27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Diffie-Hellman mode (DHE) with a very short key length. Such key lengths could be easily<br />

breakable with modern hardware. (MFSA 2010-72)<br />

Solution: Upgrade to Firefox 3.6.11 or later.<br />

CVE-2010-3183<br />

Mozilla Thunderbird 3.0.x < 3.0.9 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5683 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:50086<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Thunderbird is<br />

:%L.\n\nVersions of Thunderbird 3.0.x earlier than 3.0.9 are potentially affected by<br />

multiple vulnerabilities :\n\n - Multiple memory safety bugs could lead to memory<br />

corruption, potentially resulting in arbitrary code execution. (MFSA 2010-64)\n\n - By<br />

passing an excessively long string to 'document.write' it may be possible to trigger a buffer<br />

overflow condition resulting in arbitrary code execution on the remote system. (MFSA<br />

2010-65)\n\n - A use-after-free error in nsBarProp could allow arbitrary code execution on<br />

the remote system. (MFSA 2010-66)\n\n - A dangling pointer vulnerability in<br />

LookupGetterOrSetter could allow arbitrary code execution. (MFSA 2010-67)\n\n - It is<br />

possible to steal information from a site in a different domain using modal calls. (MFSA<br />

2010-69)\n\n - It is possible to establish a valid SSL connection to a remote host, provided<br />

the SSL certificate was created with a common name containing a wild card followed by<br />

the partial IP address of the remote host. (MFSA 2010-70)\n\n - A function used to load<br />

external libraries on the Windows platform could allow loading of unsafe DLL's thus<br />

allowing binary planting attack. (MFSA 2010-71)\n\n - The SSL implementation allows<br />

servers to use Diffie-Hellman mode (DHE) with a very short key length. Such key lengths<br />

could be easily breakable with modern hardware. (MFSA 2010-72)<br />

Solution: Upgrade to Thunderbird 3.0.9 or later.<br />

CVE-2010-3183<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Thunderbird 3.1.x < 3.1.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5684 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:50087<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Thunderbird is<br />

:%L.\n\nVersions of Thunderbird 3.1.x earlier than 3.1.5 are potentially affected by<br />

multiple vulnerabilities :\n\n - Multiple memory safety bugs could lead to memory<br />

corruption, potentially resulting in arbitrary code execution. (MFSA 2010-64)\n\n - By<br />

passing an excessively long string to 'document.write' it may be possible to trigger a buffer<br />

overflow condition resulting in arbitrary code execution on the remote system. (MFSA<br />

2010-65)\n\n - A use-after-free error in nsBarProp could allow arbitrary code execution on<br />

the remote system. (MFSA 2010-66)\n\n - A dangling pointer vulnerability in<br />

LookupGetterOrSetter could allow arbitrary code execution. (MFSA 2010-67)\n\n - It is<br />

possible to steal information from a site in a different domain using modal calls. (MFSA<br />

2010-69)\n\n - It is possible to establish a valid SSL connection to a remote host, provided<br />

Family Internet Services 1535

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!