27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running a version of Mozilla SeaMonkey earlier than<br />

2.0.4. Such versions are potentially affected by multiple security issues : \n\n - Multiple<br />

crashes can result in arbitrary code execution. (MFSA 2010-16)\n\n - A select event<br />

handler for XUL tree items can be called after the item is deleted. (MFSA 2010-17)\n\n -<br />

An error exists in the way '' elements are inserted into a XUL tree ''.<br />

(MFSA 2010-18)\n\n - An error exists in the implementation of the<br />

'windows.navigator.plugins' object. (MFSA 2010-19)\n\n - A browser applet can be used to<br />

turn a simple mouse click into a drag-and-drop action, potentially resulting in the<br />

unintended loading of resources in a user's browser. (MFSA 2010-20)\n\n Session<br />

renegotiations are not handled properly, which can be exploited to insert arbitrary plaintext<br />

by a man-in-the-middle. (MFSA 2010-22)\n\n - When an image points to a resource that<br />

redirects to a 'mailto: ' URL, the external mail handler application is launched. (MFSA<br />

2010-23)\n\n - XML documents fail to call certain security checks when loading new<br />

content. (MFSA 2010-24)\n\nFor your information, the observed version of SeaMonkey is:<br />

\n %L \nIAVA Reference : 2011-A-0107\nIAVB Reference : 2012-B-0038\nSTIG Finding<br />

Severity : Category I<br />

Solution: Upgrade to Mozilla SeaMonkey 2.0.4 or later.<br />

CVE-2010-0182<br />

Mozilla Thunderbird < 3.0.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5496 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:45394<br />

Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running a version of Mozilla Thunderbird earlier than<br />

3.0.4. Such versions are potentially affected by multiple security issues : \n\n - Multiple<br />

crashes can result in arbitrary code execution. (MFSA 2010-16)\n\n - A select event<br />

handler for XUL tree items can be called after the item is deleted. (MFSA 2010-17)\n\n -<br />

An error exists in the way '' elements are inserted into a XUL tree ''.<br />

(MFSA 2010-18)\n\n Session renegotiations are not handled properly, which can be<br />

exploited to insert arbitrary plaintext by a man-in-the-middle. (MFSA 2010-22)\n\n - XML<br />

documents fail to call certain security checks when loading new content. (MFSA<br />

2010-24)\n\nFor your information, the observed version of Thunderbird is: \n %L \nIAVA<br />

Reference : 2011-A-0107\nIAVB Reference : 2012-B-0038\nSTIG Finding Severity :<br />

Category I<br />

Solution: Upgrade to Mozilla Thunderbird 3.0.4 or later.<br />

CVE-2010-0182<br />

DNS Generic Query Detection<br />

<strong>PVS</strong> ID: 5497 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: DNS query for:<br />

realtimeonly<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1470

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!