27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>PVS</strong> ID: 5219 FAMILY: Web Clients RISK: HIGH NESSUS ID:42307<br />

Description: Synopsis : \n\nThe remote host is running a web browser that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running a version of Mozilla SeaMonkey earlier than<br />

2.0. Such versions are potentially affected by multiple vulnerabilities : \n\n - A flaw exists<br />

in the parsing of regular expressions used in Proxy Auto-configuration (PAC) files. (MFSA<br />

2009-55)\n\n - A heap-based buffer overflow exists in Mozilla's GIF image parser. (MFSA<br />

2009-56)\n\n - When downloading a file containing a right-to-left override character (RTL)<br />

in the filename, the name displayed in the dialog title bar conflicts with the name of the file<br />

shown in the dialog body. (MFSA 2009-62)\n\nFor your information, the observed version<br />

of Mozilla SeaMonkey is: \n %L<br />

Solution: Upgrade to Mozilla SeaMonkey 2.0 or later.<br />

CVE-2009-3376<br />

MS09-061: Vulnerabilities in the Microsoft .NET Framework 1.1 Common Language Runtime Could<br />

Allow Remote Code Execution (974378)<br />

<strong>PVS</strong> ID: 5220 FAMILY: Web Servers RISK: HIGH NESSUS ID:42117<br />

Description: Synopsis :\n\nThe remote .NET Framework 1.1 is vulnerable to remote code execution<br />

attacks.\n\nThe remote host is running a version of the .NET Framework 1.1 which is<br />

potentially affected by multiple vulnerabilities :\n\n - A remote code execution<br />

vulnerability exists in the Microsoft .NET Framework that could allow a malicious<br />

Microsoft .NET Framework application to obtain a managed pointer to stack memory that<br />

is no longer used. (CVE-2009-0090)\n\n - A remote code execution vulnerability exists in<br />

the Microsoft .NET Framework that could allow a malicious Microsoft .NET application to<br />

bypass a type equality check. (CVE-2009-0091)\n\n - A remote code execution<br />

vulnerability exists in the Microsoft .NET Framework that can allow a malicious Microsoft<br />

.NET application to modify memory of the attacker's choice. (CVE-2009-2497)\n\nFor<br />

your information, the observed version of Microsoft .NET is\n%L<br />

Solution: Apply the patches referenced in Microsoft's security bulletin.<br />

CVE-2009-0091<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

MS09-061: Vulnerabilities in the Microsoft .NET Framework 2.0 Common Language Runtime Could<br />

Allow Remote Code Execution (974378)<br />

<strong>PVS</strong> ID: 5221 FAMILY: Web Servers RISK: HIGH NESSUS ID:42117<br />

Description: Synopsis :\n\nThe remote .NET Framework 2.0 is vulnerable to remote code execution<br />

attacks.\n\nThe remote host is running a version of the .NET Framework 2.0 which is<br />

potentially affected by multiple vulnerabilities :\n\n - A remote code execution<br />

vulnerability exists in the Microsoft .NET Framework that could allow a malicious<br />

Microsoft .NET Framework application to obtain a managed pointer to stack memory that<br />

is no longer used. (CVE-2009-0090)\n\n - A remote code execution vulnerability exists in<br />

the Microsoft .NET Framework that could allow a malicious Microsoft .NET application to<br />

bypass a type equality check. (CVE-2009-0091)\n\n - A remote code execution<br />

vulnerability exists in the Microsoft .NET Framework that can allow a malicious Microsoft<br />

Family Internet Services 1391

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!