27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE-2010-1349<br />

Mozilla Firefox < 3.6.2 Multiple Vulnerabilities.<br />

<strong>PVS</strong> ID: 5485 FAMILY: Web Clients RISK: HIGH NESSUS ID:45133<br />

Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running a version of Mozilla Firefox 3.6.x earlier than<br />

3.6.2. Such versions are potentially affected by multiple security issues : \n\n - The WOFF<br />

decoder contains an integer overflow in a font decrompression routine. (MFSA<br />

2010-08)\n\n - Deleted image frames are reused when handling 'multipart/x-mixed-replace'<br />

images. (MFSA 2010-09)\n\n - The 'window.location' object is made a normal overridable<br />

object. (MFSA 2010-10)\n\n - Multiple crashes can result in arbitrary code execution.<br />

(MFSA 2010-11)\n\n - A cross-site scripting issue when using 'addEventListener' and<br />

'setTimeout' on a wrapped object. (MFSA 2010-12)\n\n - Documents fail to call certain<br />

security checks when attempting to preload images. (MFSA 2010-13)\n\n - It is possible to<br />

corrupt a user's XUL cache. (MFSA 2010-14)\n\n - The asynchronous Authorization<br />

Prompt is not always attached to the correct window. (MFSA 2010-15)\n\n - Multiple<br />

crashes cna result in arbitrary code execution. (MFSA 2010-16)\n\n - An error exists in the<br />

way '' elements are inserted into a XUL tree ''. (MFSA 2010-18)\n\n -<br />

An error exists in the implementation of the 'windows.navigator.plugins' object. (MFSA<br />

2010-19)\n\n - A browser applet can be used to turn a simple mouse click into a<br />

drag-and-drop action, potentially resulting in the unintended loading of resources in a user's<br />

browser. (MFSA 2010-20)\n\n - Session renegotiations are not handled properly, which can<br />

be exploited to insert arbitrary plaintext by a man-in-the-middle. (MFSA 2010-22)\n\n -<br />

When an image points to a resource that redirects to a 'mailto: ' URL, the external mail<br />

handler application is launched. (MFSA 2010-23)\n\n - XML documents fail to call certain<br />

security checks when loading new content. (MFSA 2010-24)\n\nFor your information, the<br />

observed version of Firefox is: \n %L<br />

Solution: Upgrade to Mozilla Firefox 3.6.2 or later.<br />

CVE-2010-1028<br />

Serv-U < 9.4.0.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5486 FAMILY: FTP Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:45140<br />

Description: Synopsis : \n\nThe remote FTP server is vulnerable to multiple attack vectors.\n\nThe<br />

remote host is running Serv-U File Server, an FTP server for Windows. According to its<br />

banner, the installed version of Serv-U is earlier than 9.4.0.0, and is therefore potentially<br />

affected by the following issues : \n\n - When importing users, restricted administrators<br />

could create user accounts outside their home directory.\n\n - When exporting users,<br />

restricted administrators could see a user's full path for home directory, virtual paths, and<br />

directory access rules.\n\n - A restricted domain administrator could create a user or group<br />

that was not locked in the user's home directory.\n\n - A denial of service issue when<br />

handling a large number of concurrent HTTP requests.\n\nFor your information, the<br />

observed version of Serv-U is: \n %L<br />

Solution: Upgrade to Serv-U version 9.4.0.0 or later.<br />

Family Internet Services 1465

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!