27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

the SSL certificate was created with a common name containing a wild card followed by<br />

the partial IP address of the remote host. (MFSA 2010-70)\n\n - A function used to load<br />

external libraries on the Windows platform could allow loading of unsafe DLL's thus<br />

allowing binary planting attack. (MFSA 2010-71)\n\n - The SSL implementation allows<br />

servers to use Diffie-Hellman mode (DHE) with a very short key length. Such key lengths<br />

could be easily breakable with modern hardware. (MFSA 2010-72)<br />

Solution: Upgrade to Thunderbird 3.1.5 or later.<br />

CVE-2010-3183<br />

Mozilla SeaMonkey 2.0.x < 2.0.9 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5685 FAMILY: Web Clients RISK: HIGH NESSUS ID:50088<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of SeaMonkey is<br />

:%L.\n\nVersions of SeaMonkey 2.0.x earlier than 2.0.9 are potentially affected by multiple<br />

vulnerabilities :\n\n - Multiple memory safety bugs could lead to memory corruption,<br />

potentially resulting in arbitrary code execution. (MFSA 2010-64)\n\n - By passing an<br />

excessively long string to 'document.write' it may be possible to trigger a buffer overflow<br />

condition resulting in arbitrary code execution on the remote system. (MFSA 2010-65)\n\n<br />

- A use-after-free error in nsBarProp could allow arbitrary code execution on the remote<br />

system. (MFSA 2010-66)\n\n - A dangling pointer vulnerability in LookupGetterOrSetter<br />

could allow arbitrary code execution. (MFSA 2010-67)\n\n - The Gopher parser is affected<br />

by a cross-site scripting vulnerability. (MFSA 2010-68)\n\n - It is possible to steal<br />

information from a site in a different domain using modal calls. (MFSA 2010-69)\n\n - It is<br />

possible to establish a valid SSL connection to a remote host, provided the SSL certificate<br />

was created with a common name containing a wild card followed by the partial IP address<br />

of the remote host. (MFSA 2010-70)\n\n - A function used to load external libraries on the<br />

Windows platform could allow loading of unsafe DLL's thus allowing binary planting<br />

attack. (MFSA 2010-71)\n\n - The SSL implementation allows servers to use<br />

Diffie-Hellman mode (DHE) with a very short key length. Such key lengths could be easily<br />

breakable with modern hardware. (MFSA 2010-72)<br />

Solution: Upgrade to SeaMonkey 2.0.9 or later.<br />

CVE-2010-3183<br />

HTTP File Upload Detection<br />

<strong>PVS</strong> ID: 5686 FAMILY: Data Leakage RISK: NONE NESSUS ID:Not Available<br />

Description: The following file was just uploaded via HTTP: \n %L<br />

realtime<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1536

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!