27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

An integer overflow exists n NewIdArray. (MFSA 2010-81)\n\n - It is possible to<br />

circumvent the fix for CVE-2010-0179. (MFSA 2010-82)\n\n - It is possible to spoof SSL<br />

in the location bar using the network error page. (MFSA 2010-83)\n\n - A cross-site<br />

scripting hazard exists in multiple character encodings. (MFSA 2010-84)<br />

Solution: Upgrade to Firefox 3.5.16 or later.<br />

CVE-2010-3778<br />

Mozilla Thunderbird 3.0.x < 3.0.11 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5729 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:51122<br />

Description: Synopsis :\n\nThe remote host has an email client installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Thunderbird is<br />

:%L.\n\nVersions of Thunderbird 3.0.x earlier than 3.0.11 are potentially affected by<br />

multiple vulnerabilities :\n\n - Multiple memory corruption issues could lead to arbitrary<br />

code execution. (MFSA 2010-74)\n\n - On the Windows platform, when 'document.write()'<br />

is called with a very long string a buffer overflow could be triggered. (MFSA 2010-75)\n\n<br />

- Downloadable fonts could expose vulnerabilities in the underlying OS font code. (MFSA<br />

2010-78)<br />

Solution: Upgrade to Mozilla Thunderbird 3.0.11 or later.<br />

CVE-2010-3778<br />

Mozilla Thunderbird 3.1.x < 3.1.7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5730 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:51123<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Thunderbird is<br />

:%L.\n\nVersions of Thunderbird 3.1.x earlier than 3.1.7 are potentially affected by<br />

multiple vulnerabilities :\n\n - Multiple memory corruption issues could lead to arbitrary<br />

code execution. (MFSA 2010-74)\n\n - On the Windows platform, when 'document.write()'<br />

is called with a very long string a buffer overflow could be triggered. (MFSA 2010-75)\n\n<br />

- Downloadable fonts could expose vulnerabilities in the underlying OS font code. (MFSA<br />

2010-78)<br />

Solution: Upgrade to Thunderbird 3.1.7 or later.<br />

CVE-2010-3778<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla SeaMonkey 2.0.x < 2.0.11 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5731 FAMILY: Web Clients RISK: HIGH NESSUS ID:51124<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of SeaMonkey is<br />

:%L.\n\nVersions of SeaMonkey 2.0.x earlier than 2.0.11 are potentially affected by<br />

multiple vulnerabilities :\n\n - Multiple memory corruption issues could lead to arbitrary<br />

Family Internet Services 1551

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!