27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE-2010-1203<br />

SeaMonkey < 2.0.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5581 FAMILY: Web Clients RISK: HIGH NESSUS ID:47126<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of SeaMonkey is<br />

%L.\n\nVersions of SeaMonkey earlier than 2.0.5 are potentially affected by multiple<br />

vulnerabilities :\n\n A re-use of a freed object due to scope confusion. (MFSA 2010-25)\n\n<br />

- Multiple crashes can result in code execution. (MFSA 2010-26)\n\n - A use-after-free<br />

error in nsCycleCollector::MarkRoots(). (MFSA 2010-27)\n\n - Freed object reuse across<br />

plugin instances. (MFSA 2010-28)\n\n - A heap buffer overflow in<br />

nsGenericDOMDataNode::SetTextInternal. (MFSA 2010-29)\n\n - An integer overflow in<br />

XSLT node sorting. (MFSA 2010-30)\n\n The focus() behavior can be used to inject or<br />

steal keystrokes. (MFSA 2010-31)\n\n- The 'Content-Disposition: attachment' HTTP<br />

header is ignored when 'Content-Type: multipart' is also present. (MFSA 2010-32)\n\nIt is<br />

possible to reverse engineer the value used to seed Math.random(). (MFSA 2008-33)<br />

Solution: Upgrade to Mozilla SeaMonkey 2.0.5 or later.<br />

CVE-2010-1203<br />

Mozilla Thunderbird < 3.0.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5582 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:47125<br />

Description: Synopsis :\n\nThe remote host has an email client that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Thunderbird is %L.\n\nVersions<br />

of Thunderbird earlier than 3.0.5 are potentially affected by multiple vulnerabilities :\n\n -<br />

A re-use of a freed object due to scope confusion. (MFSA 2010-25)\n\n - Multiple crashes<br />

can result in arbitrary code execution. (MFSA 2010-26)\n\n - A heap buffer overflow in<br />

nsGenericDOMDataNode::SetTextInternal. (MFSA 2010-29)\n\nAn integer overflow in<br />

XSLT node sorting. (MFSA 2010-30)<br />

Solution: Upgrade to Mozilla Thunderbird 3.0.5 or later.<br />

CVE-2010-1203<br />

EvoCam < 3.6.8 GET Request Buffer Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5583 FAMILY: Web Servers RISK: HIGH NESSUS ID:47682<br />

Description: Synopsis :\n\nThe remote host contains an application that is affected by a buffer overflow<br />

vulnerability.\n\nThe remote host is running EvoCam, a webcam application for Mac OS<br />

X. For your information, the observed version of EvoCam is %L.\n\nVersions of EvoCam<br />

earlier than 3.6.8 are potentially affected by a buffer overflow vulnerability in the web<br />

server when handling specially crafted GET requests. An attacker, exploiting this flaw,<br />

could execute arbitrary code on the remote host subject to the privileges of the user running<br />

the affected software.<br />

Family Internet Services 1498

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!