27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host has a program that is affected by multiple<br />

vulnerabilities.\n\nThe version of OpenOffice installed on the remote host is earlier than<br />

3.2.1. Such version are affected by several issues :\n\n - There is a TLS/SSL renegotiation<br />

vulnerability in the included third-party OpenSSL library. (CVE-2009-3555)\n\n - There is<br />

a python scripting vulnerability which may lead to undesired code execution when using<br />

the OpenOffice scripting IDE. (CVE-2010-0395)\nIAVA Reference : 2011-A-0107\nIAVB<br />

Reference : 2012-B-0038\nSTIG Finding Severity : Category I<br />

Solution: Upgrade to OpenOffice version 3.2.1 or later.<br />

PHP Version Detection<br />

CVE-2010-0395<br />

<strong>PVS</strong> ID: 5565 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: N/A<br />

Solution: N/A<br />

CVE Not available<br />

Safari < 4.1 / 5.0 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5566 FAMILY: Web Clients RISK: HIGH NESSUS ID:46838<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Safari is %L.\n\nVersions of<br />

Safari earlier than 4.1 / 5.0 are potentially affected by multiple vulnerabilities :\n\n - A heap<br />

buffer overflow exists in the handling of images with an embedded ColorSync profile.<br />

(CVE-2009-1726)\n\n - Safari supports the inclusion of user information in URLs, which<br />

allows the URL to specify a username and password to authenticate the user to the named<br />

server. (CVE-2010-1384)\n\n - A use after free issue exists in Safari's management of<br />

windows. (CVE-2010-1750)\n\n - An implementation issue exists in WebKit's handling of<br />

URLs in the clipboard. (CVE-2010-1388)\n\n - Dragging or pasting a selection from one<br />

site to another may allow scripts contained in the selection to be executed in the context of<br />

the new site. (CVE-2010-1389)\n\n - A cononicalization issue exists in WebKit's handling<br />

of UTF-7 encoded text. (CVE-2010-1390)\n\n - A path traversal issue exists in WebKit's<br />

support for Local Storage and Web SQL database. (CVE-2010-1391)\n\n - A use after free<br />

issue exists in WebKit's rendering of HTML buttons. (CVE-2010-1392)\n\n - An<br />

information disclosure issue exists in WebKit's handling of Cascading Stylesheets.<br />

(CVE-2010-1393)\n\n - A use after free issue exists in WebKit's handling of attribute<br />

manipulation. (CVE-2010-1119)\n\n - A design issue exists in WebKit's handling of HTML<br />

document fragments. (CVE-2010-1394)\n\n - An implementation issue exists in WebKit's<br />

handling of keyboard focus. (CVE-2010-1422)\n\n - A scope management issue exists in<br />

WebKit's handling of DOM constructor objects. (CVE-2010-1395)\n\n - A use after free<br />

issue exists in WebKit's handling of the removal of container elements.<br />

(CVE-2010-1396)\n\n - A use after free issue exists in WebKit's rendering of a selection<br />

when the layout changes. (CVE-2010-1397)\n\n - A memory corruption issue exists in<br />

WebKit's handling of ordered list insertions. (CVE-2010-1398)\n\n - An uninitialized<br />

Family Internet Services 1491

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!