27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE-2008-5911<br />

Google Chrome < 1.0.154.46 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4920 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:35558<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is affected by multiple<br />

vulnerabilities.\n\nThe version of Google Chrome installed on the remote host is earlier<br />

than 1.0.154.46. Such versions are reportedly affected by several issues : \n\n - Cross-site<br />

scripting vulnerabilities in the Adobe Reader Plugin itself could be leveraged using a PDF<br />

document to run scripts on arbitrary sites via Google Chrome. (CVE-2007-0048 and<br />

CVE-2007-0045)\n\n - A cross-domain security bypass vulnerability that could allow an<br />

attacker to bypass the same-origin policy and gain access to potentially sensitive<br />

information. (CVE-2009-0276)\n\nThe reported version of Google Chrome is: \n %L<br />

Solution: Upgrade to version 1.0.154.46 or higher.<br />

CVE-2009-0411<br />

Bugzilla < 3.2.1/3.3.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4921 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors\n\nThe remote<br />

Bugzilla software is vulnerable to several flaws. First, valid users can post content in<br />

HTML or JavaScript. Given this, other users viewing the content may have malicious code<br />

executed within their browser. Second, the 'process_bug.cgi' script is vulnerable to a<br />

cross-site request forgery (CSRF) flaw. An attacker exploiting this flaw would need to be<br />

able to entice a valid user into clicking a link or opening a malicious HTML email.<br />

Successful exploitation would result in the attacker executing commands with the<br />

permissions of the valid user account. The reported version of Bugzilla is: \n %L \n<br />

Solution: Upgrade to version 3.2.1, 3.3.2 or higher.<br />

CVE-2009-0485<br />

Firefox < 3.0.6 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4922 FAMILY: Web Clients RISK: HIGH NESSUS ID:35581<br />

Description: Synopsis : \n\nThe remote Windows host contains a web browser that is affected by<br />

multiple vulnerabilities.\n\nThe installed version of Firefox is earlier than 3.0.6. Such<br />

versions are potentially affected by the following security issues : \n\n - There are several<br />

stability bugs in the browser engine that may lead to crashes with evidence of memory<br />

corruption. (MFSA 2009-01)\n\n - A chrome XBL method can be used in conjunction with<br />

'window.eval' to execute arbitrary JavaScript within the context of another website,<br />

violating the same origin policy. (MFSA 2009-02)\n\n - A form input control's type could<br />

be changed during the restoration of a closed tab to the path of a local file whose location<br />

was known to the attacker. (MFSA 2009-03)\n\n - An attacker may be able to inject<br />

Family Internet Services 1298

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!