27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: Upgrade to Firefox 3.5.17 or later.<br />

CVE-2011-0059<br />

Mozilla Thunderbird 3.1.x < 3.1.8 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5810 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:52532<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Thunderbird is<br />

:%L.\n\nVersions of Thunderbird 3.1.x earlier than 3.1.8 are potentially affected by<br />

multiple vulnerabilities :\n\n - Multiple memory corruption issues exists which could lead<br />

to arbitrary code execution. (MFSA 2011-01)\n\n - An input validation error exists int he<br />

class, 'ParanoidFragmentSink', which allows inline JavaScript and 'javascript:' URLs in a<br />

chrome document. Note that no unsafe usage occurs in Mozilla products, however<br />

community generated extensions could. (MFSA 2011-08)\n\n - A buffer overflow exist<br />

related to JPEG decoding and may lead to arbitrary code execution. (MFSA 2011-09)<br />

Solution: Upgrade to Thunderbird 3.1.8 or later.<br />

CVE-2011-0062<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla SeaMonkey 2.0.x < 2.0.12 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5811 FAMILY: Web Clients RISK: HIGH NESSUS ID:52533<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of SeaMonkey is<br />

:%L.\n\nVersions of SeaMonkey 2.0.x earlier than 2.0.12 are potentially affected by<br />

multiple vulnerabilities :\n\n - Multiple memory corruption issues exists which could lead<br />

to arbitrary code execution. (MFSA 2011-01)\n\n - An error exists in the processing of<br />

recusrive calls to 'eval()' when the call is wrapped in a try/catch statement. This error causes<br />

dialog boxes to be displayed with no content and non-functioning buttons. Closing the<br />

dialog results in default acceptance of the dialog. (MFSA 2011-02)\n\n - A use-after-free<br />

error exists in a method used by 'JSON.stringify' and can allow arbitrary code execution.<br />

(MFSA 2011-03)\n\n - A buffer-overflow vulnerability exists in the JavaScript engine's<br />

internal memory mapping of non-local variables and may lead to cde execution. (MFSA<br />

2011-04)\n\n - A buffer overflow vulnerability exists in the JavaScript engine's internal<br />

mapping of string values and may lead to code execution. (MFSA 2011-05)\n\n - A<br />

use-after-free error exists such that a JavaScript 'Worker' can be used to keep a reference to<br />

an object which can be freed during garbage collection. This vulnerability may lead to<br />

arbitrary code execution. (MFSA 2011-06)\n\n - A buffer overflow error exists related to<br />

the creation of very long strings and the insertion of those strings into an HTML document.<br />

This vulnerability may lead to arbitrary code execution. (MFSA 2011-07)\n\n - An input<br />

validation error exists int he class, 'ParanoidFragmentSink', which allows inline JavaScript<br />

and 'javascript:' URLs in a chrome document. Note that no unsafe usage occurs in Mozilla<br />

products, however community generated extensions could. (MFSA 2011-08)\n\n - A<br />

cross-site request forgery (CSRF) vulnerability exists when an HTTP 307 redirect is<br />

received in response to a plugin's request. The request is forwarded to the new location<br />

without the plugin's knowledge and with custom headers intact, even across origins.<br />

(MFSA 2011-10)<br />

Family Internet Services 1577

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!