27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

JavaScript privilege escalation are possible. (MFSA 2008-68)\n\n - XSS vulnerabilities in<br />

SessionStore may allow for violating the browser's same-origin policy and performing an<br />

XSS attack or running arbitrary JavaScript with chrome privileges. (MFSA<br />

2008-69)\n\nThe reported version of SeaMonkey is: \n %L<br />

Solution: Upgrade to version 1.1.14 or higher.<br />

CVE-2008-5513<br />

Barracuda Spam Firewall < 3.5.12.007 Multiple Vulnerabilities (SQLi, XSS)<br />

<strong>PVS</strong> ID: 4795 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:35224<br />

Description: Synopsis : \n\nThe remote web server contains CGI scripts that are affected by several<br />

issues.\n\nThe remote Barracuda Spam Firewall device is using a firmware version earlier<br />

than 3.5.12.007. Such versions reportedly are affected by several issues : \n\n - There is a<br />

SQL injection vulnerability involving the 'pattern_x' parameter (where x<br />

Solution: Update to firmware version 3.5.12.007 or higher.<br />

CVE-2008-1094<br />

Firefox < 2.0.0.20 Cross-Domain Data Theft<br />

<strong>PVS</strong> ID: 4796 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:35251<br />

Description: Synopsis : \n\nThe remote Windows host contains a web browser that is affected by a<br />

cross-domain data theft vulnerability.\n\nThe installed version of Firefox is earlier than<br />

2.0.0.20. Such versions shipped without a fix for a security issue that was reportedly fixed<br />

in version 2.0.0.19. Specifically : \n\n - A website may be able to access a limited amount<br />

of data from a different domain by loading a same-domain JavaScript URL which redirects<br />

to an off-domain target resource containing data that is not parsable as JavaScript. (MFSA<br />

2008-65)\n\nNote that Mozilla is not planning further security / stability updates for Firefox<br />

2.x.\n\nThe reported version of Firefox is: \n %L<br />

Solution: Upgrade to version 2.0.0.20 or higher.<br />

CVE-2008-5507<br />

Kerio MailServer < 6.6.2 (KSEC-2008-12-16-01) Multiple XSS<br />

<strong>PVS</strong> ID: 4797 FAMILY: SMTP Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:35258<br />

Description: Synopsis : \n\nThe remote mail server is affected by several cross-site scripting<br />

vulnerabilities.\n\nAccording to its banner, the remote host is running a version of Kerio<br />

MailServer prior to 6.6.2. Multiple files in such versions are reportedly affected by<br />

cross-site scripting vulnerabilities.\n\n - The application fails to sanitize input to the 'folder'<br />

parameter of the 'mailCompose.php' script as well as the 'daytime' parameter of the<br />

Family Internet Services 1265

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!