27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

same-origin policy could allow for cross-site scripting attacks (MFSA 2008-22).\n -<br />

JavaScript can be injected into the context of signed JARs and executed under the context<br />

of the JAR's signer (MFSA 2008-23).\n - By taking advantage of the privilege level stored<br />

in the pre-compiled 'fastload' file, an attacker may be able to run arbitrary JavaScript code<br />

with chrome privileges (MFSA 2008-24).\n - Arbitrary code execution is possible in<br />

'mozIJSSubScriptLoader.loadSubScript()' (MFSA 2008-25).\n - An attacker can steal files<br />

from known locations on a victim's computer via originalTarget and DOM Range (MFSA<br />

2008-27).\n - It is possible for a malicious Java applet to bypass the same-origin policy and<br />

create arbitrary socket connections to other domains (MFSA 2008-28).\n - An improperly<br />

encoded '.properties' file in an add-on can result in uninitialized memory being used, which<br />

could lead to data formerly used by other programs being exposed to the add-on code<br />

(MFSA 2008-29).\n - File URLs in directory listings are not properly HTML-escaped when<br />

the filenames contained particular characters (MFSA 2008-30).\n - A weakness in the trust<br />

model regarding alt names on peer-trusted certs could lead to spoofing secure connections<br />

to any other site (MFSA 2008-31).\n - URL shortcut files on Windows (for example, saved<br />

IE favorites) could be interpreted as if they were in the local file context when opened by<br />

Firefox, although the referenced remote content would be downloaded and displayed<br />

(MFSA 2008-32).\n - A crash in Mozilla's block reflow code could be used by an attacker<br />

to crash the browser and run arbitrary code on the victim's computer (MFSA 2008-33).<br />

Solution: Upgrade to version 2.0.0.15 or higher.<br />

CVE-2008-2811<br />

SeaMonkey < 1.1.10 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4568 FAMILY: Web Clients RISK: HIGH NESSUS ID:33394<br />

Description: Synopsis :\n\nThe remote Windows host contains a web browser that is affected by<br />

multiple vulnerabilities.\n\nThe installed version of SeaMonkey is affected by various<br />

security issues :\n\n - Several stability bugs leading to crashes that, in some cases, show<br />

traces of memory corruption (MFSA 2008-21).\n - A vulnerability involving violation of<br />

the same-origin policy could allow for cross-site scripting attacks (MFSA 2008-22).\n -<br />

JavaScript can be injected into the context of signed JARs and executed under the context<br />

of the JAR's signer (MFSA 2008-23).\n - By taking advantage of the privilege level stored<br />

in the pre-compiled 'fastload' file, an attacker may be able to run arbitrary JavaScript code<br />

with chrome privileges (MFSA 2008-24).\n - Arbitrary code execution is possible in<br />

'mozIJSSubScriptLoader.loadSubScript()' (MFSA 2008-25).\n - An attacker can steal files<br />

from known locations on a victim's computer via originalTarget and DOM Range (MFSA<br />

2008-27).\n - It is possible for a malicious Java applet to bypass the same-origin policy and<br />

create arbitrary socket connections to other domains (MFSA 2008-28).\n - An improperly<br />

encoded '.properties' file in an add-on can result in uninitialized memory being used, which<br />

could lead to data formerly used by other programs being exposed to the add-on code<br />

(MFSA 2008-29).\n - File URLs in directory listings are not properly HTML-escaped when<br />

the filenames contained particular characters (MFSA 2008-30).\n - A weakness in the trust<br />

model regarding alt names on peer-trusted certs could lead to spoofing secure connections<br />

to any other site (MFSA 2008-31).\n - URL shortcut files on Windows (for example, saved<br />

IE favorites) could be interpreted as if they were in the local file context when opened by<br />

Seamonkey, although the referenced remote content would be downloaded and displayed<br />

(MFSA 2008-32).\n - A crash in Mozilla's block reflow code could be used by an attacker<br />

Family Internet Services 1194

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!