27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

exists in display box rendering. (Issue 88889)\n\n - A PDF crash exists with nested<br />

functions. (Issue 89142)\n\n - A cross-origin script injection issue exists. (Issue 89520)\n\n<br />

- A cross-origin violation exists in base URI handling. (Issue 90222)<br />

Solution: Upgrade to Google Chrome 13.0.782.107 or later.<br />

CVE-2011-2819<br />

Apple FaceTime Detection<br />

<strong>PVS</strong> ID: 5999 FAMILY: Mobile Devices RISK: INFO NESSUS ID:Not Available<br />

Description: The remote mobile device is running FaceTime, a video calling application from Apple.<br />

Solution: N/A<br />

CVE Not available<br />

QuickTime < 7.7 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6000 FAMILY: Web Clients RISK: HIGH NESSUS ID:55764<br />

Description: Synopsis :\n\nThe remote host contains an application that is vulnerable to multiple attack<br />

vectors.\n\nFor your information, the observed version of QuickTime is %L.\n\nVersions<br />

of QuickTime earlier than 7.7 are potentially affected by multiple vulnerabilities :\n\n - A<br />

buffer overflow in QuickTime's handling of pict files may lead to an application crash or<br />

arbitrary code execution. (CVE-2011-0245)\n\n - A buffer overflow in QuickTime's<br />

handling of JPEG2000 files may lead to an application crash or arbitrary code execution.<br />

(CVE-2011-0186)\n\n - A cross-origin issue in QuickTime plug-in's handling of cross-site<br />

redirects may lead to disclosure of video data from another site. (CVE-2011-0187)\n\n - An<br />

integer overflow in QuickTime's handling of RIFF WAV files may lead to an application<br />

crash or arbitrary code execution. (CVE-2011-0209)\n\n - A memory corruption issue in<br />

QuickTime's handling of sample tables in QuickTime movie files may lead to an<br />

application crash or arbitrary code execution. (CVE-2011-0210)\n\n - An integer overflow<br />

in QuickTime's handling of audio channels in movie files may lead to an application crash<br />

or arbitrary code execution. (CVE-2011-0211)\n\n - A buffer overflow in QuickTime's<br />

handling of JPEG files may lead to an application crash or arbitrary code execution.<br />

(CVE-2011-0213)\n\n - A heap buffer overflow in QuickTime's handling of GIF files may<br />

lead to an application crash or arbitrary code execution. (CVE-2011-0246)\n\n - Multiple<br />

stack buffer overflows in QuickTime's handling of H.264 encoded movie files may lead to<br />

an application crash or arbitrary code execution. (CVE-2011-0247)\n\n - A stack buffer<br />

overflow in QuickTime ActiveX's handling of QTL files may lead to an application crash<br />

or arbitrary code execution. (CVE-2011-0248)\n\n - A heap buffer overflow in<br />

QuickTime's handling of STSC atoms in QuickTime movie files may lead to an application<br />

crash or arbitrary code execution. (CVE-2011-0249)\n\n - A heap buffer overflow in<br />

QuickTime's handling of STSS atoms in QuickTime movie files may lead to an application<br />

crash or arbitrary code execution. (CVE-2011-0250)\n\n - A heap buffer overflow in<br />

QuickTime's handling of STSZ atoms in QuickTime movie files may lead to an application<br />

crash or arbitrary code execution. (CVE-2011-0251)\n\n - A heap buffer overflow in<br />

QuickTime's handling of STTS atoms in QuickTime movie files may lead to an application<br />

Family Internet Services 1635

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!