27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe<br />

installed version of Firefox is earlier than 3.0.13/3.5.0. Such versions are<br />

reportedly potentially affected by the following security issues : \n\n - The browser<br />

can be fooled into trusting a malicious SSL server certificate with a null character<br />

in the host name. (MFSA 2009-42)\n\n - A heap overflow in the code that handles<br />

regular expressions in certificate names can lead to arbitrary code execution.<br />

(MFSA 2009-43)\n\nThe reported version of Firefox is: \n %L<br />

Solution: Upgrade to Firefox 3.5.0/3.0.13 or later.<br />

CVE-2009-2408<br />

Mozilla Firefox < 3.5.2/3.0.12 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5114 FAMILY: Web Clients RISK: HIGH NESSUS ID:40479<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe installed<br />

version of Mozilla Firefox is earlier than 3.5.2/3.0.12. Such versions are potentially<br />

affected by multiple issues : \n\n - A denial-of-service vulnerability when Firefox receives a<br />

reply from a SOCKS5 proxy which contains a DNS name longer than 15 characters.<br />

(CVE-2009-2470)\n\n - Multiple flaws exist in the 'libvorbis' library could lead to remote<br />

code execution. (CVE-2009-2663)\n\nThe reported version of Mozilla Firefox was: \n %L<br />

Solution: Upgrade to Mozilla Firefox 3.5.2/3.0.12 or later.<br />

CVE-2009-2663<br />

Mozilla Firefox < 3.0.13/3.5.2 Proxy Response DoS<br />

<strong>PVS</strong> ID: 5115 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe installed<br />

version of Firefox is earlier than 3.0.13/3.5.2. Such versions are reportedly affected by<br />

multiple memory corruption vulnerabilities. An attacker could exploit one of these issues to<br />

corrupt memory on the affected host and potentially run arbitrary code in the context of the<br />

user running the affected application. The reported version of Mozilla Firefox was: \n %L<br />

Solution: Upgrade to Mozilla Firefox 3.5.2/3.0.12 or later.<br />

CVE-2009-2664<br />

Mozilla Firefox 3.5 < 3.5.2 Proxy Response DoS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5116 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is affected by a privilege escalation vulnerability.\n\nThe<br />

installed version of Mozilla Firefox 3.5 is earlier than 3.5.2. Such versions are potentially<br />

affected by a privilege-escalation vulnerability. The issues exists when the browser with an<br />

add-on implementing a Content Policy opens pages that have a 'Link:' HTTP header. An<br />

attacker can exploit this issue to execute arbitrary JavaScript code with chrome<br />

privileges.\n%L<br />

Family Internet Services 1358

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!