27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CVE-2010-1795<br />

QuickTime < 7.6.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5492 FAMILY: Web Clients RISK: HIGH NESSUS ID:45388<br />

Description: Synopsis : \n\nThe remote host contains an application that is vulnerable to multiple attack<br />

vectors.\n\nThe version of QuickTime installed on the remote host is older than 7.6.6. Such<br />

versions contain several vulnerabilities : \n\n - A heap buffer overflow in QuickTime's<br />

handling of PICT images may lead to an application crash or arbitrary code execution.<br />

(CVE-2009-2837)\n\n - A memory corruption issue in QuickTime's handling of QDM2<br />

encoded audio content may lead to an application crash or arbitrary code execution.<br />

(CVE-2010-0059)\n\n - A memory corruption issue in QuickTime's handling of QDMC<br />

encoded audio content may lead to an application crash or arbitrary code execution.<br />

(CVE-2010-060)\n\n - A heap buffer overflow in QuickTime's handling of H.263 encoded<br />

movie file may lead to an application crash or arbitrary code execution.<br />

(CVE-2010-0062)\n\n - A heap buffer overflow in QuickTime's handling of H.261 encoded<br />

movie files may lead to an application crash or arbitrary code execution.<br />

(CVE-2010-0514)\n\n - A memory corruption issue in QuickTime's handling of H.264<br />

encoded movie files may lead to an application crash or arbitrary code execution.<br />

(CVE-2010-0515)\n\n - A heap buffer overflow in QuickTime's handling of RLE encoded<br />

movie files may lead to an application crash or arbitrary code execution.<br />

(CVE-2010-0516)\n\n - A heap buffer overflow in QuickTime's handling of M-JPEG<br />

encoded movie files may lead to an application crash or arbitrary code execution.<br />

(CVE-2010-0517)\n\n - A memory corruption issue in QuickTime's handling of Sorensen<br />

encoded movie files may lead to an application crash or arbitrary code execution.<br />

(CVE-2010-0518)\n\n - An integer overflow in QuickTime's handling of FlashPix encoded<br />

movie files may lead to an application crash or arbitrary code execution.<br />

(CVE-2010-0519)\n\n - A heap buffer overflow in QuickTime's handling of FLC encoded<br />

movie files may lead to an application crash or arbitrary code execution.<br />

(CVE-2010-0520)\n\n - A heap buffer overflow in QuickTime's handling of MPEG<br />

encoded movie files may lead to an application crash or arbitrary code execution.<br />

(CVE-2010-0526)\n\n - An integer overflow in QuickTime's handling of PICT images may<br />

lead to an application crash or arbitrary code execution. (CVE-2010-0527)\n\n - A memory<br />

corruption issue in QuickTime's handling of color tables in movie files may lead to an<br />

application crash or arbitrary code execution. (CVE-2010-0528)\n\n - A heap buffer<br />

overflow in QuickTime's handling of PICT images may lead to an application crash or<br />

arbitrary code execution. (CVE-2010-0529)\n\n - A memory corruption issue in<br />

QuickTime's handling of BMP images may lead to an application crash or arbitrary code<br />

execution. (CVE-2010-0536)\n\nFor your information, the observed version of QuickTime<br />

is: \n %L<br />

Solution: Upgrade to QuickTime 7.6.6 or later.<br />

CVE-2010-0536<br />

Mozilla Firefox < 3.0.19 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5493 FAMILY: Web Clients RISK: HIGH NESSUS ID:45392<br />

Family Internet Services 1468

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!