27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE-2011-1456<br />

Mozilla Firefox < 3.5.19 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5900 FAMILY: Web Clients RISK: HIGH NESSUS ID:53593<br />

Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox earlier than 3.5.19 are potentially affected by multiple<br />

vulnerabilities : \n\nMultiple memory corruption issues could lead to arbitrary code<br />

execution. (MFSA2011-12)\n\n - Multiple dangling pointer vulnerabilities exist.<br />

(MFSA2011-13)\n\n - A Java applet could be used to mimic interaction with form<br />

autocomplete controls and steal entries from the form history. (MFSA2011-14)\n\n - The<br />

Java Embedding Plugin (JEP) shipped with the Mac OS X versions of Firefox could be<br />

exploited to obtain elevated access to resources on a user's system. (MFSA2011-15)\n\n -<br />

The 'resource: ' protocol could be exploited to allow directory traversal on Windows and<br />

the potential loading of resources from non-permitted locations. (MFSA2011-16)\n\n - The<br />

XSLT 'generate-id()' function returns may return a string that reveals a specific valid<br />

address of an object on the memory heap. (MFSA2011-18)<br />

Solution: Upgrade to Firefox 3.5.19 or later.<br />

CVE-2011-1202<br />

Mozilla Firefox 3.6.x < 3.6.17 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5901 FAMILY: Web Clients RISK: HIGH NESSUS ID:53594<br />

Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox 3.6.x earlier than 3.6.17 are potentially affected by multiple<br />

vulnerabilities : \n\nMultiple memory corruption issues could lead to arbitrary code<br />

execution. (MFSA2011-12)\n\n - Multiple dangling pointer vulnerabilities exist.<br />

(MFSA2011-13)\n\n - A Java applet could be used to mimic interaction with form<br />

autocomplete controls and steal entries from the form history. (MFSA2011-14)\n\n - The<br />

Java Embedding Plugin (JEP) shipped with the Mac OS X versions of Firefox could be<br />

exploited to obtain elevated access to resources on a user's system. (MFSA2011-15)\n\n -<br />

The 'resource: ' protocol could be exploited to allow directory traversal on Windows and<br />

the potential loading of resources from non-permitted locations. (MFSA2011-16)\n\n - The<br />

XSLT 'generate-id()' function returned a string that revealed a specific valid address of an<br />

object on the memory heap. (MFSA2011-18)<br />

Solution: Upgrade to Firefox 3.6.17 or later.<br />

CVE-2011-1202<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Firefox 4.0.x < 4.0.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5902 FAMILY: Web Clients RISK: HIGH NESSUS ID:53595<br />

Family Internet Services 1604

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!