27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nA web browser on the remote host is affected by multiple vulnerabilities.<br />

\n\nThe installed version of SeaMonkey is affected by various security issues :\n\n -<br />

Several stability bugs leading to crashes that, in some cases, show traces of memory<br />

corruption\n\n - Several file input focus stealing vulnerabilities that could result in<br />

uploading of arbitrary files provided their full path and file names are known.\n\n - Several<br />

issues that allow scripts from page content to escape from their sandboxed context and/or<br />

run with chrome privileges, resulting in privilege escalation, XSS and/or remote code<br />

execution.\n\n - A directory traversal vulnerability via the 'chrome:' URI.\n\n - A<br />

vulnerability involving 'designMode' frames that may result in web browsing history and<br />

forward navigation stealing.\n\n - Mis-handling of locally-saved plain text files.\n\n -<br />

Possible disclosure of sensitive URL parameters, such as session tokens, via the .href<br />

property of stylesheet DOM nodes reflecting the final URI of the stylesheet after following<br />

any 302 redirects.<br />

Solution: Upgrade to version 1.1.8 or higher.<br />

CVE-2008-0594<br />

Thunderbird < 2.0.0.12 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4367 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe installed<br />

version of Thunderbird is missing a critical patch. The vendor has released a patch that<br />

addresses a number of remote vulnerabilities.<br />

Solution: Upgrade to version 2.0.0.12 or higher.<br />

CVE-2008-0413<br />

Apache Tomcat < 6.0.16 Information Disclosure<br />

<strong>PVS</strong> ID: 4368 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server can be manipulated into disclosing confidential<br />

data.\n\nThe remote host is running a version of Tomcat server lower than 6.0.16. This<br />

version of Tomcat is vulnerable to a flaw in the way that it handles exceptions. According<br />

to the vendor, if an exception occurs during the processing of parameters, the parameters<br />

may be used in future requests to disclose potentially confidential data.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2007-5333<br />

ExtremeZ-IP Version Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4369 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1139

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!