27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: There is a high probability that your server has been compromised. You should manually<br />

inspect and fix this system.<br />

CVE Not available<br />

Mozilla Firefox 3.6.x < 3.6.16 Invalid HTTP Certificates<br />

<strong>PVS</strong> ID: 5842 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:52767<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Firefox is<br />

:%L.\n\nVersions of Firefox 3.6.x earlier than 3.6.16 have an out-of-date SSL certificate<br />

blacklist. A certificate authority (CA) has revoked a number of fraudulent SSL certificates<br />

for several prominent public websites.\n\nIf an attacker can trick someone into using the<br />

affected browser and visiting a malicious site using one of the fraudulent certificates, he<br />

may be able to fool that user into believing the site is a legitimate one. In turn, the user<br />

could send credentials to the malicious site or download and install applications.<br />

Solution: Upgrade to Firefox 3.6.16 or later.<br />

CVE Not available<br />

Mozilla Firefox 3.5.x < 3.5.18 Invalid HTTP Certificates<br />

<strong>PVS</strong> ID: 5843 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:52766<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Firefox is<br />

:%L.\n\nVersions of Firefox earlier than 3.5.18 have an out-of-date SSL certificate<br />

blacklist. A certificate authority (CA) has revoked a number of fraudulent SSL certificates<br />

for several prominent public websites.\n\nIf an attacker can trick someone into using the<br />

affected browser and visiting a malicious site using one of the fraudulent certificates, he<br />

may be able to fool that user into believing the site is a legitimate one. In turn, the user<br />

could send credentials to the malicious site or download and install applications.<br />

Solution: Upgrade to Firefox 3.5.18 or later.<br />

CVE Not available<br />

Mozilla SeaMonkey 2.0.x < 2.0.13 Invalid HTTP Certificates<br />

<strong>PVS</strong> ID: 5844 FAMILY: Web Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:52769<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of SeaMonkey is<br />

:%L.\n\nVersions of SeaMonkey earlier than 2.0.13 have an out-of-date SSL certificate<br />

blacklist. A certificate authority (CA) has revoked a number of fraudulent SSL certificates<br />

Family Internet Services 1587

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!