27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox 4.0.x earlier than 4.0.1 are potentially affected by multiple<br />

vulnerabilities : \n\nMultiple memory corruption issues could lead to arbitrary code<br />

execution. (MFSA2011-12)\n\n - Multiple vulnerabilities in the WebGL feature and<br />

WebGLES could be exploited to execute arbitrary code or bypass ASLR protection on<br />

Windows. (MFSA2011-17) - The XSLT 'generate-id()' function returned a string that<br />

revealed a specific valid address of an object on the memory heap. (MFSA2011-18)<br />

Solution: Upgrade to Firefox 4.0.1 or later.<br />

CVE-2011-1202<br />

Mozilla Thunderbird 3.1.x < 3.1.10 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5903 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:53596<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Thunderbird is<br />

:%L.\n\nVersions of Thunderbird 3.1.x earlier than 3.1.10 are potentially affected by<br />

multiple vulnerabilities :\n\n - Multiple memory corruption issues could lead to arbitrary<br />

code execution. (MFSA2011-12)\n\n - The 'resource:' protocol could be exploited to allow<br />

directory traversal on Windows and the potential loading of resources from non-permitted<br />

locations. (MFSA2011-16)<br />

Solution: Upgrade to Thunderbird 3.1.10 or later.<br />

CVE-2011-0081<br />

Mozilla SeaMonkey < 2.0.14 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5904 FAMILY: Web Clients RISK: HIGH NESSUS ID:53597<br />

Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of SeaMonkey is : \n %L<br />

\n\nVersions of SeaMonkey earlier than 2.0.14 are potentially affected by multiple<br />

vulnerabilities : \n\nMultiple memory corruption issues could lead to arbitrary code<br />

execution. (MFSA2011-12)\n\n - Multiple dangling pointer vulnerabilities exist.<br />

(MFSA2011-13)\n\n - A Java applet could be used to mimic interaction with form<br />

autocomplete controls and steal entries from the form history. (MFSA2011-14)\n\n - The<br />

Java Embedding Plugin (JEP) shipped with the Mac OS X versions of SeaMonkey could be<br />

exploited to obtain elevated access to resources on a user's system. (MFSA2011-15)\n\n -<br />

The 'resource: ' protocol could be exploited to allow directory traversal on Windows and<br />

the potential loading of resources from non-permitted locations. (MFSA2011-16)\n\n - The<br />

XSLT 'generate-id()' function returned a string that revealed a specific valid address of an<br />

object on the memory heap. (MFSA2011-18)<br />

Solution: Upgrade to SeaMonkey 2.0.14 or later.<br />

CVE-2011-1202<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1605

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!