27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>PVS</strong> ID: 4750 FAMILY: Generic RISK: INFO NESSUS ID:34756<br />

Description: Synopsis :\n\nA database service is listening on the remote host.\n\n The remote host is<br />

running Yosemite Backup, a commercial backup solution for Windows, Linux and Novell<br />

NetWare and targeting small-to-medium sized businesses.<br />

Solution: N/A<br />

CVE Not available<br />

Firefox < 2.0.0.18 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4751 FAMILY: Web Clients RISK: HIGH NESSUS ID:34766<br />

Description: Synopsis : \n\nThe remote Windows host contains a web browser that is affected by<br />

multiple vulnerabilities.\n\nThe installed version of Firefox is earlier than 2.0.0.18. Such<br />

versions are potentially affected by the following security issues : \n\n - Locally saved '.url'<br />

shortcut files can be used to read information stored in the local cache. (MFSA 2008-47)\n<br />

- The canvas element can be used in conjunction with an HTTP redirect to bypass<br />

same-origin restrictions and gain access to the content in arbitrary images from other<br />

domains. (MFSA 2008-48)\n - Arbitrary code execution is possible via Flash Player<br />

dynamic module unloading. (MFSA 2008-49)\n - By tampering with the<br />

window.__proto__.__proto__ object, one can cause the browser to place a lock on a<br />

non-native object, leading to a crash and possible code execution. (MFSA 2008-50)\n -<br />

There are several stability bugs in the browser engine that may lead to crashes with<br />

evidence of memory corruption. (MFSA 2008-52)\n - The browser's session restore feature<br />

can be used to violate the same-origin policy and run JavaScript in the context of another<br />

site. (MFSA 2008-53)\n - There is a buffer overflow that can be triggered by sending a<br />

specially crafted 200 header line in the HTTP index response. (MFSA 2008-54)\n - Crashes<br />

and remote code execution in nsFrameManager are possible by modifying certain<br />

properties of a file input element before it has finished initializing. (MFSA 2008-55)\n -<br />

The same-origin check in 'nsXMLHttpRequest: : NotifyEventListeners()' can be bypassed.<br />

(MFSA 2008-56)\n - The '-moz-binding' CSS property can be used to bypass security<br />

checks that validate codebase principals. (MFSA 2008-57)\n - There is an error in the<br />

method used to parse the default namespace in an E4X document caused by quote<br />

characters in the namespace not being properly escaped. (MFSA 2008-58)\n\nThe reported<br />

version of Firefox is: \n %L<br />

Solution: Upgrade to version 2.0.0.18 or higher.<br />

CVE-2008-5024<br />

Firefox 3.x < 3.0.4 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4752 FAMILY: Web Clients RISK: HIGH NESSUS ID:34767<br />

Description: Synopsis : \n\nThe remote Windows host contains a web browser that is affected by<br />

multiple vulnerabilities.\n\nThe installed version of Firefox 3.0 is earlier than 3.0.4. Such<br />

versions are potentially affected by the following security issues : \n\n - Locally saved '.url'<br />

shortcut files can be used to read information stored in the local cache. (MFSA 2008-47)\n<br />

- By tampering with the window.__proto__.__proto__ object, one can cause the browser to<br />

Family Internet Services 1249

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!