27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: The remote host is an NFS server hosting the following file:\n%P<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Firefox < 3.0.11 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5072 FAMILY: Web Clients RISK: HIGH NESSUS ID:39372<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is susceptible to multiple attack<br />

vectors.\n\nThe installed version of Firefox is earlier than 3.0.11. Such versions are<br />

potentially affected by the following security issues : \n\n - Multiple memory corruption<br />

vulnerabilities could potentially be exploited to execute arbitrary code. (MFSA<br />

2009-24)\n\n - Certain invalid Unicode characters, when used as a part of IDN, can be<br />

displayed as a whitespace in the location bar. An attacker can exploit this vulnerability to<br />

spoof the location bar. (MFSA 2009-25)\n\n - It may be possible for local resources loaded<br />

via 'file: ' protocol to access any domain's cookies saved on a user's system. (MFSA<br />

2009-26)\n\n - It may be possible to tamper with SSL date via non-200 responses to proxy<br />

CONNECT requests. (MFSA 2009-27)\n\n - A race condition exists in<br />

'NPObjWrapper_NewResolve' when accessing the properties of a NPObject, a wrapped<br />

JSObject. (MFSA 2009-28)\n\n - If the owner document of an element becomes a null after<br />

garbage collection, then it may be possible to execute the event listeners within the wrong<br />

JavaScript context. An attacker can potentially exploit this vulnerability to execute arbitrary<br />

JavaScript with chrome privileges. (MFSA 2009-29)\n\n - When the 'file: ' resource is<br />

loaded from the location bar, the resource inherits principal of the previously loaded<br />

document. This could potentially allow unauthorized access to local files.<br />

(MFSA-2009-30)\n\n - While loading external scripts into XUL documents content-loading<br />

policies are not checked. (MFSA 2009-31)\n\n - It may also be possible for scripts from<br />

page content to run with elevated privileges. (MFSA 2009-32)\n\n For your information,<br />

the reported version of Firefox is : \n %L<br />

Solution: Upgrade to Firefox 3.0.11 or later.<br />

CVE-2009-1841<br />

ClamAV < 0.95.2 File Scan Evasion<br />

<strong>PVS</strong> ID: 5073 FAMILY: Web Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is running an anti-virus application that is affected by a file<br />

scan evasion vulnerability.\n\nAccording to its version, the clamd anti-virus daemon on the<br />

remote host is earlier than 0.95.2. Such versions are reportedly affected by a file scan<br />

evasion vulnerability. An attacker could exploit this flaw by embedding malicious code in a<br />

specially crafted 'CAB', 'RAR', or 'ZIP' archive in order to bypass the anti-virus software.<br />

For your information, the reported version of ClamAV on the remote host is: \n %L<br />

Family Internet Services 1344

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!