27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

enabled. (CVE-2011-2526)<br />

Solution: Upgrade to Apache Tomcat 7.0.19 or later.<br />

CVE-2011-2526<br />

Android OS 2.3.4 / 3.1 Sandbox Bypass Vulnerability<br />

<strong>PVS</strong> ID: 5997 FAMILY: Mobile Devices<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is affected by a sandbox bypass vulnerability.\n\nFor your<br />

information, the observed version of Android OS installed on the remote device is : \n %L<br />

\n\nAndroid OS 2.3.4 and 3.1 are affected by a cross-application scripting vulnerability that<br />

could be exploited to bypass the sandbox.<br />

Solution: Upgrade to Android 2.3.5, 3.2, or later.<br />

CVE-2011-2357<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Google Chrome < 13.0.782.107 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5998 FAMILY: Web Clients RISK: HIGH NESSUS ID:55765<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by a code execution<br />

vulnerability.\n\nFor your information, the observed version of Google Chrome is<br />

\n%L.\n\nVersions of Google Chrome earlier than 13.0.782.107 are potentially affected by<br />

multiple vulnerabilities :\n\n - It is possible to install an extension without a confirmation<br />

dialog. (Issue 75821)\n\n - A stale pointer exists due to bad line box tracking in rendering.<br />

(Issue 78841)\n\n - It is possible to bypass the dangerous file prompt. (Issue 79266)\n\n -<br />

An unspecified issue exists relating to the designation of strings in the basic auth dialog.<br />

(Issue 79426)\n\n - A file permissions error exists with drag and drop. Note that this issue<br />

only affects Chrome on Linux. (Issue 81307)\n\n - Developer mode NPAPI extension<br />

installs are not always confirmed via browser dialog boxes. (Issue 83273)\n\n - It is<br />

possible for the local file path to be disclosed via a GL program log. (CVE-2011-2784)\n\n<br />

- The homepage URL in extensions is not properly sanitized. (Issue 84402)\n\n - The<br />

speech-input bubble is not always displayed on-screen. (Issue 84600)\n\n - It is possible to<br />

crash the browser due to a GPU lock re-entrancy issue. (Issue 84805)\n\n - A buffer<br />

overflow issue exists in inspector serialization. (Issue 85559)\n\n - A use-after-free issue<br />

exists in the Pepper plug-in installation. (Issue 85808)\n\n - A use-after-free issue exists<br />

with floating styles. (Issue 86502)\n\n - An out-of-bounds write exists in ICU. (Issue<br />

86900)\n\n - A use-after-free issue exists with float removal. (Issue 87148)\n\n - A<br />

use-after-free issue exists in media selectors. (Issue 87227)\n\n - An out-of-bounds read<br />

exists in text iteration. (Issue 87298)\n\n - A leak exists relating to cross-frame functions.<br />

(Issue 87339)\n\n - A use-after-free issue exists in Skia. (Issue 87548)\n\n - A use-after-free<br />

issue exists in resource caching. (Issue 87729)\n\n - Several unspecified internal schemes<br />

are web accessible. (Issue 87815)\n\n - A use-after-free issue exists in HTML range<br />

handling. (Issue 87925)\n\n - It is possible for a client side redirect target to be leaked.<br />

(Issue 88337)\n\n - It is possible for v8 to crash with const lookups. (Issue 88591)\n\n - A<br />

use-after-free issue exists in the frame loader. (Issue 88846)\n\n - A use-after-free issue<br />

Family Internet Services 1634

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!