27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Hotmail UserID is: %P<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Mozilla Firefox 3.6.x < 3.6.18 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5964 FAMILY: Web Clients RISK: HIGH NESSUS ID:55418<br />

Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox 3.6.x earlier than 3.6.18 are potentially affected by multiple<br />

vulnerabilities : \n\n - Multiple memory safety issues can lead to application crashes and<br />

possibly remote code execution. (CVE-2011-2374, CVE-2011-2376, CVE-2011-2364,<br />

CVE-2011-2365, CVE-2011-2605)\n\n - A use-after-free issue when viewing XUL<br />

documents with scripts disabled could lead to code execution. (CVE-2011-2373)\n\n - A<br />

memory corruption issue due to multipart/x-mixed-replace images could lead to memory<br />

corruption. (CVE-2011-2377)\n\n - When a JavaScript Array object has its length set to an<br />

extremely large value, the iteration of array elements that occurs when its reduceRight<br />

method is called could result in code execution due to an invalid index value being used.<br />

(CVE-211-2371)\n\n - Multiple dangling pointer vulnerabilities could lead to code<br />

execution. (CVE-2011-0083, CVE-2011-2363, CVE-2011-0085)\n\n - An error in the way<br />

cookies are handled could lead to information disclosure. (CVE-2011-2362)<br />

Solution: Upgrade to Firefox 3.6.18 or later.<br />

CVE-2011-2605<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Firefox > 4.0 and < 5.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5965 FAMILY: Web Clients RISK: HIGH NESSUS ID:55419<br />

Description: Synopsis : \n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host has a web browser installed that is vulnerable to<br />

multiple attack vectors.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox greater than 4.0 and earlier than 5.0 are potentially affected by<br />

multiple vulnerabilities : \n\n - Multiple memory safety issues can lead to application<br />

crashes and possibly remote code execution. (CVE-2011-2374, CVE-2011-2375,<br />

CVE-2011-2605)\n\n - A use-after-free issue when viewing XUL documents with scripts<br />

disabled could lead to code execution. (CVE-2011-2373)\n\n - A memory corruption issue<br />

due to multipart/x-mixed-replace images could lead to memory corruption.<br />

(CVE-2011-2377)\n\n - When a JavaScript Array object has its length set to an extremely<br />

large value, the iteration of array elements that occurs when its reduceRight method is<br />

called could result in code execution due to an invalid index value being used.<br />

(CVE-2011-2371)\n\n - It is possible for an image from a different domain to be loaded<br />

into a WebGL texture which could be used to steal image data from a different site.<br />

(CVE-2011-2366)\n\n - An out-of-bounds read issue and an invalid write issue could cause<br />

Family Internet Services 1623

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!