27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: Upgrade to iTunes 10.2 or later.<br />

CVE-2011-0192<br />

Google Chrome < 9.0.597.107 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5807 FAMILY: Web Clients RISK: HIGH NESSUS ID:52501<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of Google Chrome is<br />

%L.\n\nVersions of Google Chrome earlier than 9.0.597.107 are potentially affected by<br />

multiple vulnerabilities :\n\n - An unspecified error exists in the URL bar operations which<br />

can allow spoofing attacks. (54262)\n\n - An unspecified error exists in the processing of<br />

JavaScript dialogs. (63732)\n\n - An unspecified error exists in the processing of CSS<br />

nodes which can leave stale pointers in memory. (68263)\n\n - An unspecified error exists<br />

in the processing of key frame rules which can leave stale pointers in memory. (68741)\n\n<br />

- An unspecified error exists in the processing of form controls which can lead to<br />

application crashes. (70078)\n\n - An unspecified error exists in the rendering of SVG<br />

animations and other SVG content which can leave stale pointers in memory. (70244,<br />

71296)\n\n - An unspecified error exists in the processing of tables which can leave stale<br />

nodes behind. (71114)\n\n - An unspecified error exists in the processing of tables which<br />

can leave stale pointers in memory. (71115)\n\n - An unspecified error exists in the<br />

processing of XHTML which can leave stale nodes behind. (71386)\n\n - An unspecified<br />

error exists in the processing of textarea elements which can lead to application crashes.<br />

(71388)\n\n - An unspecified error exists in the processing of device orientation which can<br />

leave stale pointers in memory. (71595)\n\n - An unspecified error exists in WebGL which<br />

allows out-of-bounds memory accesses. (71717, 71960)\n\n - An integer overflow exists in<br />

the processing of textarea elements which can lead to application crashes. (71855)\n\n - A<br />

use-after-free error exists in the processing of blocked plugins. (72437)\n\n - An<br />

unspecified error exists int he processing of layouts which can leave stale pointers in<br />

memory. (73235)<br />

Solution: Upgrade to Google Chrome 9.0.597.107 or later.<br />

CVE-2011-1125<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Firefox 3.6.x < 3.6.14 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5808 FAMILY: Web Clients RISK: HIGH NESSUS ID:52531<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Firefox is<br />

:%L.\n\nVersions of Firefox 3.6.x earlier than 3.6.14 are potentially affected by multiple<br />

vulnerabilities :\n\n - Multiple memory corruption issues exists which could lead to<br />

arbitrary code execution. (MFSA 2011-01)\n\n - An error exists in the processing of<br />

recusrive calls to 'eval()' when the call is wrapped in a try/catch statement. This error causes<br />

dialog boxes to be displayed with no content and non-functioning buttons. Closing the<br />

dialog results in default acceptance of the dialog. (MFSA 2011-02)\n\n - A use-after-free<br />

error exists in a method used by 'JSON.stringify' and can allow arbitrary code execution.<br />

(MFSA 2011-03)\n\n - A buffer-overflow vulnerability exists in the JavaScript engine's<br />

internal memory mapping of non-local variables and may lead to cde execution. (MFSA<br />

Family Internet Services 1575

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!