27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: Upgrade to OpenOffice version 3.2 or later.<br />

CVE-2009-3302<br />

Squid < 3.0STABLE24 HTCP Request Denial of Service<br />

<strong>PVS</strong> ID: 5340 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:45591<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a Denial of Service (DoS)<br />

attack.\n\nAccording to its banner, the version of Squid proxy caching server installed on<br />

the remote host is 2.x or 3.0.x earlier than 3.0.STABLE24. Such versions are potentially<br />

affected by a denial-of-service vulnerability due to incorrect processing of specially crafted<br />

HTCP packets. For your information, the observed version of Squid is: \n %L<br />

Solution: Either upgrade to Squid version 3.0.STABLE24 or later, or apply the patch referenced in<br />

the project's advisory above.<br />

CVE-2010-0639<br />

Novell eDirectory < 8.8 SP5 Patch 3 eMBox SOAP Request DoS<br />

<strong>PVS</strong> ID: 5341 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:44938<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a denial of service attack.\n\nThe remote<br />

host is running eDirectory, a directory service software from Novell. The eMBox service<br />

included with the installed version of eDirectory is affected by a denial of service<br />

vulnerability. By sending a specially crafted HTTP SOAP request, it may be possible for a<br />

remote attacker to crash the remote service. For your information, the observed version of<br />

eDirectory is: \n %L<br />

Solution: Upgrade to eDirectory 8.8 SP5 Patch 3 or later.<br />

CVE-2010-0666<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Firefox < 3.0.18 / 3.5.8 / 3.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5342 FAMILY: Web Clients RISK: HIGH NESSUS ID:44659<br />

Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running a version of Mozilla Firefox earlier than<br />

3.0.18, 3.5.8, 3.6. Such versions are potentially affected by multiple vulnerabilities : \n\n -<br />

Several crashes can result in arbitrary code execution. (MFSA 2010-01)\n\n - The<br />

implementation of 'Web Workers' contains an error in its handling of array data types when<br />

processing posted messages. (MFSA 2010-02)\n\n - The HTML parser incorrectly frees<br />

used memory when insufficient space is available to process remaining input. (MFSA<br />

2010-03)\n\n - A cross-site scripting issue due to 'window.dialogArguments' being readable<br />

cross-domain. (CVE-2010-04)\n\n - A cross-site scripting issue when using SVG<br />

documents and binary Content-Type. (MFSA 2010-05)\n\n - Multiple crashes can result in<br />

Family Internet Services 1430

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!