27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: Upgrade to version 1.1.12 or higher.<br />

CVE-2008-3836<br />

Mantis < 1.1.4 HTTPS Session Cookie Secure Flag Weakness<br />

<strong>PVS</strong> ID: 4694 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote server is running Mantis, a bug-tracking software. The reported version is '%L'.<br />

This version of Mantis is vulnerable to a flaw where cookies passed over SSL are not<br />

marked as 'Secure'. Given this, the cookie can be requested over HTTP and sent via<br />

plaintext.<br />

Solution: Upgrade to version 1.1.4 or higher.<br />

Postfix Detection<br />

CVE-2008-3102<br />

<strong>PVS</strong> ID: 4695 FAMILY: SMTP Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote mail server is running Postfix, an open source SMTP server. The observed<br />

banner was: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Thunderbird < 2.0.0.17 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4696 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:34294<br />

Description: Synopsis :\n\nThe remote Windows host contains a mail client that is affected by multiple<br />

vulnerabilities.\n\nThe installed version of Thunderbird is affected by various security<br />

issues :\n\n - Using a specially crafted UTF-8 URL in a hyperlink, an attacker might be able<br />

to exploit a stack buffer overflow in the Mozilla URL parsing routes to execute arbitrary<br />

code (MFSA 2008-37).\n - It is possible to bypass the same-origin check in<br />

'nsXMLDocument::OnChannelRedirect()' (MFSA 2008-38).\n - Privilege escalation is<br />

possible via 'XPCnativeWrapper' pollution (MFSA 2008-41).\n - There are several stability<br />

bugs in the browser engine that may lead to crashes with evidence of memory corruption<br />

(MFSA 2008-42).\n - Certain BOM characters and low surrogate characters, if<br />

HTML-escaped, are stripped from JavaScript code before it is executed, which could allow<br />

for cross-site scripting attacks (MFSA 2008-43).\n - The 'resource:' protocol allows<br />

directory traversal on Linux when using URL-encoded slashes, and it can by used to bypass<br />

restrictions on local HTML files (MFSA 2008-44).\n - There is a heap buffer overflow that<br />

can be triggered when canceling a newsgroup message (MFSA 2008-46).<br />

Solution: Upgrade to version 2.0.0.17 or higher.<br />

Family Internet Services 1233

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!