27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>PVS</strong> ID: 3649 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running an older version of MyBulletinBoard. The vendor has released version 1.1.3 in<br />

order to fix several flaws. An attacker exploiting the more serious of the flaws would be<br />

able to execute arbitrary script code on the remote web server.<br />

Solution: Upgrade to version 1.1.3 or higher.<br />

CVE-2006-2908<br />

Microsoft Windows Media Player PNG Processing Overflow (917734)<br />

<strong>PVS</strong> ID: 3650 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nArbitrary code can be executed on the remote host through Windows Media<br />

Player.\n\nThe remote host is running Microsoft Media Player version 10. There is a<br />

vulnerability in the remote version of this software that may allow an attacker to execute<br />

arbitrary code on the remote host. To exploit this flaw, one attacker would need to be able<br />

to convince a user to open a malicious media resource using the vulnerable player.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-0025<br />

Microsoft Windows Media Player PBG File Processing Overflow (917734)<br />

<strong>PVS</strong> ID: 3651 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nArbitrary code can be executed on the remote host through the Media<br />

Player.\n\nThe remote host is running Microsoft Windows Media Player version 9. There is<br />

a vulnerability in the remote version of this software that may allow an attacker to execute<br />

arbitrary code on the remote host. To exploit this flaw, an attacker would need to be able to<br />

convince a user to open a malicious media resource using the vulnerable player.<br />

Solution: Patch or upgrade according to vendor recommendations.<br />

CVE-2006-0025<br />

IBM DB2 < 8.12.0 Multiple DoS<br />

<strong>PVS</strong> ID: 3652 FAMILY: Database<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running the IBM DB2 database. This version of DB2 is vulnerable to<br />

multiple flaws in the way that it processes user-supplied data. A remote attacker may deny<br />

access to legitimate database users. It is believed that authentication is required prior to the<br />

exploitation of this bug.<br />

Family Internet Services 942

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!