27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Google Chrome is<br />

%L.\n\nVersions of Google Chrome earlier than 8.0.552.237 are potentially affected by<br />

multiple vulnerabilities :\n\n - A browser crash exists in extensions notification handling.<br />

(58053)\n\n - Bad pointer handling exists in node iteration. (65764)\n\n - Multiple crashes<br />

exist when printing multi-page PDFs. (66334)\n\n - A stale pointer exists with CSS +<br />

canvas. (66560)\n\n - A stale pointer exists with CSS + cursors. (66748)\n\n - A use after<br />

free error exists in PDF handling. (67100)\n\n - A stack corruption error exists after PDF<br />

out-of-memory conditions. (67208)\n\n - A bad memory access issue exists when handling<br />

mismatched video frame sizes. (67303)\n\n -A stale pointer exists with SVG use elements.<br />

(67363)\n\n - An uninitialized pointer exists in the browser which is triggered by rogue<br />

extensions. (67393)\n\n - Multiple buffer overflows exists in the Vorbis decoder.<br />

(68115)\n\n - A buffer overflow exists in PDF shading. (68170)\n\n - A bad cast exists in<br />

anchor handling. (68178)\n\n - A bad cast exists in video handling. (68181)\n\n - A stale<br />

rendering node exists after DOM node removal. (68439)\n\n - A stale pointer exists in<br />

speech handling. (68666)<br />

Solution: Upgrade to Google Chrome 8.0.552.237 or later.<br />

CVE-2011-0485<br />

Piwik < 1.1.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5743 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server is hosting a PHP application that is vulnerable to<br />

multiple attack vectors.\n\nThe remote web server is hosting Piwik, a web analytics<br />

application written in PHP. For your information, the observed version of Piwik is<br />

%L.\n\nVersions of Piwik earlier than 1.1.0 are potentially affected by multiple<br />

vulnerabilities :\n\n - A flaw exists in the 'Piwik_Common::getIP' function which fails to<br />

properly determine the client IP address. (Bug 457)\n\n - Piwik fails to prevent the login<br />

form from being framed in another website. (Bug 1679)\n\n - An unspecified flaw exists<br />

relating to Cookie.php's failure to set the secure flag for the session cookie in https sessions.<br />

(Bug 1795)\n\n - A denial-of-service vulnerability exists because Piwik fails to properly<br />

limit the number of files stored under '/tmp/sessions/' (Bug 1910)\n\n - An unspecified<br />

cross-site scripting vulnerability exists.<br />

Solution: Upgrade to Piwik 1.1.0 or later.<br />

CVE-2011-0401<br />

Bugzilla < 3.2.10 / 3.4.10 / 3.6.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5744 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server is hosting an application that is vulnerable to multiple<br />

attack vectors.\n\nThe remote web server is hosting Bugzilla, a web-based bug tracking<br />

application. For your information, the observed version of Bugzilla is %L.\n\nVersions of<br />

Bugzilla 3.2.x earlier than 3.2.10, 3.4.x earlier than 3.4.10, and 3.6.x earlier than 3.6.4 are<br />

Family Internet Services 1556

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!