27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

e executed within the context of the site where the code was dropped. (MFSA<br />

2010-62)\n\n - The 'statusText' property of an 'XMLHttpRequest' object is readable by the<br />

requestor even when the request is made across origins. (MFSA 2010-63)<br />

Solution: Upgrade to Mozilla Firefox 3.5.12 or later.<br />

CVE-2010-3169<br />

Firefox 3.6.x < 3.6.9 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5657 FAMILY: Web Clients RISK: HIGH NESSUS ID:49146<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Firefox is %L.\n\nVersions<br />

of Firefox earlier than 3.6.9 are potentially affected by multiple vulnerabilities :\n\n -<br />

Multiple memory safety issues that could lead to arbitrary code execution. (MFSA<br />

2010-49)\n\n - The implementation of the HTML frameset element contains an integer<br />

overflow vulnerability. (MFSA 2010-50)\n\n - A dangling pointer vulnerability exists in the<br />

implementation of 'navigator.plugins' in which the 'navigator' object could retain a pointer<br />

to the plugins array even after it has been destroyed. (MFSA 2010-51)\n\n - Firefox can be<br />

used to load a malicious code library that has been planted on a victim's computer. (MFSA<br />

2010-52)\n\n - A heap buffer overflow exists in code routines responsible for transforming<br />

text runs. (MFSA 2010-53)\n\n - A dangling pointer issue remains leftover from the fix for<br />

CVE-2010-2753. (MFSA 2010-54)\n\n - XUL '' objects can be manipulated such that<br />

the setting of certain properties on the object would trigger the removal of the tree from the<br />

DOM and cause certain sections of deleted memory to be accessed. (MFSA 2010-55)\n\n -<br />

The implementation of the XUL '' content view contains a dangling pointer<br />

vulnerability. (MFSA 2010-56)\n\n - The code used to normalize a document contains a<br />

logical flaw that could be leveraged to run arbitrary code. (MFSA 2010-57)\n\n - A<br />

specially crafted font can be applied to a document and cause a crash on Mac systems.<br />

(MFSA 2010-58)\n\n - The wrapper class 'XPCSafeJSObjectWrapper' (SJOW) creates<br />

scope chains ending in outer objects. (MFSA 2010-59)\n\n - The 'type' attribute of an<br />

tag can override the charset of a framed HTML document even when the<br />

document is included across origins. (MFSA 2010-61)\n\n - When an HTML selection<br />

containing JavaScript is copy-and-pasted or dropped onto a document with designMode<br />

enabled, the JavaScript will be executed within the context of the site where the code was<br />

dropped. (MFSA 2010-62)\n\n - The 'statusText' property of an 'XMLHttpRequest' object is<br />

readable by the requestor even when the request is made across origins. (MFSA 2010-63)<br />

Solution: Upgrade to Mozilla Firefox 3.6.9 or later.<br />

CVE-2010-3169<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Thunderbird < 3.0.x < 3.0.7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5658 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:49147<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Thunderbird is<br />

%L.\n\nVersions of Thunderbird earlier than 3.0.7 are potentially affected by multiple<br />

Family Internet Services 1524

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!