27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

2011-04)\n\n - A buffer overflow vulnerability exists in the JavaScript engine's internal<br />

mapping of string values and may lead to code execution. (MFSA 2011-05)\n\n - A<br />

use-after-free error exists such that a JavaScript 'Worker' can be used to keep a reference to<br />

an object which can be freed during garbage collection. This vulnerability may lead to<br />

arbitrary code execution. (MFSA 2011-06)\n\n - A buffer overflow error exists related to<br />

the creation of very long strings and the insertion of those strings into an HTML document.<br />

This vulnerability may lead to arbitrary code execution. (MFSA 2011-07)\n\n - An input<br />

validation error exists int he class, 'ParanoidFragmentSink', which allows inline JavaScript<br />

and 'javascript:' URLs in a chrome document. Note that no unsafe usage occurs in Mozilla<br />

products, however community generated extensions could. (MFSA 2011-08)\n\n - A buffer<br />

overflow exist related to JPEG decoding and may lead to arbitrary code execution. (MFSA<br />

2011-09)\n\n - A cross-site request forgery (CSRF) vulnerability exists when an HTTP 307<br />

redirect is received in response to a plugin's request. The request is forwarded to the new<br />

location without the plugin's knowledge and with custom headers intact, even across<br />

origins. (MFSA 2011-10)<br />

Solution: Upgrade to Firefox 3.6.14 or later.<br />

CVE-2011-0062<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Firefox 3.5.x < 3.5.17 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5809 FAMILY: Web Clients RISK: HIGH NESSUS ID:52530<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Firefox is<br />

:%L.\n\nVersions of Firefox 3.5.x earlier than 3.5.17 are potentially affected by multiple<br />

vulnerabilities :\n\n - Multiple memory corruption issues exists which could lead to<br />

arbitrary code execution. (MFSA 2011-01)\n\n - An error exists in the processing of<br />

recusrive calls to 'eval()' when the call is wrapped in a try/catch statement. This error causes<br />

dialog boxes to be displayed with no content and non-functioning buttons. Closing the<br />

dialog results in default acceptance of the dialog. (MFSA 2011-02)\n\n - A use-after-free<br />

error exists in a method used by 'JSON.stringify' and can allow arbitrary code execution.<br />

(MFSA 2011-03)\n\n - A buffer-overflow vulnerability exists in the JavaScript engine's<br />

internal memory mapping of non-local variables and may lead to cde execution. (MFSA<br />

2011-04)\n\n - A buffer overflow vulnerability exists in the JavaScript engine's internal<br />

mapping of string values and may lead to code execution. (MFSA 2011-05)\n\n - A<br />

use-after-free error exists such that a JavaScript 'Worker' can be used to keep a reference to<br />

an object which can be freed during garbage collection. This vulnerability may lead to<br />

arbitrary code execution. (MFSA 2011-06)\n\n - A buffer overflow error exists related to<br />

the creation of very long strings and the insertion of those strings into an HTML document.<br />

This vulnerability may lead to arbitrary code execution. (MFSA 2011-07)\n\n - An input<br />

validation error exists int he class, 'ParanoidFragmentSink', which allows inline JavaScript<br />

and 'javascript:' URLs in a chrome document. Note that no unsafe usage occurs in Mozilla<br />

products, however community generated extensions could. (MFSA 2011-08)\n\n - A<br />

cross-site request forgery (CSRF) vulnerability exists when an HTTP 307 redirect is<br />

received in response to a plugin's request. The request is forwarded to the new location<br />

without the plugin's knowledge and with custom headers intact, even across origins.<br />

(MFSA 2011-10)<br />

Family Internet Services 1576

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!