27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe installed<br />

version of Firefox is affected by a flaw that could lead to a Denial of Service (DoS)<br />

condition within the browser. In addition, the version of Firefox is reported vulnerable to a<br />

buffer overflow when processing malformed XML documents. An attacker exploiting<br />

either of these flaws would need to be able to convince a user to visit a malicious URI.<br />

Solution: Upgrade to version 1.5.0.6 or higher.<br />

CVE-2006-4253<br />

Microsoft Internet Explorer Version Detection<br />

<strong>PVS</strong> ID: 3725 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Microsoft Internet Explorer version:\n'%L'\n\nNote that the<br />

version information passed within User-Agent strings is not typically granular.<br />

Solution: Ensure that the latest version of Microsoft IE is installed.<br />

CVE Not available<br />

Google Toolbar Detection<br />

<strong>PVS</strong> ID: 3726 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Google Toolbar version: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

HP OpenView Storage Data Protector Detection<br />

<strong>PVS</strong> ID: 3727 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running HP OpenView Storage Data Protector version %L .<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

HP OpenView Storage Data Protector Backup Agent Remote Arbitrary Command Execution<br />

<strong>PVS</strong> ID: 3728 FAMILY: Generic RISK: HIGH NESSUS ID:22225<br />

Description: Synopsis :\n\nIt is possible to execute code on the remote host through the backup<br />

agent.\n\nThe remote version of HP OpenView Data Protector is vulnerable to an<br />

authentication bypass flaw. By sending specially crafted requests to the remote host, an<br />

attacker may be able to execute unauthorized Backup commands. Due to the nature of the<br />

software, a successful exploitation of this vulnerability could result in remote code<br />

execution.<br />

Family Internet Services 962

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!