27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running a version of Mozilla Firefox earlier than<br />

3.0.19. Such versions are potentially affected by multiple security issues : \n\n - Multiple<br />

crashes can result in arbitrary code execution. (MFSA 2010-16)\n\n - A select event<br />

handler for XUL tree items can be called after the item is deleted. (MFSA 2010-17)\n\n -<br />

An error exists in the way '' elements are inserted into a XUL tree ''.<br />

(MFSA 2010-18)\n\n - An error exists in the implementation of the<br />

'windows.navigator.plugins' object. (MFSA 2010-19)\n\n - A browser applet can be used to<br />

turn a simple mouse click into a drag-and-drop action, potentially resulting in the<br />

unintended loading of resources in a user's browser. (MFSA 2010-20)\n\n - The<br />

XMLHttpRequestSpy module in the Firebug add-on exposes an underlying chrome<br />

privilege escalation vulnerability. (MFSA 2010-21)\n\nFor your information, the observed<br />

version of Firefox is: \n %L<br />

Solution: Upgrade to Mozilla Firefox 3.0.19 or later.<br />

CVE-2010-0179<br />

Mozilla Firefox < 3.5.9 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5494 FAMILY: Web Clients RISK: HIGH NESSUS ID:45393<br />

Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running a version of Mozilla Firefox earlier than<br />

3.5.9. Such versions are potentially affected by multiple security issues : \n\n - Multiple<br />

crashes can result in arbitrary code execution. (MFSA 2010-16)\n\n - A select event<br />

handler for XUL tree items can be called after the item is deleted. (MFSA 2010-17)\n\n -<br />

An error exists in the way '' elements are inserted into a XUL tree ''.<br />

(MFSA 2010-18)\n\n - An error exists in the implementation of the<br />

'windows.navigator.plugins' object. (MFSA 2010-19)\n\n - A browser applet can be used to<br />

turn a simple mouse click into a drag-and-drop action, potentially resulting in the<br />

unintended loading of resources in a user's browser. (MFSA 2010-20)\n\n Session<br />

renegotiations are not handled properly, which can be exploited to insert arbitrary plaintext<br />

by a man-in-the-middle. (MFSA 2010-22)\n\n - When an image points to a resource that<br />

redirects to a 'mailto: ' URL, the external mail handler application is launched. (MFSA<br />

2010-23)\n\n - XML documents fail to call certain security checks when loading new<br />

content. (MFSA 2010-24)\n\nFor your information, the observed version of Firefox is: \n<br />

%L \nIAVA Reference : 2011-A-0107\nIAVB Reference : 2012-B-0038\nSTIG Finding<br />

Severity : Category I<br />

Solution: Upgrade to Mozilla Firefox 3.5.9 or later.<br />

CVE-2010-0182<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla SeaMonkey < 2.0.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5495 FAMILY: Web Clients RISK: HIGH NESSUS ID:45395<br />

Family Internet Services 1469

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!