Network</strong>\nClamAV (Mac OS X Server<br />

only)\nCoreFoundation\nCoreGraphics\nFinder\nFTPServer\nFlash<br />

Player\nKeyChain\nLaunchServices\nlibcurl\nMail\nMySQL Manager (Mac OS X Server<br />

only)\nPreview\nQuickDraw\nQuickTime Streaming Server\nRuby\nSafari<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-1457<br />

BEA WebLogic Server Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3618 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of BEA WebLogic Server that is vulnerable to eleven (11) distinct<br />

vulnerabilities. An attacker exploiting these flaws would be able to impact availability,<br />

confidentiality and integrity.<br />

Family Internet Services 932

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!