27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Opera < 10.63 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5678 FAMILY: Web Clients RISK: HIGH NESSUS ID:49964<br />

Description: Synopsis :\n\nThe remote host has a web browser that is vulnerable to multiple attack<br />

vectors.\n\nThe remote host is running the Opera web browser. For your information, the<br />

observed version of Opera is %L.\n\nVersions of Opera earlier than 10.63 are potentially<br />

affected by multiple vulnerabilities :\n\n - It is possible to bypass cross-domain checks, and<br />

allow partial data theft by using CSS. (971)\n\n - It is possible to spoof the page address by<br />

modifying the size of the browser window. (972)\n\n - Carefully timed reloads and<br />

redirects could allow spoofing and cross-site scripting attacks. Using this XSS vector it<br />

may be possible to modify Opera's configuration, which could allow arbitrary code<br />

execution on the remote system. (973)\n\n - It is possible to intercept private video streams.<br />

(974)\n\n - An error while displaying invalid URL's could allow cross-site scripting attacks.<br />

(976)<br />

Solution: Upgrade to Opera 10.63 or later.<br />

CVE-2010-4050<br />

iDisk User Enumeration<br />

<strong>PVS</strong> ID: 5679 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is running an Apple application which stores and synchronizes files<br />

online via the MobileMe web application. A part of the MobileMe suite includes 'iDisk', a<br />

virtual hard drive which is used to store data files from multiple Apple devices in a single<br />

location. Users accessing MobileMe pass their user information in plain text across the<br />

network. The following UserID and "realm" were logged by the <strong>PVS</strong>: \n %L<br />

Solution: Ensure that this application is in alignment with existing policies and guidelines<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Google Chrome < 7.0.517.41 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5680 FAMILY: Web Clients RISK: HIGH NESSUS ID:50049<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Google Chrome is<br />

%L.\n\nVersions of Google chrome earlier than 7.0.517.41 are potentially affected by<br />

multiple vulnerabilities :\n\n - It is possible to spam profiles via autofill / autocomplete.<br />

(48225, 51727)\n\n - An unspecified crash exists relating to forms. (48857)\n\n - A browser<br />

crash exists relating to form autofill. (50428)\n\n - It is possible to spoof the URl on page<br />

unload. (51680)\n\n - It is possible to bypass the pop-up blocker. (53002)\n\n - A crash on<br />

shutdown exists relating got Web Sockets. (53985)\n\n - A possible memory corruption<br />

exists with animated GIF files. (54500)\n\n - Stale elements exist in the element map.<br />

(56451)<br />

Solution: Upgrade to Google Chrome 7.0.517.41 or later.<br />

Family Internet Services 1533

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!