27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe<br />

remote host is an iPhone, iPod Touch, or iPad running iOS. For your information,<br />

the observed version of iOS is %L.\n\nVersions of iOS earlier than 4.0 are<br />

potentially affected by multiple vulnerabilities. iOS 4.0 contains security fixes for<br />

the following products :\n\n - Application Sandbox\n\n - CF<strong>Network</strong>\n\n -<br />

ImageIO\n\n - LibSystem\n\n - libxml\n\n - Passcode Lock\n\n - Safari\n\n -<br />

Settings\n\n - WebKit<br />

Solution: Upgrade to iOS 4.0 or later.<br />

CVE-2010-2660<br />

Firefox < 3.5.10 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5579 FAMILY: Web Clients RISK: HIGH NESSUS ID:47123<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Firefox is %L.\n\nVersions<br />

of Firefox earlier than 3.5.10 are potentially affected by multiple vulnerabilities :\n\n - A<br />

re-use of a freed object due to scope confusion. (MFSA 2010-25)\n\n - Multiple crashes can<br />

result in code execution. (MFSA 2010-26)\n\n - A use-after-free error in<br />

nsCycleCollector::MarkRoots(). (MFSA 2010-27)\n\n - Freed object reuse across plugin<br />

instances. (MFSA 2010-28)\n\n - A heap buffer overflow in<br />

nsGenericDOMDataNode::SetTextInternal. (MFSA 2010-29)\n\n - An integer overflow in<br />

XSLT node sorting. (MFSA 2010-30)\n\n The focus() behavior can be used to inject or<br />

steal keystrokes. (MFSA 2010-31)\n\n- The 'Content-Disposition: attachment' HTTP<br />

header is ignored when 'Content-Type: multipart' is also present. (MFSA 2010-32)\n\nIt is<br />

possible to reverse engineer the value used to seed Math.random(). (MFSA 2008-33)<br />

Solution: Upgrade to Mozilla Firefox 3.5.10 or later.<br />

CVE-2010-1203<br />

Firefox 3.6.x < 3.6.4 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5580 FAMILY: Web Clients RISK: HIGH NESSUS ID:47124<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Firefox is %L.\n\nVersions<br />

of Firefox 3.6.x earlier than 3.6.4 are potentially affected by multiple vulnerabilities :\n\n -<br />

Multiple crashes can result in code execution. (MFSA 2010-26)\n\n - Freed object reuse<br />

across plugin instances. (MFSA 2010-28)\n\n - A heap buffer overflow in<br />

nsGenericDOMDataNode::SetTextInternal. (MFSA 2010-29)\n\n - An integer overflow in<br />

XSLT node sorting. (MFSA 2010-30)\n\n The focus() behavior can be used to inject or<br />

steal keystrokes. (MFSA 2010-31)\n\n- The 'Content-Disposition: attachment' HTTP<br />

header is ignored when 'Content-Type: multipart' is also present. (MFSA 2010-32)\n\nIt is<br />

possible to reverse engineer the value used to seed Math.random(). (MFSA 2008-33)<br />

Solution: Upgrade to Mozilla Firefox 3.6.4 or later.<br />

Family Internet Services 1497

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!