27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors\n\nThe installed<br />

version of Thunderbird is earlier than 2.0.0.22. Such versions are potentially affected by the<br />

following security issues :\n\n - Multiple remote memory corruption vulnerabilities exist<br />

which can be exploited to execute arbitrary code in the context of the user running the<br />

affected application. (MFSA 2009-14)\n\n - A flaw may exist where Unicode box drawing<br />

characters are allowed in Internationalized Domain Names where they could be visually<br />

confused with punctuation used in valid web addresses. An attacker can leverage this to<br />

launch a phishing-type scam against a victim. (MFSA 2009-15)\n\n - A vulnerability exists<br />

when the 'jar:' scheme is used to wrap a URI which serves the content with<br />

'Content-Disposition: attachment'. An attacker can leverage this to subvert sites which use<br />

this mechanism to mitigate content injection attacks. (MFSA 2009-16)\n\n - When an<br />

Adobe Flash file is loaded via the 'view-source:' scheme, the Flash plugin misinterprets the<br />

origin of the content as localhost. An attacker can leverage this to launch cross-site request<br />

forger attacks. It is also possible to exploit this to place cookie-like objects on victim's<br />

computers. (MFSA 2009-17)\n\n - A vulnerability exists which allows attackers to inject<br />

arbitrary scripts into sites via XBL bindings. This vulnerability requires the attacker to have<br />

the ability to embed third-party stylesheets into the site. (MFSA 2009-18)\n\n - Multiple<br />

remote code execution vulnerabilities exist caused by the creation of documents whose URI<br />

does not match the document's principle using XMLHttpRequest, as well as a flaw in the<br />

'XPCNativeWrapper.ToString' '__proto__' coming from the wrong scope. (MFSA<br />

2009-19)\n\n - A malicious MozSearch plugin could be created using a javascript: URI in<br />

the SearchForm value. An attacker can leverage this in order to inject code into arbitrary<br />

sites. (MFSA 2009-20)\n\n - An information disclosure vulnerability exists when saving the<br />

inner frame of a web page as a file when the outer page has POST data associated with it.<br />

(MFSA 2009-21)\n\n - A cross site scripting vulnerability exists when handling a Refresh<br />

header containing a javascript: URI. (MFSA 2009-22)" );<br />

Solution: Upgrade to Mozilla Thunderbird 2.0.0.22 or later.<br />

CVE-2009-1840<br />

MySQL 6.0 < 6.0.10 XPath Expression DoS<br />

<strong>PVS</strong> ID: 5002 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:36020<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a Denial of Service (DoS) attack\n\nThe<br />

version of MySQL 6.0 installed on the remote host is earlier than 6.0.10 and thus affected<br />

by a denial of service vulnerability. Specifically, a user can cause an assertion failure<br />

leading to a server crash by calling 'ExtractValue()' or 'UpdateXML()' using an XPath<br />

expression employing a scalar expression as a 'FilterExpr'. For your information, the<br />

reported version of MySQL is: \n %L<br />

Solution: Upgrade to MySQL Community Server version 6.0.10 or later.<br />

CVE-2009-0819<br />

MySQL Community Server Version Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5003 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1323

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!