27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Cisco Phone Server Detection (SCCP)<br />

<strong>PVS</strong> ID: 4963 FAMILY: Generic RISK: INFO NESSUS ID:22877<br />

Description: Synopsis :\n\nThe remote server supports the Skinny protocol.\n\nThe remote server is an<br />

H.323 proxy that understands the Skinny protocol, also known as SCCP, for 'Skinny Client<br />

Control Protocol'. Skinny is Cisco's proprietary lightweight terminal control protocol used<br />

by some VoIP phones to communicate with Cisco CallManager or Asterisk PBX systems.<br />

Solution: N/A<br />

CVE Not available<br />

Mozilla Thunderbird < 2.0.0.21 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4964 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:35977<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe installed<br />

version of Thunderbird is earlier than 2.0.0.21. Such versions are potentially affected by the<br />

following security issues : \n\n - There are several stability bugs in the browser engine that<br />

may lead to crashes with evidence of memory corruption. (MFSA 2009-01)\n\n - By<br />

exploiting stability bugs in the browser engine, it might be possible for an attacker to<br />

execute arbitrary code on the remote system under certain conditions. (MFSA 2009-07)\n\n<br />

- It may be possible for a website to read arbitrary XML data from another domain by using<br />

nsIRDFService and a cross-domain redirect. (MFSA 2009-09)\n\n - Vulnerabilities in the<br />

PNG libraries used by Mozilla could be exploited to execute arbitrary code on the remote<br />

system. (MFSA 2009-10)\n\nThe reported version of Thunderbird is: \n %L<br />

Solution: Upgrade to version 2.0.0.21 or higher.<br />

CVE-2009-0776<br />

SeaMonkey < 1.1.15 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4965 FAMILY: Web Clients RISK: HIGH NESSUS ID:35978<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe installed<br />

version of SeaMonkey is earlier than 1.1.15. Such versions are potentially affected by the<br />

following security issues : \n\n - There are several stability bugs in the browser engine that<br />

may lead to crashes with evidence of memory corruption. (MFSA 2009-01)\n\n - Cookies<br />

marked HTTPOnly are readable by JavaScript via the<br />

'XMLHttpRequest.getResponseHeader' and 'XMLHttpRequest.getAllResponseHeaders'<br />

APIs. (MFSA 2009-05)\n\n - By exploiting stability bugs in the browser engine, it might be<br />

possible for an attacker to execute arbitrary code on the remote system under certain<br />

conditions. (MFSA 2009-07)\n\n - It may be possible for a website to read arbitrary XML<br />

data from another domain by using nsIRDFService and a cross-domain redirect. (MFSA<br />

2009-09)\n\n - Vulnerabilities in the PNG libraries used by Mozilla could be exploited to<br />

execute arbitrary code on the remote system. (MFSA 2009-10) \n\nThe reported version of<br />

SeaMonkey is: \n %L<br />

Solution: Upgrade to version 1.1.15 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1311

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!