27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Google Chrome is<br />

%L.\n\nVersions of Google chrome earlier than 6.0.472.59 are potentially affected by<br />

multiple vulnerabilities :\n\n - A use-after-free error exists when using document APIs<br />

during parse. (Bug 50250)\n\n - A use-after-free error exists in SVG styles. (Bug<br />

50712)\n\n - A use-after-free error exists with nested SVG elements. (Bug 51252)\n\n - A<br />

possible browser assert exists in cursor handling. (Bug 51709)\n\n - A race condition exists<br />

in console handling. (Bug 51919)\n\n - An unlikely browser crash exists in pop-up<br />

blocking. (Bug 53176)\n\n - Bug 45400 is incorrectly fixed on Mac. (Bug 53361)\n\n - A<br />

memory corruption error exists in Geolocation. (Bug 53394)\n\n - A memory corruption<br />

issue exists in Khmer handling. Note that this only affects Chrome for Linux. (Bug<br />

53930)\n\n - An error exists because Chrome fails to prompt for extension history access.<br />

(Bug 54006)<br />

Solution: Upgrade to Google Chrome 6.0.472.59 or later.<br />

CVE-2010-3417<br />

QuickTime < 7.6.8 Multiple Vulnerabilities (Windows)<br />

<strong>PVS</strong> ID: 5665 FAMILY: Web Clients RISK: HIGH NESSUS ID:49260<br />

Description: Synopsis :\n\nThe remote host contains an application that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of QuickTime is %L.\n\nVersions<br />

of QuickTime earlier than 7.6.8 are potentially affected by multiple vulnerabilities :\n\nAn<br />

input validation issue in the QTPlugin.ocx ActiveX control could allow an attacker to force<br />

the application to jump to a location in memory controlled by the attacker through the<br />

optional '_Marshaled_pUnk' parameter and in turn to execute remote code under the<br />

context of the user running the web browser. (CVE-2010-1818)\n\n - QuickTime Picture<br />

Viewer uses a fixed path to look for specific files or libraries, such as 'cfnetwork.dll' and<br />

'corefoundation.dll', and this path includes directories that may not be trusted or under user<br />

control. If an attacker places a maliciously crafted DLL in the same directory as an image<br />

file, opening the image file with QuickTime Picture Viewer will cause the malicious DLL<br />

to be loaded. (CVE-2010-1819)<br />

Solution: Upgrade to QuickTime 7.6.8 or later.<br />

CVE-2010-1819<br />

Squid 3.1.6 DNS Replay Denial of Service<br />

<strong>PVS</strong> ID: 5666 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:48433<br />

Description: Synopsis :\n\nThe remote proxy server is vulnerable to a denial-of-service attack.\n\nFor<br />

your information, the observed version of Squid is %L.\n\nSquid 3.1.6 is potentially<br />

affected by a denial of service vulnerability that is caused by an assertion failure when<br />

contacting IPv4-only DNS resolvers.<br />

Solution: Upgrade to Squid 3.1.7 or later.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1528

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!