27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

Opera installed on the remote host is earlier than 10.01. Such versions are potentially<br />

affected by multiple vulnerabilities : \n\n - Specially crafted domain names can cause a<br />

memory corruption in Opera, which may lead to a crash or possibly remote code execution.<br />

(938)\n\n - Opera may allow scripts to run on the feed subscription page, thereby gaining<br />

access to the feeds object. (939)\n\n - In some cases, a Web font intended to be used for<br />

page content could be incorrectly used by Opera to render parts of the user interface,<br />

including the address field. (940)\n\nFor your information, the observed version of Opera<br />

is: \n %L<br />

Solution: Upgrade to Opera 10.01 or later.<br />

CVE-2009-3832<br />

Mozilla Firefox < 3.0.15 / 3.5.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5218 FAMILY: Web Clients RISK: HIGH NESSUS ID:42306<br />

Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host has a version of Mozilla Firefox earlier than 3.0.15 /<br />

3.5.4 installed. Such versions are potentially affected by multiple vulnerabilities : \n\n - A<br />

user's form history, both from web content as well as the smart location bar, was vulnerable<br />

to theft. (MFSA 2009-52)\n\n - The file naming scheme used for downloading a file which<br />

already exists in the download folder is predictable. An attacker with local access could<br />

exploit this to trick the browser into opening the incorrect downloaded file. (MFSA<br />

2009-53)\n\n - Recursive creation of JavaScript web-workers can be used to create a set of<br />

objects whose memory could be freed prior to their use. Note that this only affects Firefox<br />

3.5.x. (MFSA 2009-54)\n\n - A flaw exists in the parsing of regular expressions used in<br />

Proxy Auto-configuration (PAC) files. (MFSA 2009-55)\n\n - A heap-based overflow<br />

exists in Mozilla's GIF image parser. (MFSA 2009-56)\n\n - The XPCOM utility<br />

'XPCVariant: : VariantDataToJS' unwrapped doubly-wrapped objects before returning<br />

them to chrome callers which could lead to chrome privileged code calling methods on an<br />

object which had previously been created or modified by web content. (MFSA<br />

2009-57)\n\n - A heap-based overflow exists in Mozilla's string to floating point number<br />

conversion routines. (MFSA 2009-59)\n\n - The text within a selection on a web page can<br />

be read by JavaScript in a different domain using the 'document.getSelection' function,<br />

violating the same-origin policy. (MFSA 2009-61)\n\n - When downloading a file<br />

containing a right-to-left override character (RTL) in the filename, the name displayed in<br />

the dialog title bar conflicts with the name of the file shown in the dialog body. (MFSA<br />

2009-62)\n\n - Multiple memory safety and stability bugs exist in the 'liboggz', 'libvorbis',<br />

and 'liboggplay' libraries. Note that this issue only affects Firefox 3.5.x. (MFSA<br />

2009-63)\n\n - Several memory corruption issues exist in the browser engine. (MFSA<br />

2009-64)\n\nFor your information, the observed version of Mozilla Firefox is: \n %L<br />

Solution: Upgrade to Mozilla Firefox 3.0.15, 3.5.4, or later.<br />

CVE-2009-3383<br />

Mozilla SeaMonkey < 2.0 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1390

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!