27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

SeaMonkey 2.0.x < 2.0.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5610 FAMILY: Web Clients RISK: HIGH NESSUS ID:47785<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of SeaMonkey is<br />

%L.\n\nVersions of SeaMonkey 2.0.x earlier than 2.0.6 are potentially affected by multiple<br />

vulnerabilities :\n\n Multiple memory safety bugs could result in memory corruption,<br />

potentially resulting in arbitrary code execution. (MFSA 2010-34)\n\n - An error in DOM<br />

attribute cloning could result in arbitrary code execution. (MFSA 2010-35)\n\n - An error<br />

in Mozilla's 'NodeIterator' implementation could lead to arbitrary code execution. (MFSA<br />

2010-36)\n\n An error in the code to store the names and values of plugin parameters could<br />

lead to arbitrary code execution. (MFSA 2010-37)\n\n - The array class used to store CSS<br />

values is affected by an integer overflow vulnerability. (MFSA 2010-39)\n\n - An integer<br />

overflow vulnerability exists in the 'selection' attribute of the XUL tree element. (MFSA<br />

2010-40)\n\n - A buffer overflow exists in Mozilla graphics code could lead to arbitrary<br />

code execution. (MFSA 2010-41)\n\n - It is possible to read and parse resources from other<br />

domains even when the content is not valid javascript leading to cross-domain data<br />

disclosure. (MFSA 2010-42)\n\n - Multiple location bar spoofing vulnerabilities exist.<br />

(MFSA 2010-45)\n\n - It is possible to read data across domains by injecting bogus CSS<br />

selectors into a target site. (MFSA 2010-46)\n\n - Potentially sensitive URL parameters<br />

could be leaked across domains via script errors. (MFSA 2010-47)<br />

Solution: Upgrade to Mozilla SeaMonkey 2.0.6 or later.<br />

CVE-2010-2754<br />

MapServer < 5.6.4 / 4.10.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5611 FAMILY: CGI RISK: HIGH NESSUS ID:47861<br />

Description: Synopsis :\n\nThe remote web server contains a CGI script that is vulnerable to multiple<br />

attack vectors.\n\nThe remote web server hosts MapServer, an open source platform for<br />

publishing spacial data and interactive mapping applications to the web. For your<br />

information, the observed version of MapServer is %L.\n\nVersions of MapServer earlier<br />

than 5.6.4, or 4.10.6 are potentially affected by multiple vulnerabilities :\n\n - A buffer<br />

overflow vulnerability in the 'ForcedTmpBase' parameter of 'msTmpFile()'. (Ticket<br />

3484)\n\n - Unspecified security vulnerabilities in multiple debug command-line<br />

arguments. (Ticket 3485)<br />

Solution: Upgrade to MapServer 4.10.6, 5.6.4, or later.<br />

CVE-2010-2540<br />

Axon Virtual PBX < 2.13 /logon Multiple Parameter XSS<br />

<strong>PVS</strong> ID: 5612 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:42475<br />

Family Internet Services 1508

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!