27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The nipplib.dll component, as used by both types of browser plugins, does not properly<br />

handle the profile time parameter from the user specified printer-url before passing it to a<br />

fixed-length buffer on the heap. (ZDI-11-173 / CVE-2011-1700)\n\n - The nipplib.dll<br />

component, as used by both types of browser plugins, does not properly handle the<br />

profile-name parameter from the user specified printer url before passing it to a<br />

fixed-length buffer on the heap. (ZDI-11-174 / CVE-2011-1701)\n\n - The nipplib.dll<br />

component, as used by both types of browser plugins, does not properly handle the<br />

file-date-time parameter from the user specified printer-url before passing it to a<br />

fixed-length buffer on the heap. (ZDI-11-175 / CVE-2011-1702)\n\n - The nipplib.dll<br />

component, as used by both types of browser plugins, does not properly handle the driver<br />

version parameter from the user-specified printer-url before passing it to a fixed-length<br />

buffer on the heap. (ZDI-11-176 / CVE-2011-1703)\n\n - The nipplib.dll component, as<br />

used by both types of browser plugins, does not properly handle the core-package<br />

parameter from the user specified printer-url before passing it to a fixed-length buffer on<br />

the heap. (ZDI-11-177 / CVE_2011-1704)\n\n - The nipplib.dll component, as used by both<br />

types of browser plugins, does not properly handle the client-file-name parameter from the<br />

user specified printer-url before passing it to a fixed-length buffer on the heap.<br />

(ZDI-11-178 / CVE-2011-1705)\n\n - The nipplib.dll component, as used by both types of<br />

browser plugins, does not properly handle the iprint-client-config-info parameter form the<br />

user specified printer-url before passing it to a fixed-length buffer on the heap.<br />

(ZDI-11-179 / CVE-2011-1706)\n\n - The nipplib.dll component, as used by both types of<br />

browser plugins, does not properly handle the op-printer-list-all-jobs parameter from the<br />

user specified printer-url before passing it to a fixed-length buffer on the heap.<br />

(ZDI-11-180 / CVE-2011-1708)\n\n - The nipplib.dll component, as used by both types of<br />

browser plugins, does not properly handle the op-printer-list-all-jobs parameter from the<br />

user specified printer-url before passing it to a fixed-length buffer on the heap.<br />

(ZDI-11-181 / CVE-2011-1707)<br />

Solution: Upgrade to Novell iPrint Client 5.64 or later.<br />

CVE-2011-1708<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Google Chrome < 12.0.742.91 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5943 FAMILY: Web Clients RISK: HIGH NESSUS ID:54989<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by a code execution<br />

vulnerability.\n\nFor your information, the observed version of Google Chrome is<br />

\n%L.\n\nVersions of Google Chrome earlier than 12.0.742.91 are potentially affected by<br />

multiple vulnerabilities :\n\n - A use-after-free issue exists due to integer issues in float<br />

handling. (Issue 73962, 79746)\n\n - A use-after-free issue exists in accessibility support.<br />

(Issue 75496)\n\n - A visit history information leak exists in CSS. (Issue 75643)\n\n - It is<br />

possible to crash the browser with lots of form submissions. (Issue 76034)\n\n - An<br />

extensions permission bypass exists. (Issue 77026)\n\n - A stale pointer exists in the<br />

extension framework. (Issue 78516)\n\n - It is possible to read from an uninitialized<br />

pointer. (Issue 79362)\n\n - It is possible to perform script injection into the new tab page.<br />

(Issue 79862)\n\n - A use-after-free issue exists in developer tools. (Issue 80358)\n\n - A<br />

memory corruption issue exists in history deletion. (Issue 81916)\n\n - A use-after-free<br />

issue exists in the image loader. (Issue 81949)\n\n - It is possible to perform an extension<br />

injection into chrome:// pages. (Issue 83010\n\n - A same origin bypass exists in V8. (Issue<br />

Family Internet Services 1617

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!