27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

privilege escalation attacks against web servers hosting Flash content and cross-domain<br />

policy files. (CVE-2007-6243)\n\n - Potential Clipboard attacks. (CVE-2008-3873)\n\n -<br />

FileReference upload and download APIs that don't require user interaction.<br />

(CVE-2008-4401)\n\n - A potential cross-site scripting vulnerability. (CVE-2008-4818)\n\n<br />

- A potential issue that could be leveraged to conduct a DNS rebinding attack.<br />

(CVE-2008-4819)\n\n - An information disclosure issue affecting only the ActiveX control.<br />

(CVE-2008-4820)\n\n - An information disclosure issue involving interpretation of the 'jar:<br />

' protocol and affecting only the plugin for Mozilla browsers. (CVE-2008-4821)\n\n - An<br />

issue with policy file interpretation could potentially lead to bypass of a non-root domain<br />

policy. (CVE-2008-4822)\n\n - A potential HTML injection issue involving an<br />

ActionScript attribute. (CVE-2008-4823)\n\n - Multiple input validation errors could<br />

potentially lead to execution of arbitrary code. (CVE-2008-4824)\n\n - An Adobe AIR<br />

application that loads data from an untrusted source could allow an attacker to execute<br />

untrusted JavaScript with elevated privileges. (CVE-2008-5108)\n\nThe reported version of<br />

Adobe AIR is: \n %L<br />

Solution: Upgrade to version 1.5.0.7220 or higher.<br />

CVE-2008-5108<br />

SSH Tectia CBC Information Disclosure<br />

<strong>PVS</strong> ID: 4761 FAMILY: SSH RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote Tectia SSH server is vulnerable to a flaw within its Cipher-Block<br />

Chaining (CBC) mode. An attacker exploiting this flaw would be able to obtain four (4)<br />

plaintext bytes of the encrypted session. Note: successful attack will result in the SSH<br />

session terminating.<br />

Solution: Upgrade to version 4.4.12, 5.2.5, 5.3.9, 6.0.5 or higher.<br />

CVE-2008-5161<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Thunderbird < 2.0.0.18 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4762 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:34819<br />

Description: Synopsis : \n\nThe remote Windows host contains a mail client that is affected by multiple<br />

vulnerabilities.\n\nThe installed version of Thunderbird is earlier than 2.0.0.18. Such<br />

versions are potentially affected by the following security issues : \n\n\n - The canvas<br />

element can be used in conjunction with an HTTP redirect to bypass same-origin<br />

restrictions and gain access to the content in arbitrary images from other domains. (MFSA<br />

2008-48)\n - By tampering with the window.__proto__.__proto__ object, one can cause the<br />

browser to place a lock on a non-native object, leading to a crash and possible code<br />

execution. (MFSA 2008-50)\n - There are several stability bugs in the browser engine that<br />

may lead to crashes with evidence of memory corruption. (MFSA 2008-52)\n - Crashes and<br />

remote code execution in nsFrameManager are possible by modifying certain properties of<br />

a file input element before it has finished initializing. (MFSA 2008-55)\n - The same-origin<br />

check in 'nsXMLHttpRequest: : NotifyEventListeners()' can be bypassed. (MFSA<br />

Family Internet Services 1253

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!