27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

than 5.601 are potentially affected by a stack buffer overflow vulnerability due to an error<br />

in the 'in_midi.dll' plugin which improperly serializes timestamps in MIDI file. A specially<br />

crafted MIDI file can cause the application to overwrite the saved base pointer and allows<br />

execution of arbitrary code.<br />

Solution: Upgrade to Winamp 5.601 or later.<br />

CVE Not available<br />

Mozilla Firefox 3.6.x < 3.6.13 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5727 FAMILY: Web Clients RISK: HIGH NESSUS ID:51121<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Firefox is<br />

:%L.\n\nVersions of Firefox 3.6.x earlier than 3.6.13 are potentially affected by multiple<br />

vulnerabilities :\n\n - Multiple memory corruption issues could lead to arbitrary code<br />

execution. (MFSA 2010-74)\n\n - On the Windows platform, when 'document.write()' is<br />

called witha very long string a buffer voerflow could be triggered. (MFSA 2010-75)\n\n - A<br />

privilege escalation vulnerability exists with 'window.open' and the '' element.<br />

(MFSA 2010-76)\n\n - Arbitrary code execution is possible when using HTML tags inside<br />

a XUL tree. (MFSA 2010-77)\n\n - Downloadable fonts could expose vulnerabilities in the<br />

underlying OS font code. (MFSA 2010-78)\n\n - A Java security bypass vulnerability when<br />

LiveConnect is loaded via a 'data:' URL meta refresh. (MFSA 2010-79)\n\n - A use-after<br />

free error exists with nsDOMAttribute MutationObserver. (MFSA 2010-80)\n\n - An<br />

integer overflow exists in NewIdArray. (MFSA 2010-81)\n\n - It is possible to circumvent<br />

the fix for CVE-2010-0179. (MFSA 2010-82)\n\n - It is possible to spoof SSL in the<br />

location bar using the network error page. (MFSA 2010-83)\n\n - A cross-site scripting<br />

hazard exists in multiple character encodings. (MFSA 2010-84)<br />

Solution: Upgrade to Firefox 3.6.13 or later.<br />

CVE-2010-3777<br />

Mozilla Firefox < 3.5.16 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5728 FAMILY: Web Clients RISK: HIGH NESSUS ID:51120<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors..\n\nFor your information, the observed version of Firefox is<br />

:%L.\n\nVersions of Firefox 3.5.x earlier than 3.5.16 are potentially affected by multiple<br />

vulnerabilities :\n\n - Multiple memory corruption issues could lead to arbitrary code<br />

execution. (MFSA 2010-74)\n\n - On the Windows platform, when 'document.write()' is<br />

called with a very long string a buffer overflow could be triggered. (MFSA 2010-75)\n\n -<br />

A privilege escalation vulnerability exists with 'window.open' and the '' element.<br />

(MFSA 2010-76)\n\n - Arbitrary code execution is possible when using HTML tags inside<br />

a XUL tree. (MFSA 2010-77)\n\n - Downloadable fonts could expose vulnerabilities in the<br />

underlying OS font code. (MFSA 2010-78)\n\n - A Java security bypass vulnerability when<br />

LiveConnect is loaded via a 'data:' URL meta refresh. (MFSA 2010-79)\n\n - A<br />

use-after-free error exists with nsDOMAttribute MutationObserver. (MFSA 2010-80)\n\n -<br />

Family Internet Services 1550

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!