27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE-2004-2761<br />

SSL Certificate Signed Using Weak Hashing Algorithm<br />

<strong>PVS</strong> ID: 4804 FAMILY: Generic RISK: LOW NESSUS ID:35291<br />

Description: Synopsis :\n\nThe SSL certificate has been signed using a weak hash algorithm -<br />

MD4\n\nThe remote service uses an SSL certificate that has been signed using a<br />

cryptographically weak hashing algorithm - MD4. These algorithms are known to be<br />

vulnerable to collision attacks. In theory, a determined attacker may be able to leverage this<br />

weakness to generate another certificate with the same digital signature, which could allow<br />

him to masquerade as the affected service.<br />

Solution: Contact the Certificate Authority to have the certificate reissued.<br />

CVE-2004-2761<br />

SSL Certificate Signed Using Weak Hashing Algorithm<br />

<strong>PVS</strong> ID: 4805 FAMILY: Generic RISK: LOW NESSUS ID:35291<br />

Description: Synopsis :\n\nThe SSL certificate has been signed using a weak hash algorithm -<br />

MD2\n\nThe remote service uses an SSL certificate that has been signed using a<br />

cryptographically weak hashing algorithm - MD2. These algorithms are known to be<br />

vulnerable to collision attacks. In theory, a determined attacker may be able to leverage this<br />

weakness to generate another certificate with the same digital signature, which could allow<br />

him to masquerade as the affected service.<br />

Solution: Contact the Certificate Authority to have the certificate reissued.<br />

CVE-2004-2761<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Thunderbird < 2.0.0.19 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4806 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:35287<br />

Description: Synopsis : \n\nThe remote Windows host contains a mail client that is affected by multiple<br />

vulnerabilities.\n\nThe installed version of Thunderbird is earlier than 2.0.0.19. Such<br />

versions are potentially affected by the following security issues : \n\n - There are several<br />

stability bugs in the browser engine that may lead to crashes with evidence of memory<br />

corruption. (MFSA 2008-60)\n\n - XBL bindings can be used to read data from other<br />

domains. (MFSA 2008-61)\n\n - Sensitive data may be disclosed in an XHR response when<br />

an XMLHttpRequest is made to a same-origin resource, which 302 redirects to a resource<br />

in a different domain. (MFSA 2008-64)\n\n - A website may be able to access a limited<br />

amount of data from a different domain by loading a same-domain JavaScript URL that<br />

redirects to an off-domain target resource containing data that is not parsable as JavaScript.<br />

(MFSA 2008-65)\n\n - Errors arise when parsing URLs with leading whitespace and<br />

control characters. (MFSA 2008-66)\n\n - An escaped null byte is ignored by the CSS<br />

parser and treated as if it was not present in the CSS input string. (MFSA 2008-67)\n\n -<br />

XSS and JavaScript privilege escalation are possible. (MFSA 2008-68)\n\nThe reported<br />

Family Internet Services 1268

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!