27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

an excessive amount of autocomplete entries. (Bug 51727)\n\n - A stale pointer exists in<br />

focus handling. (Bug 52433)\n\n - A Sandbox parameter deserialization error exists. (Bug<br />

52682)\n\n - An unspecified cross-origin image theft issue exists. (Bug 53001)<br />

Solution: Upgrade to Google Chrome 6.0.472.53 or later.<br />

CVE Not available<br />

Safari < 4.1.2 / 5.0.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5655 FAMILY: Web Clients RISK: HIGH NESSUS ID:49144<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Safari is %L.\n\nThe remote host<br />

has Safari installed. For your information, the observed version of Safari is<br />

%L.\n\nVersions of Safari earlier than 4.1.2 / 5.0.2 are potentially affected by several issues<br />

in the following component :\n\n - Webkit<br />

Solution: Upgrade to Safari 4.1.2, 5.0.2, or later.<br />

CVE-2010-1807<br />

Firefox 3.5.x < 3.5.12 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5656 FAMILY: Web Clients RISK: HIGH NESSUS ID:49145<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Firefox is %L.\n\nVersions<br />

of Firefox earlier than 3.5.12 are potentially affected by multiple vulnerabilities :\n\n -<br />

Multiple memory safety issues that could lead to arbitrary code execution. (MFSA<br />

2010-49)\n\n - The implementation of the HTML frameset element contains an integer<br />

overflow vulnerability. (MFSA 2010-50)\n\n - A dangling pointer vulnerability exists in the<br />

implementation of 'navigator.plugins' in which the 'navigator' object could retain a pointer<br />

to the plugins array even after it has been destroyed. (MFSA 2010-51)\n\n - Firefox can be<br />

used to load a malicious code library that has been planted on a victim's computer. (MFSA<br />

2010-52)\n\n - A heap buffer overflow exists in code routines responsible for transforming<br />

text runs. (MFSA 2010-53)\n\n - A dangling pointer issue remains leftover from the fix for<br />

CVE-2010-2753. (MFSA 2010-54)\n\n - XUL '' objects can be manipulated such that<br />

the setting of certain properties on the object would trigger the removal of the tree from the<br />

DOM and cause certain sections of deleted memory to be accessed. (MFSA 2010-55)\n\n -<br />

The implementation of the XUL '' content view contains a dangling pointer<br />

vulnerability. (MFSA 2010-56)\n\n - The code used to normalize a document contains a<br />

logical flaw that could be leveraged to run arbitrary code. (MFSA 2010-57)\n\n - A<br />

specially crafted font can be applied to a document and cause a crash on Mac systems.<br />

(MFSA 2010-58)\n\n - The wrapper class 'XPCSafeJSObjectWrapper (SJOW) has a logical<br />

error in its scripted function implementation that allows the caller to run the function within<br />

the context of another site. (MFSA 2010-60)\n\n - The 'type' attribute of an tag<br />

can override the charset of a framed HTML document even when the document is included<br />

across origins. (MFSA 2010-61)\n\n - When an HTML selection containing JavaScript is<br />

copy-and-pasted or dropped onto a document with designMode enabled, the JavaScript will<br />

Family Internet Services 1523

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!