27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

the ability to embed third-party stylesheets into the site. (MFSA 2009-18)\n\n - Multiple<br />

remote code execution vulnerabilities exist caused by the creation of documents whose URI<br />

does not match the document's principle using XMLHttpRequest, as well as a flaw in the<br />

'XPCNativeWrapper.ToString' '__proto__' coming from the wrong scope. (MFSA<br />

2009-19)\n\n - A malicious MozSearch plugin could be created using a JavaScript: URI in<br />

the SearchForm value. An attacker can leverage this in order to inject code into arbitrary<br />

sites. (MFSA 2009-20)\n\n - An information disclosure vulnerability exists when saving the<br />

inner frame of a web page as a file when the outer page has POST data associated with it.<br />

(MFSA 2009-21)\n\n - A cross site scripting vulnerability exists when handling a Refresh<br />

header containing a JavaScript: URI. (MFSA 2009-22)" );<br />

Solution: Upgrade to version 3.0.9 or higher.<br />

NTOP <<br />

CVE-2009-1312<br />

<strong>PVS</strong> ID: 4999 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a local flaw in the way that it creates log<br />

files.\n\nThe remote host is running NTOP, a tool for viewing network configuration,<br />

usage, statistics, protocols and more via a web interface. This version of NTOP is reported<br />

to be prone to a local exploit. Specifically, a local attacker can overwrite the 'access' log<br />

file. The remote host is only vulnerable if the NTOP service has been started with the<br />

'--access-log-file' and '-d' option. The reported version of NTOP is: \n %L \n<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

BlackBerry Enterprise Server < 4.1.6 MR5 XSS<br />

<strong>PVS</strong> ID: 5000 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running the Blackberry Enterprise Server version: \n %L \n\nThis version is<br />

reportedly vulnerable to a cross-site scripting flaw due to the way that it handles<br />

user-supplied input. An attacker exploiting this flaw would need to be able to convince a<br />

user to click on a link. Successful exploitation would result in the attacker executing<br />

arbitrary script code within the browser of the user. \nIAVT Reference :<br />

2009-T-0023\nSTIG Finding Severity : Category II<br />

Solution: Upgrade to version 4.1.6 MR5 (4.1.6.5) or higher.<br />

CVE-2009-0307<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Thunderbird < 2.0.0.21 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5001 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1322

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!